Security Management
Managing the complexities of security administration is one of the growing concerns in any business. In demanding times, the availability of Security Management is considered predominant – affecting all sectors of an enterprise.
The foundation of any security management is a model with role-based access control, enabling all the required functionality and authentication for a security system.
Zoho Workerly provides a set of security features that defines permission to the data as well as the features of the product. Administrators control these security options in the organization's account.
The role-based security ensures that data is accessible to users based on the organization's hierarchy. Profiles, on the other hand, ensure that users have permission to only the relevant features in Zoho Workerly - various modules, data administration tools. There are also Groups that allow you to extend the data-level access to other users with similar job profile.
Manage Profiles
Create profiles that define the access permissions for the users. Set module-level and feature-level permissions for different profiles.
Create Profiles | Control Permissions | Associate Users
Manage Roles
Create roles for the users in your account such as CEO, Sales Manager, Marketing Manager etc.
Create Roles | Assign Roles
Manage Groups
Create groups to manage a common set of records with a group of members.
Share Records | Assign Groups
Data Sharing Rules
Define rules that help you to share data with peers, management, and subordinates.
Manage Data Sharing | Creating Data Sharing Rules
Record-Level Sharing
Share specific records with peers, management and subordinates.
Record-Level Sharing
Zoho Mail Add-on Users
Manage the users' access to the Mail Add-on feature.
Lock/Unlock Email Account | Take Backup of Email Account