Home » Spin.AI Blog » Cybersecurity » Salesforce » Salesforce Shield: a Comprehensive Overview for SMBs
August 19, 2022 | Updated on: April 11, 2024 | Reading time 11 minutes

Salesforce Shield: a Comprehensive Overview for SMBs

Avatar photo

Product Manager

Salesforce Shield is a powerful security tool by Salesforce. In this article, we review the tool from the standpoint of small and medium businesses. Here is a summary of the tool’s features, pricing, customer rankings, and pros and cons of the solution.

What is Salesforce Shield?

Salesforce Shield is a security tool for Salesforce CRM encompassing three solutions: Event Monitoring, Field Audit Trail, and Platform Encryption. A business can purchase any of these solutions separately or the three of them together.
The solution enables companies to achieve several goals:

  • Data security
  • Compliance
  • Governance
  • Transparency

Salesforce Shield provides an advanced data encryption solution and enables data and app monitoring. With it, you can automate your security policies and audit compliance. Its features include:

  • Multi-Factor Authentication
  • Access Management
  • Mobile Device Management
  • Device Control
  • Database Management
  • Data Encryption
  • Data tracking
  • Engagement tracking
  • Data history
  • Encryption keys
  • Multi-tenant
  • Remote data access
  • Transaction security
  • Field audit trail
  • Data triggers
  • Data archive & storage
  • Data permission
  • Event monitoring
  • Platform encryption

For more information on the key features of Salesforce Shield, please go to the article’s next section.


Salesforce Shield pricing depends on 2 main factors: the number of components you purchase and your business’ “net spend.” Salesforce defines the latter as the amount of money you spend on “other applicable, technically compatible Salesforce products.”

Thus the cost will be calculated as a percentage of your net spend as follows:

  • Event Monitoring – 10%
  • Field Audit Trail – 10%
  • Platform Encryption – 20%
  • Salesforce Shield – 30%

The solution’s cost will change based on buying or stopping SF products and increasing/decreasing the number of users. It will also depend on any changes in the price of the abovementioned products.

Thus, there’s a high probability that the Salesforce event monitoring cost will grow as business ‘engagement’ in the Salesforce environment tends to increase over time. And so are the product prices.
Three tips on how to reduce the price of Salesforce Shield:

  • Negotiate lower prices for Salesforce products.
  • Negotiate a lower percentage for your business from the start.
  • Make sure that you fix the percentage in your agreement with Salesforce.

Shield Platform Ratings

On G2 the tool received mostly positive feedback from small and medium-sized companies. Most find it a valuable security solution. The mentioned drawbacks were the use complexity and somewhat slow performance.

Salesforce Shield review

Overall G2 reviews are positive:

  • ease of use 7.8
  • quality of support 8.1
  • ease of setup 8.5.

According to Grid Report for Mobile Data Security Summer 2022, the users estimate Salesforce Shield features for Mobile Data Security as follows:

  • Access Management 77%
  • At-Risk Analysis 83%
  • Multi-Factor Authentication 87%

This list is not complete. Please, find the whole report here.

The website comparecamp.com gives it an 8.8 score based on the following criteria: features, ease of use, customer support, and value for money. Another website, financesonline.com, gives a similar estimation scoring the Shield 8.8.

The functionality of the solution

In this section, we’ll take a closer look at the Shield Platform features.

Shield Platform Encryption

This feature encrypts your Salesforce data across all the applications. The encryption doesn’t impact the performance of essential functionality like search. The Admins have full control over the encryption keys.
The key goal is to secure your data and achieve compliance with existing rules and regulations.

Salesforce Shield vs. Classic Encryption

Classic encryption is the feature of a base Salesforce license. Why does your business need additional encryption?
In the screenshot below, you can see the comparison table between Salesforce Shield Encryption vs. Classic Encryption.

Salesforce Shield vs classic encryption

We’d like to point out the features that Classical encryption doesn’t have:

  • HSM-based Key Derivation
  • Manage Encryption Keys Permission
  • Encrypted Standard Fields
  • Encrypt Existing Fields for Supported Custom Field Types
  • Search (UI, Partial Search, Lookups, Certain SOSL Queries)
  • Available in Workflow Rules and Workflow Field Updates
  • Available in Approval Process Entry Criteria and Approval Step Criteria

Also keep in mind that the basic version has encryption limitations to the dedicated custom field type, limited to 175 characters.

At the same time Shield doesn’t have the following features:

  • Masking (so that your users can’t see certain types of data like CCN)
  • Checkmark Mask Types and Characters
  • Checkmark View Encrypted Data Permission Required to Read Encrypted Field Values

At first glance, this functionality seems unnecessary for SMBs. The common perception is that usually, it is the enterprises that become the targets of cybercriminals. However, we need to point out one important thing to consider.

Recently we’ve seen a shift in cybercrime victims. Cybercriminals understand that usually enterprises have resources to protect their IT systems. Meanwhile small and medium businesses catering to these companies are not as protected. SMBs become a popular target because of the data they might possess. It is important to protect that data.
That’s why we believe that SMBs need data encryption functionality.

Real-Time Event Monitoring

This functionality uses API to enable you to track the number of significant events that might signify a cybersecurity incident. It can also help understand how your apps are adopted or how performance can be improved. You’ll need data visualization tools to use this data more efficiently.

