The Security Center open on a desktop showing user metrics. A mobile phone showing a mobile security notification is. Astro standing in front, wearing blue armor and holding a security logo.

Data Security Solutions

Secure your Agentforce and Customer 360 with advanced data security controls. Minimize business disruptions while maintaining AI readiness with encryption, tracking of data changes, and quick identification and classification of sensitive data. Effortlessly monitor permissions across multiple organizations and enforce mobile security to safeguard your business.

Join these customers securing their data with Salesforce.

Monitor, encrypt, and classify your Salesforce data.

Salesforce Shield

Prevent undesired events with Event Monitoring. Get detailed security and usage data on all your Salesforce apps to understand who, when, and where data is accessed. Create customized, flexible security policies to block malicious activity, and receive alerts to prevent and mitigate threats.

The Event Monitoring Setting setup window. "View event log data in analytics apps" is selected. A chipmunk and a tree in the background.

Protect your information, even when it's behind the scenes. Encrypt your most sensitive data, including fields, files, attachments, search indexes, and more using Platform Encryption. Manage your own key lifecycle for greater control and flexibility, and follow security best practices with regular key rotations.

The Encryption Policy setup page. Encypt files and attachments, Encrypt chatter, Encrypt search indexes, Encrypt CRM Analytics, Encrypt change data capture events and platform events" are all selected. Bushes and hills in the background.

Stay compliant with regulations, and protect your data while ensuring accuracy with Field Audit Trail. Track granular changes to important fields in your Salesforce records, and automatically create an audit log any time a record is modified, showing what changes were made and when.

The field audit trail and account history windows. Trees and desert mountains in the background.

Find address, and protect sensitive data directly within a simple UI with Data Detect. Locate and classify sensitive data, like credit card or social security numbers, according to your preferences. Explore matched patterns, and view flagged data across all records. Protect customer information to comply with data protection laws and security best practices.

A scan results window displaying data. Desert dunes and a lizard in the background.
The Event Monitoring Setting setup window. "View event log data in analytics apps" is selected. A chipmunk and a tree in the background.
The Encryption Policy setup page. Encypt files and attachments, Encrypt chatter, Encrypt search indexes, Encrypt CRM Analytics, Encrypt change data capture events and platform events" are all selected. Bushes and hills in the background.
The field audit trail and account history windows. Trees and desert mountains in the background.
A scan results window displaying data. Desert dunes and a lizard in the background.

Centrally view, monitor, and manage your security health.

Security Center

Security Center organizes all of your permissions and controls into one dashboard. Quickly identifiy misconfigurations and incorrect user permissions, and eliminate any gaps in your org's security posture. Drill down further for granular details to uncover deeper insights or to prove compliance with regulatory standards.

A user metrics window. Bushes in the foreground and a bumblebee overhead.

Create custom alerts on key permissions and metrics to quickly get notified when changes occur. Swiftly identify new threats as they emerge to reduce security risks and time spent monitoring changes.

An alert setting page. A chipmunk running across the screen.

Configure key security settings once, then deploy them out to your connected Salesforce orgs. Set security policies around session time outs, trusted IP ranges, password configurations, and your health check baseline. Quickly improve your security performance, and ensure your configurations never deviate from your business intent.

The Security Policies page with "Company Standard Session Setting" highlighted. Trees and bushes in the background.
A user metrics window. Bushes in the foreground and a bumblebee overhead.
An alert setting page. A chipmunk running across the screen.
The Security Policies page with "Company Standard Session Setting" highlighted. Trees and bushes in the background.

Secure access management.

Customer Identity

Deliver dynamic customer experiences.

Arrows showing all the things that go in to Salesforce customer identity (Social, connected products, kiosks, websites, email, mobile apps, call centers) with arrows pointing to Sales, Service, Marketing, Community, and Integration. A tall tree on a hill in the background.

Leverage Passwordless login to make registration and access even simpler. Capture mobile-first markets by providing the ability to create an identity with your brand without forcing consumers to juggle yet another password. Customize login pages to reflect your brand, and choose from a variety of verification methods, such as SMS, and Facebook Messenger. As users engage through these new access channels, report on login activities from Salesforce to better understand what new methods are resonating with your customers.

