Best Encryption Software for Salesforce

Find and compare the best Encryption software for Salesforce in 2025

Use the comparison tool below to compare the top Encryption software for Salesforce on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Satori Reviews
    See Software
    Learn More
    Satori is a Data Security Platform (DSP) that enables self-service data and analytics for data-driven companies. With Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. That means your data consumers get data access in seconds instead of weeks. Satori’s DSP dynamically applies the appropriate security and access policies, reducing manual data engineering work. Satori’s DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously classifies sensitive data in all your data stores (databases, data lakes, and data warehouses), and dynamically tracks data usage while applying relevant security policies. Satori enables your data use to scale across the company while meeting all data security and compliance requirements.
  • 2
    ESET Endpoint Security Reviews
    This EDR solution will help you uncover the hidden potential in your network. This tool uses ESET's multilayered Endpoint Protection Platform to detect and respond to endpoints. All layers send relevant information to ESET Enterprise Inspector which analyzes large amounts of real-time data from endpoints. It can quickly identify and fix any security problem in the network. ESET Enterprise Inspector offers a unique reputation-based detection system that is transparent to security teams. To allow fine-tuning, all rules can be easily edited via XML. You can create new rules to meet the specific needs of your enterprise environment, including SIEM integrations. ESET's endpoint response and detection tool makes it easy to suppress false alarms. You can adjust the sensitivity of detection rules according to different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions.
  • 3
    Salesforce Shield Reviews

    Salesforce Shield

    Salesforce

    $25 per month
    Safeguard your most crucial data at rest across all Salesforce applications by implementing platform encryption. Utilize AES 256-bit encryption to maintain data confidentiality effectively. You have the option to bring your own encryption keys, allowing you to oversee the entire key lifecycle. This approach ensures that sensitive information is protected from any Salesforce users, including administrators. Furthermore, you can satisfy regulatory compliance requirements with ease. Gain insights into who is accessing vital business information, along with the time and location of access, through robust event monitoring. You can actively track significant events in real-time or refer to log files as needed. To mitigate data loss, establish transaction security policies that provide an additional layer of protection. Identify potential insider threats and generate reports on any anomalies detected. Conduct thorough audits of user behavior and evaluate the performance of custom applications. Create a comprehensive forensic data-level audit trail that can retain information for up to a decade, and set alerts for instances of data deletion. Enhance your tracking capabilities for both standard and custom objects, while also benefiting from extended data retention options for purposes such as audit, analysis, or machine learning applications. Lastly, automate archiving processes to ensure compliance with regulatory requirements seamlessly. This multifaceted approach not only strengthens your data security but also bolsters your overall compliance strategy.
  • 4
    SendSafely Reviews

    SendSafely

    SendSafely

    $11.50/user/month
    SendSafely is a comprehensive end-to-end encryption solution tailored for contemporary businesses. It allows for the effortless sharing of encrypted files and sensitive information across any device, simplifying secure file exchanges. With a focus on security, it is trusted by prominent brands that prioritize the safeguarding of customer data. The platform is compatible with all major web browsers, requiring no software installation or management of encryption keys. Designed to aid in compliance with essential regulations such as HIPAA, GDPR, and CCPA, SendSafely offers a Business Associate Agreement (BAA) for added assurance. Users can choose from various pre-built integrations or create custom solutions using the developer API. The platform includes business-specific features like user management, single sign-on, and options for custom branding. Furthermore, SendSafely connects seamlessly with numerous popular third-party systems, enhancing them with end-to-end encryption. This capability allows businesses to incorporate encryption into their existing workflows, thus extending the functionality of their current applications and infrastructure. In today’s digital landscape, ensuring the security of data exchange is not just a necessity, but a vital component of maintaining trust with clients.
  • 5
    OPAQUE Reviews

    OPAQUE

    OPAQUE Systems

    OPAQUE Systems delivers a cutting-edge confidential AI platform designed to unlock the full potential of AI on sensitive enterprise data while maintaining strict security and compliance. By combining confidential computing with hardware root of trust and cryptographic attestation, OPAQUE ensures AI workflows on encrypted data are secure, auditable, and policy-compliant. The platform supports popular AI frameworks such as Python and Spark, enabling seamless integration into existing environments with no disruption or retraining required. Its turnkey retrieval-augmented generation (RAG) workflows allow teams to accelerate time-to-value by 4-5x and reduce costs by over 60%. OPAQUE’s confidential agents enable secure, scalable AI and machine learning on encrypted datasets, allowing businesses to leverage data that was previously off-limits due to privacy restrictions. Extensive audit logs and attestation provide verifiable trust and governance throughout AI lifecycle management. Leading financial firms like Ant Financial have enhanced their models using OPAQUE’s confidential computing capabilities. This platform transforms AI adoption by balancing innovation with rigorous data protection.
  • 6
    StratoKey Reviews
    StratoKey CASB focuses on securing cloud and SaaS applications through its unique Encryption, Monitoring, Analytics, and Defence (EMAD™) framework. By utilizing StratoKey CASB, businesses can operate securely and adhere to compliance standards in the cloud environment. The platform is designed to be application agnostic and remains unobtrusive for users, enabling employees to utilize their preferred online tools while ensuring the protection of sensitive information. Serving as your vigilant guardian in the cloud, StratoKey offers comprehensive oversight of user interactions with various applications. Additionally, StratoKey's Compliance Control Management (CCM) assists organizations in transitioning from sporadic compliance efforts to a well-organized, structured, and auditable compliance framework. This structured compliance approach is fundamentally enhanced by the principles of Discovery, Automation, Tasking, and Reporting, ensuring that organizations can maintain a robust compliance posture. Ultimately, StratoKey empowers businesses to safeguard their data while embracing the advantages of cloud technologies.
  • Previous
  • You're on page 1
  • Next