Enterprise Shield guides

Learn from Lucid’s security-first approach on how to set up your Enterprise Shield add-on for success and enhanced protection.

Getting started

If you’ve just purchased Enterprise Shield, learn some essential first steps to protecting your account.

Learn more

How to protect against data exfiltration

Protect sensitive documents from being accessed, copied, or shared without authorization.

How to control and monitor document access

Manage inbound and outbound sharing with external users.

How to bolster regulatory compliance

Find and access all documents on your account, and preserve key documents relevant to litigation.

How to obtain your own encryption keys

Get more info about Lucid Key Management Service (KMS), which allows customers to manage the encryption keys securing their data.

How to automate document management and security

Build custom scripts to change document permissions in bulk, archive documents, or generate custom reports.

How to manage session duration and control access

Balance security through session time-outs and an IP allow list.

How to monitor, investigate, and respond to incidents

Take advantage of audit logs and revision history to reconstruct a timeline of events for incident management.

Collaborate more securely with Enterprise Shield

Contact sales

Get Started

  • Enterprise
  • Contact Sales
  • Pricing
PrivacyLegalCookie privacy choicesCookie policy
  • LinkedIn
  • Twitter
  • Instagram
  • Facebook
  • YouTube
  • Glassdoor
  • TikTok

© 2026 Lucid Software Inc.