Users & Control - Overview

Users and Control

Managing the complexities of security administration is one of the growing concerns in any enterprise, especially those open to e-commerce and those with large networks. In such demanding times, the availability of Security Management is considered predominant – affecting all sectors of an enterprise.

The foundation of any security management is a model with role-based access control, enabling all the required functionality and authentication for a security system.

Zoho CRM provides a set of security features that defines permission to the data as well as the features of Zoho CRM. Administrators control these security options in the organization's account.

The role-based security ensures that data is accessible to users based on the organization's hierarchy.
Profiles, on the other hand, ensure that users have permission to access only the relevant features in CRM - various modules, data administration tools.
There is also Groups that allow you to extend the data-level access to other users with similar job profile.

At times two or more groups may have to co-exist in order to yield better result. When such is the case, data sharing is a necessity. Using Data Sharing, the user can extend their access rights to any other role or a group.

Data is extremely sensitive and confidential. Zoho CRM helps you to secure your data by encrypting it. Encryption is the process by which the raw data is encoded and can only be decoded by the authorized user. This blocks unauthorized parties from gaining access to your data in Zoho CRM.

Zoho CRM deals with tonnes of customers' data and you must make sure that it's not accessed from an insecure network. You can restrict logging into Zoho CRM by allowing specific IP Addresses only.

Manage Users

Manage all the users in your Zoho CRM account, deactivate users who are no longer part of the company account.
Add Users | Re-Invite Users | Activate/Deactivate Users | Delete Users | Allowed IPs

Manage Profiles

Create profiles that define the access permissions for the users. Set module-level and feature-level permissions for different profiles.
Create Profiles | Control Permissions | Associate Users

Manage Roles

Create roles for the users in your account such as CEO, Sales Manager, Marketing Manager etc.
Create Roles | Assign Roles

Territory Management

Segment customer accounts based on account characterists such as, products or services, expected revenue, zip code/region, or industry, rather than record ownership.
Create Territories | Assign Territories | Decision Guide

Manage Groups

Create groups to manage a common set of records with a group of members.
Share Records | Assign Groups

Data Sharing Rules

Define rules that help you to share data with peers, management, and subordinates.
Manage Data Sharing | Creating Data Sharing Rules

Record Sharing

Share specific records with peers, management and subordinates.
Share Records | View Shared Records | Manage Shared Records

Data Encryption

Protect confidential information by setting up encryptions.
Setting up encryption | Encryption process

Configure Allowed IPs

Logging in to Zoho CRM and using it can be restricted to specific IP Addresses only.
Add Allowed IPs | Remove Allowed IPs

Zoho Mail Add-on Users

Manage the users' access for the Mail Add-on feature.
Lock/Unlock Email Account | Take Backup of Email Account

Share this post : FacebookTwitter

Still can't find what you're looking for?

Write to us: