Protecting Your Product Assets

Protecting Your Product Assets

Today's companies face a challenging dilemma. They must be able to share information extensively as part of their collaborative product development and manufacturing processes, while at the same time protecting their intellectual property rights and mitigating the legal, financial and business risks of security related issues.

Aras Security Overview

Aras Security Overview

Aras is designed to run in environments where the highest levels of security are a necessity.

The Aras security model is proven in mission-critical operation by multiple armed forces, defense contractors, and life sciences firms.

Aras Innovator Security White Paper

User Authentication

Aras Innovator determines the identity of every user attempting to access the system to ensure they are who they claim to be.

Aras Innovator uses web services protocols that support user authentication for both browser and mobile access.

The built-in Aras Innovator authentication mechanism allows password settings to be easily configured.

Get the White Paper

Identity Management

A user’s identity determines what actions they will be allowed to perform within the system. Aras Innovator provides a flexible, dynamic approach to efficiently manage the identity of authenticated users in real time.


User Security

Aras Innovator determines what information each user is able to access by managing their access permissions.

Access Control Lists specify the permissions available to elected users to access Item types.

Permissions for an Item type may change as it moves through its lifecycle.

Extended Enterprise Support

To support collaboration with customers, partners and suppliers during the product lifecycle, organizations need to provide secure PLM access to their extended enterprise.

Because Aras Innovator uses standard web services, a number of widely available approaches can be used.

ITAR Compliance

Aras Innovator ensures compliance with regulations which dictate that information pertaining to defense and military related technologies may only be shared with U.S. persons unless authorization or a special exemption is provided.

Monitoring and Audit

To ensure a secure environment is being maintained and business rules are being complied with, system administrators and business managers need tools to monitor and audit PLM activities.

Taking advantage of Aras Innovator’s web architecture, administrators can use standard web intrusion detection software to get real time alerts of system intrusions. System audit can be performed by analyzing the logs maintained by Aras Innovator.

Platform Security

Platform Security

System and network vulnerability are major concerns for IT security managers and maintaining a secure environment is a primary goal.

With its standards-based web architecture and use of proven technology Aras Innovator provides a secure platform for managing critical information assets.