The Security Center open on a desktop showing user metrics. A mobile phone showing a mobile security notification is. Astro standing in front, wearing blue armor and holding a security logo.

Data Security

Minimize business disruptions while maintaining AI readiness with encryption, tracking of changes, and quick identification and classification of sensitive data. Effortlessly monitor permissions across multiple organizations, create and restore backups in the event of errors, and reinforce resilience against threats.

Join these customers securing their data with Salesforce.

Explore Data Security Solutions

Monitor, encrypt, and classify your Saleforce data.

Salesforce Shield

Prevent undesired events with Event Monitoring. Get detailed security and usage data on all your Salesforce apps to understand who, when, and where data is accessed. Create customized, flexible security policies to block malicious activity, and receive alerts to prevent and mitigate threats.

The Event Monitoring Setting setup window. "View event log data in analytics apps" is selected. A chipmunk and a tree in the background.

Protect your information, even when it's behind the scenes. Encrypt your most sensitive data, including fields, files, attachments, search indexes, and more using Platform Encryption. Manage your own key lifecycle for greater control and flexibility, and follow security best practices with regular key rotations.

The Encryption Policy setup page. Encypt files and attachments, Encrypt chatter, Encrypt search indexes, Encrypt CRM Analytics, Encrypt change data capture events and platform events" are all selected. Bushes and hills in the background.

Stay compliant with regulations, and protect your data while ensuring accuracy with Field Audit Trail. Track granular changes to important fields in your Salesforce records, and automatically create an audit log any time a record is modified, showing what changes were made and when.

The field audit trail and account history windows. Trees and desert mountains in the background.

Find address, and protect sensitive data directly within a simple UI with Data Detect. Locate and classify sensitive data, like credit card or social security numbers, according to your preferences. Explore matched patterns, and view flagged data across all records. Protect customer information to comply with data protection laws and security best practices.

A scan results window displaying data. Desert dunes and a lizard in the background.
The Event Monitoring Setting setup window. "View event log data in analytics apps" is selected. A chipmunk and a tree in the background.
The Encryption Policy setup page. Encypt files and attachments, Encrypt chatter, Encrypt search indexes, Encrypt CRM Analytics, Encrypt change data capture events and platform events" are all selected. Bushes and hills in the background.
The field audit trail and account history windows. Trees and desert mountains in the background.
A scan results window displaying data. Desert dunes and a lizard in the background.

Centrally view, monitor, and manage your security health.

Security Center

Security Center organizes all of your permissions and controls into one dashboard. Quickly identifiy misconfigurations and incorrect user permissions, and eliminate any gaps in your org's security posture. Drill down further for granular details to uncover deeper insights or to prove compliance with regulatory standards.

A user metrics window. Bushes in the foreground and a bumblebee overhead.

Create custom alerts on key permissions and metrics to quickly get notified when changes occur. Swiftly identify new threats as they emerge to reduce security risks and time spent monitoring changes.

An alert setting page. A chipmunk runnning across the screen.

Configure key security settings once, then deploy them out to your connected Salesforce orgs. Set security policies around session time outs, trusted IP ranges, password configurations, and your health check baseline. Quickly improve your security performance, and ensure your configurations never deviate from your business intent.

The Security Policies page with "Company Standard Session Setting" highlighted. Trees and bushes in the background.
A user metrics window. Bushes in the foreground and a bumblebee overhead.
An alert setting page. A chipmunk runnning across the screen.
The Security Policies page with "Company Standard Session Setting" highlighted. Trees and bushes in the background.

Protect your organization against data loss and corruption.

Salesforce Backup

Salesforce Backup is our native solution for safeguarding your critical Salesforce data. Set up and configure your backup policies in minutes to ensure that your valuable information is protected with ease. Find peace of mind knowing that your data is safeguarded within the Salesforce Trust Boundary.

The Backup and Restore page open with a Log Quick View window highlighted. Hills and trees in the background.

Quickly recover your crucial data to ensure operational continuity without unnecessary delays. Explore and preview backups at your convenience, and effortlessly export your valuable information. Minimize data disruption by restoring data with a few clicks – all in an intuitive, admin-friendly interface.

A page labeled: "Step 1: Choose Objects and Records from a Backup."

Empower your organization to prevent the impact of permanent data loss from external cybersecurity attacks and internal human errors. Ensure uninterrupted access to critical data, meet compliance and legal requirements, and seamlessly navigate system upgrades and migrations with peace of mind.

