Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Gather behavioral insights from various sources like websites, file activities, keyboard inputs, and emails. Utilize a robust dashboard tailored for analysts, empowering them to dive deep into significant data trends. By employing advanced analytics, organizations can swiftly identify and address risky behaviors, mitigating potential harm before incidents arise. The integration of video recording and playback capabilities facilitates thorough investigations, providing evidence that can be used in legal contexts. It is essential to monitor a comprehensive range of data and activities to detect patterns of insider risk, rather than just isolated events. In addition, detailed forensic analysis enables a rapid assessment of intentions, helping to clear employees of any potential misconduct. With continuous and customizable monitoring, organizations can focus on the highest-risk users, effectively preventing breaches from happening. To ensure that the rights of individuals are respected, it's important to have mechanisms in place that allow for the oversight and auditing of investigators. Furthermore, using anonymized data during investigations helps eliminate biases, thereby preserving the integrity of the inquiry and fostering a fair process for all involved. This holistic approach not only enhances security but also promotes a culture of trust and accountability in the workplace.
Description
Salesforce Shield is an enterprise-grade security suite built to safeguard critical and sensitive data within Salesforce environments. It empowers organizations to proactively defend against internal misuse and external threats while maintaining compliance with evolving privacy regulations. Event Monitoring delivers deep operational insight by capturing over 50 types of system events, including logins, API calls, and report exports. Real-time alerts and transaction security policies help teams respond immediately to suspicious activity. Platform Encryption protects data at rest across fields, files, and attachments, while enabling companies to manage their own encryption keys. Field Audit Trail enhances governance by retaining long-term historical data changes for compliance and investigations. Data Detect scans Salesforce environments to uncover and classify sensitive information using intelligent pattern recognition. These capabilities provide a clear view of who accessed what data and when. Integrated tools like Security Center and Privacy Center further streamline governance and consent management. Salesforce Shield strengthens resilience, reduces risk exposure, and builds trust in AI-driven enterprise operations.
API Access
Has API
API Access
Has API
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$25 per month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Forcepoint
Country
United States
Website
www.forcepoint.com/product/fit
Vendor Details
Company Name
Salesforce
Founded
1999
Country
United States
Website
www.salesforce.com/platform/shield/
Product Features
Product Features
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
Encryption
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking