Protecting Your Product Assets
Today's companies face a challenging dilemma. They must be able to share information extensively as part of their collaborative product development and manufacturing processes, while at the same time protecting their intellectual property rights and mitigating the legal, financial and business risks of security related issues.
Aras Security Overview
Aras is designed to run in environments where the highest levels of security are a necessity.
The Aras security model is proven in mission-critical operation by multiple armed forces, defense contractors, and life sciences firms.
Aras Innovator determines the identity of every user attempting to access the system to ensure they are who they claim to be.
Aras Innovator uses web services protocols that support user authentication for both browser and mobile access.
The built-in Aras Innovator authentication mechanism allows password settings to be easily configured.
A user’s identity determines what actions they will be allowed to perform within the system. Aras Innovator provides a flexible, dynamic approach to efficiently manage the identity of authenticated users in real time.
Aras Innovator determines what information each user is able to access by managing their access permissions.
Access Control Lists specify the permissions available to elected users to access Item types.
Permissions for an Item type may change as it moves through its lifecycle.
Extended Enterprise Support
To support collaboration with customers, partners and suppliers during the product lifecycle, organizations need to provide secure PLM access to their extended enterprise.
Because Aras Innovator uses standard web services, a number of widely available approaches can be used.
Aras Innovator ensures compliance with regulations which dictate that information pertaining to defense and military related technologies may only be shared with U.S. persons unless authorization or a special exemption is provided.
Monitoring and Audit
To ensure a secure environment is being maintained and business rules are being complied with, system administrators and business managers need tools to monitor and audit PLM activities.
Taking advantage of Aras Innovator’s web architecture, administrators can use standard web intrusion detection software to get real time alerts of system intrusions. System audit can be performed by analyzing the logs maintained by Aras Innovator.
System and network vulnerability are major concerns for IT security managers and maintaining a secure environment is a primary goal.
With its standards-based web architecture and use of proven technology Aras Innovator provides a secure platform for managing critical information assets.