Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Keeper Security Reviews & Ratings
    1,623 Ratings
    Company Website
  • Satori Reviews & Ratings
    86 Ratings
    Company Website
  • Netwrix Auditor Reviews & Ratings
    296 Ratings
    Company Website
  • FireMon Reviews & Ratings
    176 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,052 Ratings
    Company Website
  • Safetica Reviews & Ratings
    358 Ratings
    Company Website
  • Source Defense Reviews & Ratings
    7 Ratings
    Company Website
  • DriveStrike Reviews & Ratings
    23 Ratings
    Company Website
  • CLEAR Reviews & Ratings
    1 Rating
    Company Website

What is Salesforce Shield?

Protect your essential data at rest within all Salesforce applications by deploying platform encryption. Employ AES 256-bit encryption to effectively uphold the confidentiality of your information. You have the flexibility to use your own encryption keys, thereby enabling you to manage the complete key lifecycle. This method guarantees that sensitive data remains secure from any Salesforce users, including those with administrative privileges. Additionally, you can easily meet regulatory compliance obligations. By leveraging comprehensive event monitoring, you can gain visibility into who accesses critical business data, along with details regarding the time and place of access. You have the capability to monitor significant events in real-time or consult log files as necessary. To further guard against data loss, implement transaction security policies that add an extra layer of defense. This will help you detect potential insider threats and produce reports on any unusual activities. Conduct detailed audits of user interactions and assess the performance of custom applications. Develop a thorough forensic data-level audit trail that can preserve information for up to ten years and set alerts for any instances of data deletion. Expand your tracking capabilities for both standard and custom objects, and take advantage of extended data retention options for auditing, analysis, or machine learning purposes. Additionally, streamline your archiving processes to ensure seamless compliance with regulatory standards. This comprehensive strategy not only fortifies your data security but also enhances your overarching compliance framework, ensuring that your organization is well-prepared for any challenges that may arise.

What is Akamai Enterprise Application Access?

Provide select users with customized access to specific applications rather than granting them entry to the entire network, thereby bolstering security protocols. Receive prompt security notifications and risk assessments that automatically protect your applications. Cut down on operational costs and remove the technical burdens linked to managing VPNs and various hardware components. Smoothly manage mergers, acquisitions, and contractor access without the need for costly changes to the network's infrastructure. Utilize a diverse array of real-time data signals, which encompass user identification, device security, and threat intelligence, among other factors. In a matter of minutes, you can set up new applications and onboard users through a centralized portal, enhancing efficiency. Gain immediate insights on users and devices thanks to an advanced edge platform, which simplifies operational procedures. By employing a cloud-based service, you can eliminate the necessity of maintaining both virtual and physical devices, thus further optimizing your operations. This strategy not only lowers operational expenses but also strengthens the overall security framework of your applications. Consequently, organizations are able to rapidly adjust to changing security requirements while still preserving their agility, making them more resilient in a dynamic threat landscape. The shift to targeted access and automated security measures fosters a proactive environment where risks are managed effectively.

Media

Media

Integrations Supported

Akamai
Azure Marketplace
Salesforce

Integrations Supported

Akamai
Azure Marketplace
Salesforce

API Availability

Has API

API Availability

Has API

Pricing Information

$25 per month
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Salesforce

Company Location

United States

Company Website

www.salesforce.com/products/platform/products/shield/

Company Facts

Organization Name

Akamai Technologies

Company Location

United States

Company Website

www.akamai.com/products/enterprise-application-access

Categories and Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Categories and Features

Popular Alternatives

Popular Alternatives

qProtect Reviews & Ratings

qProtect

QuintessenceLabs
PK Protect Reviews & Ratings

PK Protect

PKWARE
NetMotion Reviews & Ratings

NetMotion

NetMotion Software
iSecurity Field Encryption Reviews & Ratings

iSecurity Field Encryption

Raz-Lee Security