Data Security Types - An Overview

Data Security Types - An Overview

Data Security Types - An Overview


Managing the complexities of security administration is one of the growing concerns in any enterprise, especially those open to e-commerce or with large networks. In such demanding times, the availability of Security Management is considered predominant – affecting all sectors of an enterprise. The foundation of any security management is a model with role-based access control, enabling all the required functionality and authentication for a security system.

The CRM provides a set of security features that defines permission to the data as well as the features of the CRM. Administrators can control these security options in the organisation's CRM account. 

Role based security 
Select this option to allow data access within the organisation based on the hierarchy structure.


Profile based security
Select this choice-based option to give the users permission to access only those features that are relevant to their profile like specific modules or data administration tools.



Group based security
Extend the data-level access to other users with similar job profile. 






Data Sharing
At times two or more groups may have to co-exist in order to yield better results. In such cases, data sharing is the best option. Using Data Sharing, the user can extend their access rights to any other role or a group. 



Record Sharing
Share specific records with peers, management and subordinates. 


Data Encryption
Data is extremely sensitive and confidential. The CRM helps you to secure your data by encrypting it. Encryption is the process by which the raw data is encoded and can only be decoded by the authorised user. This blocks unauthorised parties from gaining access to your data in the CRM. 


Configure IP Addresses
The CRM deals with tonnes of customers' data and you must make sure that it's not accessed from an insecure network. You can restrict logging into the CRM by allowing specific IP Addresses only. 


Territory Management
Segment customer accounts based on account characteristics such as, products or services, expected revenue, zip code/region, or industry, rather than record ownership. 



    • Related Articles

    • Data Analytics - An Overview

      Data Analytics - An Overview The CRM enables fully customisable reports in all the modules with flexible options, such as cross-linking modules, 3-level column grouping, scheduling reports generation and delivering to the intended users including ...
    • Data types in Formula Fields

      Data types in Formula Fields Data type is the kind of data that can be held and stored while evaluating an expression. Data types are the defined set of values and the allowable operations on those values. They represent either the function, ...
    • Data Administration - An Overview

      Data Administration - An Overview The purpose of the CRM data administration tools are to guide the CRM Administrator in creating, verifying and ensuring data integrity by maintaining relationships and implementing access controls throughout the ...
    • Data Subject Rights

      Data Subject Rights Add Data Subject Requests Add Data Subject Requests Manually Handle Requests Within the CRM Add Data Subject Requests Automatically Raise Data Request View All Open Requests The GDPR explicitly states certain rights for the data ...
    • Encryption - An Overview

      Encryption - An Overview Setting up data encryption Feature Specifications: The CRM provides the means to protect sensitive and confidential user data via encryption. Encryption is the process of encoding information and making the ...