Astro holding the shield logo standing in front of a desktop computer with the Leads page open. "Configure a Key Management Service," "Event Monitoring Settings," and "Scan Results" windows are open. A bush with flowers and a flying bird in thebackground.

Salesforce Shield

Protect your enterprise against cybersecurity attacks, meet changing data privacy regulations and ensure your business is AI-ready with Salesforce Shield. Employ this powerful suite of products to monitor internal and external threats, and help navigate compliance while protecting your most valuable asset: sensitive and critical customer data. Retain historical data, manage data encryption, and find and classify sensitive data quickly.

Industry-leading brands secure their critical data with Salesforce Shield.

Mitigate threats, drive adoption, and understand performance with Event Monitoring.

Track and audit behavior by monitoring security, tracking application performance, and gleaning product intelligence insights using event logs. Add visibility into Salesforce data by viewing and downloading events on a daily or hourly basis. Fifty-four API accessible events include logins/logouts, API calls, report exports, Apex executions, page loads, user interactions, and more.

The Setup page open on a desktop computer, and an "Event Monitoring Settings" window open. Grass and trees in the background.

Protect sensitive data from both internal and external threats with custom security policies created with clicks or code. Automatically block risky user actions, and prevent data loss before it occurs with use case-specific policies. Receive real-time notifications to any potential threats to respond with speed.

The Setup page open on a desktop computer, and a "Transaction Security Policies" window open. Bushes and flowers in the background.

Monitor user behavior in near real-time by choosing from a list of relevant event types. Proactively find security threats in your Salesforce orgs using automation, and respond to threats quickly based on events. Stay on top of compliance requirements, and respond to audits with ease by storing and querying event data using SOQL.

The Setup page open on a desktop computer, and an "Event Manager" window open. Grass and a hummingbird in the background.
The Setup page open on a desktop computer, and an "Event Monitoring Settings" window open. Grass and trees in the background.
The Setup page open on a desktop computer, and a "Transaction Security Policies" window open. Bushes and flowers in the background.
The Setup page open on a desktop computer, and an "Event Manager" window open. Grass and a hummingbird in the background.

Encrypt sensitive data with Platform Encryption.

Set encryption policies to protect your most sensitive data and maintain regulatory compliance. Easily point and click to select the data you’d like to encrypt, including fields, files, attachments, search indexes, and more.

The Setup page on a desktop computer, with an Encryption Policy window open. Trees and hills in the background.

Manage your own key lifecycle for greater control and flexibility and to meet data security requirements. You have the flexibility to bring your own keys (BYOK), rotate keys, and store keys outside of Salesforce starting with AWS.

The Setup page open on a desktop computer with a "Key Management" window open. Trees and a bumble bee in the background.

Platform Encryption has now been extended to Data Cloud, allowing you to encrypt your Data Cloud data with Shield keys. You can view, rotate, and audit your encryption keys, providing enhanced control and security over your data.

The Setup page open on a desktop computer with an "Encryption Settings" window open. Treetops and a butterfly in the background.
The Setup page on a desktop computer, with an Encryption Policy window open. Trees and hills in the background.
The Setup page open on a desktop computer with a "Key Management" window open. Trees and a bumble bee in the background.
The Setup page open on a desktop computer with an "Encryption Settings" window open. Treetops and a butterfly in the background.

Strengthen data integrity for extended history with Field Audit Trail.

Tailor field history tracking to align seamlessly with your business needs by monitoring only the specific fields you choose. Easily configure tracking with point-and-click setup to understand, analyze, and audit critical information from creation to the latest update.

And "Account History" window open on a desktop computer. A group of trees in the foreground.

Demonstrate compliance during audits with records of field-level changes. View the history of changes made to tracked fields, including who made the changes, when, and what changes were made. Easily roll back accidental data changes to original values.

The setup page open on a desktop computer with the "Lead Field History" window open and options to track old and new values. Hills and trees in the background.

Strengthen data integrity for compliance and visibility with data retention policies. Generate greater operational insights into your business by retaining data indefinitely. Easily delete data when retention is no longer necessary.

