Users and Control
Managing the complexities of security administration is one of the growing concerns in any enterprise, especially those open to e-commerce and those with large networks. In such demanding times, the availability of Security Management is considered predominant – affecting all sectors of an enterprise.
The foundation of any security management is a model with role-based access control, enabling all the required functionality and authentication for a security system.
Zoho CRM provides a set of security features that defines permission to the data as well as the features of Zoho CRM. Administrators control these security options in the organization's account.
The role-based security ensures that data is accessible to users based on the organization's hierarchy.
Profiles, on the other hand, ensure that users have permission to access only the relevant features in CRM - various modules, data administration tools.
There is also Groups that allow you to extend the data-level access to other users with similar job profile.
At times two or more groups may have to co-exist in order to yield better result. When such is the case, data sharing is a necessity. Using Data Sharing, the user can extend their access rights to any other role or a group.
Data is extremely sensitive and confidential. Zoho CRM helps you to secure your data by encrypting it. Encryption is the process by which the raw data is encoded and can only be decoded by the authorized user. This blocks unauthorized parties from gaining access to your data in Zoho CRM.
Zoho CRM deals with tonnes of customers' data and you must make sure that it's not accessed from an insecure network. You can restrict logging into Zoho CRM by allowing specific IP Addresses only.
Segment customer accounts based on account characterists such as, products or services, expected revenue, zip code/region, or industry, rather than record ownership.
Create Territories | Assign Territories | Decision Guide