A Fic Coffee sign in page. A turtle swimming in the ocean shore and a beach and mountains in the background and tree branches overhead.

Imagine providing a registration experience that's as smooth as it gets. Users can sign up effortlessly using their social credentials from well-known platforms like Google and Facebook. No more creating yet another password that they'll inevitably forget. This approach not only reduces friction but also elevates the overall user experience.

A Northern Trail sign in page with Facebook and Google sign in options highlighted. A coast line with bushes, sand, bluffs, and a seagull overhead.
Arrows showing all the things that go in to Salesforce customer identity (Social, connected products, kiosks, websites, email, mobile apps, call centers) with arrows pointing to Sales, Service, Marketing, Community, and Integration. A tall tree on a hill in the background.
A Fic Coffee sign in page. A turtle swimming in the ocean shore and a beach and mountains in the background and tree branches overhead.
A Northern Trail sign in page with Facebook and Google sign in options highlighted. A coast line with bushes, sand, bluffs, and a seagull overhead.

Enforce mobile security with mobile app management.

Salesforce Mobile App Plus

Mobile devices are integral to modern work environments, and their usage presents unique security challenges. Enforce organization wide mobile security policies with clear severity levels. Ensure a consistent and robust approach to safeguarding sensitive corporate data and assets. By defining severity levels, organizations can prioritize threats and vulnerabilities, focusing resources and attention on the most critical issues.

A window showing the "Block Jailbroken Devices" function is active. Hills and trees in the background.

Enable IT teams to manage and secure the mobile applications on their employees' devices. Block file sharing and copy/paste capabilities, and specify browser and dialer apps. Defend against malware, phishing attacks, and other cyber threats that can compromise the security of mobile endpoints.

A mobile phone showing the Mobile Security page open. A warning and a critical error are on screen showing that an earlier OS version is required. Treetops in the background.

Meet industry and region-specific regulations and compliance requirements that mandate the protection of sensitive data and data access management audits. Mobile app event capture helps ensure that companies can provide evidence of compliance, which is crucial in sectors like healthcare, finance, and government. Record essential customer actions such as calls, texts, emails, and screenshots to capture events for compliance audit purposes.

An account ID open on a mobile phone and a "text message action logged" notification on screen. A hummingbird flying by and trees in the background.
A window showing the "Block Jailbroken Devices" function is active. Hills and trees in the background.
A mobile phone showing the Mobile Security page open. A warning and a critical error are on screen showing that an earlier OS version is required. Treetops in the background.
An account ID open on a mobile phone and a "text message action logged" notification on screen. A hummingbird flying by and trees in the background.

Get the most out of cloud data security with thousands of partner apps and experts.

Accenture logo.
Deloitte logo.
IBM logo.
Nightfall AI logo.
Validity logo.
Reserve bar logo.
Archiveit logo.
Astro standing on a treestump, wearing a Salesforce t-shirt. Bushes in the background and a hummingbird flying by.

Stay up to date on all things Security & Privacy.

Sign up for our monthly IT newsletter to get the latest research, industry insights, and product news delivered straight to your inbox.

Learn new skills with free, guided learning on Trailhead.

Salesforce Data Security FAQ

Data security software is a set of tools that enable organizations to protect their most important asset: their information. Data security tools protect critical data through processes such as masking, encryption, sensitive data detection, and backups to help enterprises meet regulatory compliance.

It is crucial to employ cloud data security tools to protect against cybersecurity threats, meet regulatory compliance, prevent unwanted costs, and maintain customer trust.

Introducing a data security platform allows your business to meet compliance with an ever-changing regulatory landscape, keep your data protected from potential threats, and ensure the accuracy of your information, and prevent data breaches to ultimately uphold trust among your customer base.

Data security platforms empower enterprises to maintain trust with their customers. This includes preventing internal and external bad actors from compromising sensitive information, and avoiding costly fees for noncompliance with security and privacy regulations.

When evaluating data security tools, select a trusted, scalable platform that meets your organization's specific security needs, such as your industry-specific and standard compliance requirements, data classification, and user access management strategies.

Pricing varies based on each customer's individual needs. Our sales team will work with you to tailor a package that meets your requirements and price considerations, no matter your company's size or industry.