The Backup Policy Configuration window showing all active configurations. Mountains in the background.
The Backup and Restore page open with a Log Quick View window highlighted. Hills and trees in the background.
A page labeled: "Step 1: Choose Objects and Records from a Backup."
The Backup Policy Configuration window showing all active configurations. Mountains in the background.

Mask sensitive data in sandboxes.

Data Mask

Scale your business with trust with Data Mask. Secure sensitive customer data to stay compliant with regulations like GDPR, FINRA, and PCI DSS. Protect your PI and PII data to securely build and customize with a 100% native approach.

The configure masking page with a window of action items and a mountain in the background.

Obfuscate some or all sensitive data with different levels of masking, depending on the sensitivity of your data. Leverage built-in field definitions to anonymize, pseudonymize, pattern-match, or delete data. With record filtering, you can quickly target specific data records for masking to meet business requirements and security goals.

The Mask Builder page with a mask naming window open. A bumblebee flying by and hills in the background.

Ensure development teams only see relevant data when they’re building, not sensitive data that could be used dangerously if it falls in the wrong hands. Introduce masking in Sandboxes to empower teams to build and test faster with realistic data when delivering apps. Increase developer productivity while maintaining a secure testing environment.

A Job Detail window with the summary tab open. A tree, tree stump, and bumblebee in the background.
The configure masking page with a window of action items and a mountain in the background.
The Mask Builder page with a mask naming window open. A bumblebee flying by and hills in the background.
A Job Detail window with the summary tab open. A tree, tree stump, and bumblebee in the background.

Enforce mobile security with mobile app management.

Salesforce Mobile App Plus

Mobile devices are integral to modern work environments, and their usage presents unique security challenges. Enforce organization wide mobile security policies with clear severity levels. Ensure a consistent and robust approach to safeguarding sensitive corporate data and assets. By defining severity levels, organizations can prioritize threats and vulnerabilities, focusing resources and attention on the most critical issues.

A window showing the "Block Jailbroken Devices" function is active. Hills and trees in the background.

Enable IT teams to manage and secure the mobile applications on their employees' devices. Block file sharing and copy/paste capabilities, and specify browser and dialer apps. Defend against malware, phishing attacks, and other cyber threats that can compromise the security of mobile endpoints.

A mobile phone showing the Mobile Security page open. A warning and a critical error are on screen showing that an earlier OS version is required. Treetops in the background.

Meet industry and region-specific regulations and compliance requirements that mandate the protection of sensitive data and data access management audits. Mobile app event capture helps ensure that companies can provide evidence of compliance, which is crucial in sectors like healthcare, finance, and government. Record essential customer actions such as calls, texts, emails, and screenshots to capture events for compliance audit purposes.

An account ID open on a mobile phone and a "text message action logged" notification on screen. A hummingbird flying by and trees in the background.
A window showing the "Block Jailbroken Devices" function is active. Hills and trees in the background.
A mobile phone showing the Mobile Security page open. A warning and a critical error are on screen showing that an earlier OS version is required. Treetops in the background.
An account ID open on a mobile phone and a "text message action logged" notification on screen. A hummingbird flying by and trees in the background.

Get the most out of cloud data security with thousands of partner apps and experts.

Accenture logo.
Deloitte logo.
IBM logo.
Nightfall AI logo.
Validity logo.
Reserve bar logo.
Archiveit logo.
Astro standing on a treestump, wearing a Salesforce t-shirt. Bushes in the background and a hummingbird flying by.

Stay up to date on all things Security & Privacy.

Sign up for our monthly IT newsletter to get the latest research, industry insights, and product news delivered straight to your inbox.

Learn new skills with free, guided learning on Trailhead.

Salesforce Data Security FAQ

Data security software is a set of tools that enable organizations to protect their most important asset: their information. Data security tools protect critical data through processes such as masking, encryption, sensitive data detection, and backups to help enterprises meet regulatory compliance.

It is crucial to employ cloud data security tools to protect against cybersecurity threats, meet regulatory compliance, prevent unwanted costs, and maintain customer trust.

Introducing a data security platform allows your business to meet compliance with an ever-changing regulatory landscape, keep your data protected from potential threats, and ensure the accuracy of your information, and prevent data breaches to ultimately uphold trust among your customer base.

Data security platforms empower enterprises to maintain trust with their customers. This includes preventing internal and external bad actors from compromising sensitive information, and avoiding costly fees for noncompliance with security and privacy regulations.

When evaluating data security tools, select a trusted, scalable platform that meets your organization's specific security needs, such as your industry-specific and standard compliance requirements, data classification, and user access management strategies.

Pricing varies based on each customer's individual needs. Our sales team will work with you to tailor a package that meets your requirements and price considerations, no matter your company's size or industry.