Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Keeper Security Reviews & Ratings
    1,623 Ratings
    Company Website
  • Satori Reviews & Ratings
    86 Ratings
    Company Website
  • Netwrix Auditor Reviews & Ratings
    296 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    1,051 Ratings
    Company Website
  • Safetica Reviews & Ratings
    356 Ratings
    Company Website
  • Source Defense Reviews & Ratings
    7 Ratings
    Company Website
  • DriveStrike Reviews & Ratings
    23 Ratings
    Company Website
  • CLEAR Reviews & Ratings
    1 Rating
    Company Website
  • Files.com Reviews & Ratings
    239 Ratings
    Company Website

What is Salesforce Shield?

Protect your essential data at rest within all Salesforce applications by deploying platform encryption. Employ AES 256-bit encryption to effectively uphold the confidentiality of your information. You have the flexibility to use your own encryption keys, thereby enabling you to manage the complete key lifecycle. This method guarantees that sensitive data remains secure from any Salesforce users, including those with administrative privileges. Additionally, you can easily meet regulatory compliance obligations. By leveraging comprehensive event monitoring, you can gain visibility into who accesses critical business data, along with details regarding the time and place of access. You have the capability to monitor significant events in real-time or consult log files as necessary. To further guard against data loss, implement transaction security policies that add an extra layer of defense. This will help you detect potential insider threats and produce reports on any unusual activities. Conduct detailed audits of user interactions and assess the performance of custom applications. Develop a thorough forensic data-level audit trail that can preserve information for up to ten years and set alerts for any instances of data deletion. Expand your tracking capabilities for both standard and custom objects, and take advantage of extended data retention options for auditing, analysis, or machine learning purposes. Additionally, streamline your archiving processes to ensure seamless compliance with regulatory standards. This comprehensive strategy not only fortifies your data security but also enhances your overarching compliance framework, ensuring that your organization is well-prepared for any challenges that may arise.

What is DobiProtect?

DobiProtect® empowers businesses to safeguard their critical NAS and object data, regardless of whether it is housed on-site or in the cloud, against an array of threats such as cyberattacks, ransomware, inadvertent loss, and software vulnerabilities. You can rely on consistent support during urgent situations, providing peace of mind. The assurance comes from tangible evidence of complete data integrity, guaranteeing that everything remains exactly as intended. It is compatible with all major storage solutions and cloud services, offering both granular restoration options and full failover capabilities to any selected cloud or storage location. The installation process is swift and the management is user-friendly, aided by an intuitive interface. With a flexible software-only licensing model, you have the freedom to protect as much or as little data as you deem necessary. Each file on your original system is mirrored onto your specified target system, and DobiProtect continuously checks this duplicate to ensure that its contents remain unchanged. Furthermore, any modification made to a file on the source is immediately re-secured to the target, guaranteeing ongoing protection and integrity. This seamless approach not only simplifies data management but also enables businesses to maintain unwavering confidence in their data security strategies, paving the way for enhanced operational resilience.

Media

Media

Integrations Supported

Salesforce

Integrations Supported

Salesforce

API Availability

Has API

API Availability

Has API

Pricing Information

$25 per month
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Salesforce

Company Location

United States

Company Website

www.salesforce.com/products/platform/products/shield/

Company Facts

Organization Name

Datadobi

Date Founded

2010

Company Location

Belgium

Company Website

datadobi.com/protect/

Categories and Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Categories and Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Popular Alternatives

Popular Alternatives

qProtect Reviews & Ratings

qProtect

QuintessenceLabs
PK Protect Reviews & Ratings

PK Protect

PKWARE
iSecurity Field Encryption Reviews & Ratings

iSecurity Field Encryption

Raz-Lee Security