The monitoring tracks up to 50 types of events, including:

  • Access to business-critical data (which user, when, from where)
  • Data usage in Salesforce applications
  • Logins in Salesforce
  • Search within the apps
  • Reports

See the full list of events here.

You can use this functionality to enhance security, improve transparency, and boost performance.

This functionality can be tricky in terms of use for SMBs, who often do not have large IT teams, let alone Salesforce administrators. On the other hand, it might provide valuable insights on performance as well as enhance security. So we’d recommend purchasing it.

Field Audit Trail

This functionality enables you to analyze a large data set, set retention policies, and retain your data for 10 years.

Set data retention policies on the following objects: Custom Objects, Accounts, Cases, Contacts, Leads, and Opportunities.

Field Audit Trail vs. Field History Retention

This feature might not be that necessary for SMBs, because they usually do not have large data sets or mandatory periods of data retention. However, it heavily depend on the field you work in.

Pros & Cons of Salesforce Shield

Overall, most customers, as well as independent analysts, give positive feedback to Salesforce Shield emphasizing its multiple advantages. However, no tool is perfect. Thus there are obvious limitations and drawbacks.


1. Achieving compliance
2. Improving data governance and transparency
3. Additional security due to encryption and data monitoring.
4. Improving your retention capabilities.


1. Price that is mostly beyond your control.
2. Because of data encryption, certain functionality may be unavailable for certain users or to all users. Similarly, it will disable certain applications.
3. The encryption doesn’t provide masking for data and you have to implement Field level security.

Is the Shield enough for Salesforce Security?

Salesforce Shield is a great security tool, however, it doesn’t protect your data from all the cybersecurity incidents. One of the most frequent incidents in Salesforce is metadata loss due to a developer’s mistake.

The loss of this data can significantly damage the whole architecture of your pipeline in Salesforce and thus paralyze the operations of your revenue-generating team. Salesforce has several native backup tools. However, they do not match the needs of modern businesses.

These tools do not back up all types of data Learn more from our comprehensive guides on Salesforce Backup and Salesforce Recovery Solutions. We recommend purchasing a third-party Salesforce backup tool like SpinOne.

With SpinOne you can:

  • back up all types of data, including objects, files and metadata
  • back up your sandbox and save hours of developer work
  • set automated daily backups
  • recover data quickly and directly to Salesforce (no CSV files)
  • discover data losses or mistakes with Compare function

Frequently Asked Questions

What are the 4 components of Salesforce Shield?

The 4 components of Salesforce Shield include:

  1. Shield Platform Encryption that allows encrypting sensitive data at rest across all organization’s Salesforce apps.
  2. Real-Time Event Monitoring provides organizations with access to detailed performance, security, and usage data on all their Salesforce apps.
  3. Field Audit Trail monitors the state and value of the organization’s sensitive data for any date and time.
  4. Einstein Data Detect performs scanning orgs for sensitive data and then takes steps to protect it.

What type of encryption is Salesforce Shield?

Salesforce Shield utilizes a robust 256-bit Advanced Encryption Standard (AES) encryption algorithm. This encryption approach offers significant advantages over traditional native encryption. It incorporates features like HSM-based Key Derivation, permissions to manage encryption keys, encryption of standard fields, support for searching (including UI, partial searches, lookups, and specific SOSL queries), and compatibility with various functionalities like Workflow Rules, Workflow Field Updates, Approval Process Entry Criteria, and Approval Step Criteria.

Why do I need Salesforce Shield?

Use Salesforce Shield if you need an advanced native event monitoring and platform encryption solution, field audit trail tool, and regular scans of your Salesforce orgs. Together or separateдy, these solutions companies allow organizations to achieve advanced data security, compliance, governance, and transparency.

Was this helpful?

Thanks for your feedback!
Avatar photo

Product Manager

About Author

Will Tran is the Product Manager at Spin.AI, where he guides the product's strategic direction, oversees feature development and ensures that the solution solves his clients’ cybersecurity needs.

Will is a security professional who started his career at Lockheed Martin where he worked on National Security Space programs in business development and product management.

Will holds a BA in Economics and Mathematics from UCSB and an MBA with a specialization in Technology Management and Marketing from UCLA Anderson School of Management.

At Lockheed Martin, Will developed the multi-year strategy campaign and supported the product development of a national security satellite program for the United States Air Force, which resulted in a multi-billion dollar contract.

During business school, Will consulted 2 non-profit organizations as part of a series of national consulting case competitions. He set strategic priorities, optimized business operations, and developed a process to qualify new revenue streams for his non-profit clients. These initiatives resulted in 15-20% increase in annual surplus.

In his spare time, Will can be found at local coffee shops around Los Angeles, traveling to different countries, or hanging out with his cat.

How Can You Maximize SaaS Security Benefits?

Let's get started with a live demo

Latest blog posts

Beyond Add-Ons: Elevating Browser Governance Against Malicious and ...

Browser extensions, plugins, add-ons – these tools may have many names but they have even... Read more


Perception Point

backup comparison checlist

Regulations and Best Practices for Office 365 Backups: Europe Edition

Why do you need special accommodations for Office 365 Backups in Europe? For businesses using... Read more

Avatar photo

CEO and Founder

Top 10 Low-Risk Applications and Extensions for Google Workspace

Top 10 Low-Risk Applications and Extensions for Google Workspace

Google Workspace is an extremely popular SaaS productivity suite used by millions of organizations today.... Read more

Avatar photo

Vice President of Product