A "Field Audit Trail" window open with a contact popup overhead. Treetops in the background.
And "Account History" window open on a desktop computer. A group of trees in the foreground.
The setup page open on a desktop computer with the "Lead Field History" window open and options to track old and new values. Hills and trees in the background.
A "Field Audit Trail" window open with a contact popup overhead. Treetops in the background.

Find and classify sensitive information quickly with Data Detect.

Use pattern matching to easily locate sensitive information, like email addresses, credit card numbers, social security numbers, URLs, and IP addresses, in your Salesforce orgs. Find PII in unexpected or unwanted places, such as in single-purpose fields that aren’t properly classified and free-form text fields that expose private data. Access insights to establish a deeper understanding of your data governance posture.

The "Data Detect" page open showing scan results. A tree, sand, and a lizard in the background.

Explore matched patterns, and view sensitive data across all records to get a granular view of what type of information lives where. Use these insights to take action and clean up records for improved compliance. Classify or reclassify data at the field level based on data sensitivity, as well as compliance category.

The "Data Detect" page open on a desktop computer with a "Records Scanned per Object" window showing statistics. Hills and trees in the foreground and background.

Increase control over your data and stay compliant by applying granular controls around classified information. Update classification tags to comply with data protection laws and security best practices. Prevent users from making data entry mistakes, and proactively protect consumer information to maintain customer trust.

The "Data Detect" page open on a desktop computer with a "Data Detect Policies" window open. An animated fox in the foreground and trees in the background.
The "Data Detect" page open showing scan results. A tree, sand, and a lizard in the background.
The "Data Detect" page open on a desktop computer with a "Records Scanned per Object" window showing statistics. Hills and trees in the foreground and background.
The "Data Detect" page open on a desktop computer with a "Data Detect Policies" window open. An animated fox in the foreground and trees in the background.
A smiling woman sitting in front of a computer chats with a support representative.

Everything you need to maximize ROI.

From support, expert guidance, and resources to our trusted partner ecosystem, we’re here to help you get more value from Salesforce in the AI era.

Astro standing on a treestump, wearing a Salesforce t-shirt. Bushes in the background and a hummingbird flying by.

Stay up to date on all things security and privacy.

Sign up for our monthly IT newsletter to get the latest research, industry insights, and product news delivered straight to your inbox.

Learn new skills with free, guided learning on Trailhead.

Shield FAQ

Salesforce Shield is a suite of four products that exist for organizations who need a level of security and protection above and beyond the security that’s baked into the platform. These products help businesses meet compliance and industry regulatory requirements, monitor access to sensitive information stored in Salesforce, report on unauthorized or undesired activity, manage encryption keys for advanced security, and find and classify sensitive data with speed.

Data loss prevention solutions allow organizations of all sizes to monitor data access and usage, and ultimately uphold customer trust by protecting sensitive data from internal and external threats. This includes proactively identifying and mitigating potential data breaches, intellectual property theft, and unauthorized data access.

Salesforce Shield is a great fit for organizations looking to introduce an added level of security and protection beyond what is built into the platform. We’ve built robust, innovative solutions like Shield to help our customers prepare for evolving threats and demonstrate a proactive data strategy to, in turn, prioritize their customers' trust. This includes understanding unique compliance requirements, auditing and monitoring sensitive data to ensure it's accessible by the right people at the right time, and protecting critical information.

Data loss prevention solutions enable organizations to meet compliance and industry regulations, protect their brand and uphold customer trust by employing custom security policies that protect sensitive data from internal and external threats.

To select the right data loss prevention solution for your organization, focus on your specific security needs, including any industry-specific or compliance regulations to which your business may need to adhere, as well as data classification needs and user access management strategies. Choose a trusted, scalable platform that introduces comprehensive security for your sensitive data.

Pricing varies based on each customer's individual needs. Our sales team will work with you to tailor a package that meets your requirements and price considerations, no matter your company's size or industry.