Users and Control

Managing the complexities of security administration is one of the growing concerns in any enterprise, especially those open to e-commerce and those with large networks. In such demanding times, the availability of Security Management is considered predominant – affecting all sectors of an enterprise.
The foundation of any security management is a model with role-based access control, enabling all the required functionality and authentication for a security system.
Zoho CRM provides a set of security features that defines permission to the data as well as the features of Zoho CRM. Administrators control these security options in the organization's account.
The role-based security ensures that data is accessible to users based on the organization's hierarchy.
Profiles, on the other hand, ensure that users have permission to access only the relevant features in CRM - various modules, data administration tools.
There is also Groups that allow you to extend the data-level access to other users with similar job profile.
At times two or more groups may have to co-exist in order to yield better result. When such is the case, data sharing is a necessity. Using Data Sharing, the user can extend their access rights to any other role or a group.
Data is extremely sensitive and confidential. Zoho CRM helps you to secure your data by encrypting it. Encryption is the process by which the raw data is encoded and can only be decoded by the authorized user. This blocks unauthorized parties from gaining access to your data in Zoho CRM.
Zoho CRM deals with tonnes of customers' data and you must make sure that it's not accessed from an insecure network. You can restrict logging into Zoho CRM by allowing specific IP Addresses only.
Manage Users
Manage all the users in your Zoho CRM account, deactivate users who are no longer part of the company account.
Add Users | Re-Invite Users | Activate/Deactivate Users | Delete Users | Allowed IPs
Manage Profiles
Create profiles that define the access permissions for the users. Set module-level and feature-level permissions for different profiles.
Create Profiles | Control Permissions | Associate Users
Manage Roles
Create roles for the users in your account such as CEO, Sales Manager, Marketing Manager etc.
Create Roles | Assign Roles
Territory Management
Segment customer accounts based on account characterists such as, products or services, expected revenue, zip code/region, or industry, rather than record ownership.
Create Territories | Assign Territories | Decision Guide
Manage Groups
Create groups to manage a common set of records with a group of members.
Share Records | Assign Groups
Data Sharing Rules
Define rules that help you to share data with peers, management, and subordinates.
Manage Data Sharing | Creating Data Sharing Rules
Record Sharing
Share specific records with peers, management and subordinates.
Share Records | View Shared Records | Manage Shared Records
Data Encryption
Protect confidential information by setting up encryptions.
Setting up encryption | Encryption process
Configure Allowed IPs
Logging in to Zoho CRM and using it can be restricted to specific IP Addresses only.
Add Allowed IPs | Remove Allowed IPs
Zoho Mail Add-on Users
Manage the users' access for the Mail Add-on feature.
Lock/Unlock Email Account | Take Backup of Email Account