Astro standing in front of the security centre web page, holding the security centre logo and a security overview page open. A small bird is perched on the webpage. Trees and bushes in the background.
New Features

Security Centre 2.0

Security Centre 2.0 organises all of your permissions and controls into one comprehensive view. Quickly identify misconfigurations and incorrect user permissions, eliminating any gaps in your org’s security posture. Drill down further for granular details to uncover deeper insights or address compliance with regulatory standards. Remediate threat exposure with risk assessments that automate the analysis, prioritisation and tracking of all risk. 

Enable Awareness.

Consolidate user permissions to uncover which users have critical system permissions, like View All Data or Modify All Data. Quickly identify over-permissioned users and revoke access to eliminate any gaps in your org’s security posture. Easily track any changes to your key system permissions.

A page labelled "Permissions" with tabs beneath to review and modify user, data and application permissions.

Reduce security risks by drilling down further for granular details to uncover deeper insights or prove compliance with regulatory standards. Identify users who should have their access revoked, such as contractors or third parties. Double click into how people are logging into your orgs and fix any security gaps.

User Activity and Authentication

Uncover potential vulnerabilities, wherever they may be in Salesforce. Monitor your licensing usage, Security Health Check score and which packages and connected apps are installed. Ensure your configurations never deviate from your business intent.

Configurations

Identify where sensitive information exists in Salesforce, which is crucial to understanding your risk profile. Quickly search and filter your data with pre-built classification templates that help you to identify common field types (public fields, system fields, high-risk fields, etc). Leverage advanced filtering to zero-in on unclassified fields and bulk classify with one click.

Data classification
A page labelled "Permissions" with tabs beneath to review and modify user, data and application permissions.
User Activity and Authentication
Configurations
Data classification
Alerts.

Drive Insights.

Set up Customised Alerts.

Quickly identify when changes to your key permissions and metrics occur. Create notifications on 60+ metrics to be proactively notified when your security posture changes. Enhance your security posture while reducing time spent on monitoring changes by staying ahead of any potential issues.

Empower Actions.

Set up critical configurations once and effortlessly deploy them across your connected Salesforce orgs. Define policies related to session time-outs, trusted IP ranges, password configurations and your health check baseline. Streamline and standardise key security settings for a seamless and robust security infrastructure. 

A page labelled "Permissions" with tabs beneath to review and modify user, data and application permissions.

Meet your risk management goals. Automated risk assessments identify and prioritise threats based on out of the box recommended thresholds and your organisation's unique risk tolerance, providing prescriptive guidance for risk remediation.

Risk Intelligence
A page labelled "Permissions" with tabs beneath to review and modify user, data and application permissions.
Risk Intelligence
A smiling woman sitting in front of a computer chats with a support representative.

Maximise ROI with the #1 Success Ecosystem.

From support, expert guidance and resources to our partners on AppExchange, the Success Ecosystem is here to help you unlock the full power of your investment.

Astro in a Salesforce shirt showing a tablet screen that shows the newsletter.

Stay up to date on all things security.

Sign up for our monthly IT newsletter to get the latest research, industry insights and product news delivered straight to your inbox.

Security Centre 2.0 FAQs

Security Centre is a native add-on product for Salesforce, designed to streamline security management, reduce risk and data security across one or more orgs, by making sure they have a solid understanding of their security posture. It gathers detailed metrics on configurations, authentication, user permissions and activity, compiled in intuitive dashboards within Salesforce to help customers drive insights for improvement where necessary. Automated risk assessments identify and prioritise threats based on both out of the box recommended thresholds and your organisation's own unique risk tolerance. In-app guidance provides context and prescriptive risk remediation steps. Security Centre enables proactive alerts for security posture changes and supports the creation of security policies for consistent deployment across connected Salesforce orgs.

Information security management solutions allow organisations of all sizes to monitor data access and user activity to enhance data governance. This includes proactively identifying and preventing internal and external threats including potential data breaches, intellectual property theft and unauthorised data access.

Salesforce Security Centre 2.0 is a great fit for organisations focused on implementing tight security practices like principle of least privilege (PoLP) where employees only have access to the data they need to do their job. Information security management software like Salesforce Shield and Security Centre are critical ways to help you to understand, protect and monitor your business-critical data.

Salesforce Security Centre 2.0 helps enable organisations address compliance and industry regulations, protect their brand and uphold customer trust by simplifying security and data management across their entire business roll-out to protect sensitive data.

To select the right information security management software, focus on your specific security needs critical to your organisation and within your industry. Prioritise changes that help you to address the most critical regulations that are relevant to you. Finally, choose a deeply unified platform with comprehensive security controls that allow you to implement industry best practices.

Pricing varies based on each customer's individual needs. Our sales team will work with you to tailor a package that meets your requirements and price considerations, no matter your company's size or industry.