Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Keeper Security Reviews & Ratings
    1,623 Ratings
    Company Website
  • Satori Reviews & Ratings
    86 Ratings
    Company Website
  • Netwrix Auditor Reviews & Ratings
    296 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    1,051 Ratings
    Company Website
  • Safetica Reviews & Ratings
    356 Ratings
    Company Website
  • Source Defense Reviews & Ratings
    7 Ratings
    Company Website
  • DriveStrike Reviews & Ratings
    23 Ratings
    Company Website
  • CLEAR Reviews & Ratings
    1 Rating
    Company Website
  • Files.com Reviews & Ratings
    239 Ratings
    Company Website

What is Salesforce Shield?

Protect your essential data at rest within all Salesforce applications by deploying platform encryption. Employ AES 256-bit encryption to effectively uphold the confidentiality of your information. You have the flexibility to use your own encryption keys, thereby enabling you to manage the complete key lifecycle. This method guarantees that sensitive data remains secure from any Salesforce users, including those with administrative privileges. Additionally, you can easily meet regulatory compliance obligations. By leveraging comprehensive event monitoring, you can gain visibility into who accesses critical business data, along with details regarding the time and place of access. You have the capability to monitor significant events in real-time or consult log files as necessary. To further guard against data loss, implement transaction security policies that add an extra layer of defense. This will help you detect potential insider threats and produce reports on any unusual activities. Conduct detailed audits of user interactions and assess the performance of custom applications. Develop a thorough forensic data-level audit trail that can preserve information for up to ten years and set alerts for any instances of data deletion. Expand your tracking capabilities for both standard and custom objects, and take advantage of extended data retention options for auditing, analysis, or machine learning purposes. Additionally, streamline your archiving processes to ensure seamless compliance with regulatory standards. This comprehensive strategy not only fortifies your data security but also enhances your overarching compliance framework, ensuring that your organization is well-prepared for any challenges that may arise.

What is BerryTMS?

Optimize and consolidate the management of security fleets with BerryTMS, covering initialization, deployment, and user access rights. The implementation of multi-factor authentication and a "zero trust" strategy requires the incorporation of security keys, which are compatible with various protocols and enable "passwordless" authentication methods that provide superior security and efficiency compared to conventional approaches. However, the adoption of these authentication systems involving physical tokens raises important considerations for their lifecycle management, starting from setup through to deployment and continuous oversight of the fleet. Effortlessly and securely implement security keys on a large scale while efficiently handling the lifecycle of the various credentials they encompass. Acquire a thorough understanding of key usage across your organization, while also managing your keys remotely to ensure secure user enrollment processes. Select the enrollment option that fits your requirements best, whether it is remote, in-person, or specifically for VIPs, allowing for both flexibility and security in your strategy. Furthermore, this centralized management framework provides the capability for real-time monitoring and swift modifications to security protocols as organizational needs change, ensuring that your security measures remain robust and adaptive. The dynamic nature of this system empowers organizations to stay ahead of potential security challenges.

Media

Media

Integrations Supported

Salesforce

Integrations Supported

Salesforce

API Availability

Has API

API Availability

Has API

Pricing Information

$25 per month
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Salesforce

Company Location

United States

Company Website

www.salesforce.com/products/platform/products/shield/

Company Facts

Organization Name

DigitalBerry

Company Location

France

Company Website

www.digitalberry.fr/en/solution/berrytms-token-management-solution/

Categories and Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Categories and Features

Popular Alternatives

Popular Alternatives

qProtect Reviews & Ratings

qProtect

QuintessenceLabs
PK Protect Reviews & Ratings

PK Protect

PKWARE
iSecurity Field Encryption Reviews & Ratings

iSecurity Field Encryption

Raz-Lee Security
HashiCorp Vault Reviews & Ratings

HashiCorp Vault

HashiCorp