Astro standing in front of the security center web page, holding the security center logo, and a security overview page open. A small bird is perched on the webpage. Trees and bushes in the background.
New Features

Security Center 2.0

Security Center 2.0 organizes all of your permissions and controls into one comprehensive view. Quickly identify misconfigurations and incorrect user permissions, eliminating any gaps in your org’s security posture. Drill down further for granular details to uncover deeper insights or address compliance with regulatory standards. Remediate threat exposure with risk assessments that automate the analysis, prioritization, and tracking of all risk. 

Enable Awareness.

Consolidate user permissions to uncover which users have critical system permissions, like View All Data or Modify All Data. Quickly identify over-permissioned users and revoke access to eliminate any gaps in your org’s security posture. Easily track any changes to your key system permissions.

A page labeled "Permissions" with tabs beneath to review and modify user, data, and application permissions.

Reduce security risks by drilling down further for granular details to uncover deeper insights or prove compliance with regulatory standards. Identify users who should have their access revoked, such as contractors or third parties. Double click into how people are logging into your orgs and fix any security gaps.

User Activity and Authentication

Uncover potential vulnerabilities, wherever they may be in Salesforce. Monitor your licensing usage, Security Health Check score, and which packages and connected apps are installed. Ensure your configurations never deviate from your business intent.

Configurations

Identify where sensitive information exists in Salesforce, which is crucial to understanding your risk profile. Quickly search and filter your data with pre-built classification templates that help you identify common field types (public fields, system fields, high-risk fields, etc). Leverage advanced filtering to zero-in on unclassified fields and bulk classify with one click.

Data classification
A page labeled "Permissions" with tabs beneath to review and modify user, data, and application permissions.
User Activity and Authentication
Configurations
Data classification
Alerts.

Drive Insights.

Set up Custom Alerts.

Quickly identify when changes to your key permissions and metrics occur. Create notifications on 60+ metrics to be proactively notified when your security posture changes. Enhance your security posture while reducing time spent on monitoring changes by staying ahead of any potential issues.

Empower Actions.

Set up critical configurations once and effortlessly deploy them across your connected Salesforce orgs. Define policies related to session timeouts, trusted IP ranges, password configurations, and your health check baseline. Streamline and standardize key security settings for a seamless and robust security infrastructure. 

A page labeled "Permissions" with tabs beneath to review and modify user, data, and application permissions.

Meet your risk management goals. Automated risk assessments identify and prioritize threats based on out of the box recommended thresholds and your organization's unique risk tolerance, providing prescriptive guidance for risk remediation.

Risk Intelligence
A page labeled "Permissions" with tabs beneath to review and modify user, data, and application permissions.
Risk Intelligence
A smiling woman sitting in front of a computer chats with a support representative.

Maximize ROI with the #1 Success Ecosystem.

From support, expert guidance, and resources to our partners on AppExchange, the Success Ecosystem is here to help you unlock the full power of your investment.

Astro in a Salesforce shirt showing a tablet screen that shows the newsletter.

Stay up to date on all things security.

Sign up for our monthly IT newsletter to get the latest research, industry insights, and product news delivered straight to your inbox.

Security Center 2.0 FAQ

Security Center is a native add-on product for Salesforce, designed to streamline security management, reduce risk, and data security across one or more orgs, by making sure they have a solid understanding of their security posture. It gathers detailed metrics on configurations, authentication, user permissions and activity, compiled in intuitive dashboards within Salesforce to help customers drive insights for improvement where necessary. Automated risk assessments identify and prioritize threats based on both out of the box recommended thresholds and your organization's own unique risk tolerance. In-app guidance provides context and prescriptive risk remediation steps. Security Center enables proactive alerts for security posture changes and supports the creation of security policies for consistent deployment across connected Salesforce orgs.

Information security management solutions allow organizations of all sizes to monitor data access and user activity to enhance data governance. This includes proactively identifying and preventing internal and external threats including potential data breaches, intellectual property theft, and unauthorized data access.

Salesforce Security Center 2.0 is a great fit for organizations focused on implementing tight security practices like principle of least privilege (PoLP) where employees only have access to the data they need to do their job. Information security management software like Salesforce Shield and Security Center are critical ways to help you understand, protect, and monitor your business-critical data.

Salesforce Security Center 2.0 helps enable organizations address compliance and industry regulations, protect their brand and uphold customer trust by simplifying security and data management across their entire business rollout to protect sensitive data.

To select the right information security management software, focus on your specific security needs critical to your organization and within your industry. Prioritize changes that help you address the most critical regulations that are relevant to you. Finally, choose a deeply unified platform with comprehensive security controls that allow you to implement industry best practices.

Pricing varies based on each customer's individual needs. Our sales team will work with you to tailor a package that meets your requirements and price considerations, no matter your company's size or industry.