SlideShare a Scribd company logo
ADVANCED USER
PRIVILEGES
MAY 8, 2013
Paul Welch, Product Manager
George Lewis, Director of Solutions Consulting
Agenda
• Overview and user configuration
• Live demonstration
• Implementation best practices
• Using BOMControl as an enterprise cloud
content management solution
arenasolutions.com | Confidential | Slide 3
What is it?
• Category base access control
• Disabled categories hidden from
the user
• Available for Items, Files, Requests
and Changes
arenasolutions.com | Confidential | Slide 4
Why use Advanced User Privileges?
• More control over information
• Users see only what they need to
see
• Securely increase collaboration
arenasolutions.com | Confidential | Slide 5
Typical Applications
Restricting Users from Viewing Files
arenasolutions.com | Confidential | Slide 6
Typical Applications
Restricting Users from Viewing Items
arenasolutions.com | Confidential | Slide 7
Configuring User Privileges
• New Command pop-up for
users
• Simple, visual configuration
screen
• Account Administrators
cannot be modified
Demonstration
arenasolutions.com | Confidential | Slide 9
Implementation Best Practices
• Organizational change management
• Use a test environment first
• Ensure proper access
• Category management
See the Application note in our Document Library
arenasolutions.com | Confidential | Slide 10
Extend BOMControl to Manage Content
Across your Enterprise
• Easily Manage documents across your organization
• One familiar system for product and content management
• Cloud storage and proven revision control
• Cost effective alternative to other solutions
arenasolutions.com | Confidential | Slide 11
www.arenasolutions.com/resources/webinars
arenasolutions.com | Confidential | Slide 12
Content Management Examples
Controlled Access Throughout Your Organization
Engineering
Mfg
Operations
Marketing
HR
arenasolutions.com | Confidential | Slide 13
Content Management Examples
arenasolutions.com | Confidential | Slide 14
Summary
• Advanced User Privileges
•Increased control over your IP
•Easy to configure
•Improved, secure collaboration
• Content Management
•Securely manage documents across your entire organization
•Cost effective alternative
•A system you already know
arenasolutions.com | Confidential | Slide 15
www.arenasolutions.com/resources/webinars

More Related Content

PPTX
PostgreSQL Database Slides
metsarin
 
PPT
Apps gov now exec demo
DigitalGov
 
PPTX
Authentication and Access Control in e-Health Systems in the Cloud Computing
Nafiseh-Kahani
 
PPT
Less07 Users
vivaankumar
 
ODP
Postgre sql unleashed
Marian Marinov
 
PPTX
Date security security principles
Leo Mark Villar
 
PDF
Policy based access control
Elimity
 
PostgreSQL Database Slides
metsarin
 
Apps gov now exec demo
DigitalGov
 
Authentication and Access Control in e-Health Systems in the Cloud Computing
Nafiseh-Kahani
 
Less07 Users
vivaankumar
 
Postgre sql unleashed
Marian Marinov
 
Date security security principles
Leo Mark Villar
 
Policy based access control
Elimity
 

Viewers also liked (9)

PPT
Constraints In Sql
Anurag
 
PPTX
Database index
Riteshkiit
 
PDF
PostgreSQL: Advanced indexing
Hans-Jürgen Schönig
 
PPTX
User, roles and privileges
Yogiji Creations
 
PDF
Data Processing Inside PostgreSQL
EDB
 
PDF
PostgreSQL Deep Internal
EXEM
 
PPTX
Data security authorization and access control
Leo Mark Villar
 
PPT
Sql database object
Young Alista
 
PPTX
LinkedIn powerpoint
guest2137df
 
Constraints In Sql
Anurag
 
Database index
Riteshkiit
 
PostgreSQL: Advanced indexing
Hans-Jürgen Schönig
 
User, roles and privileges
Yogiji Creations
 
Data Processing Inside PostgreSQL
EDB
 
PostgreSQL Deep Internal
EXEM
 
Data security authorization and access control
Leo Mark Villar
 
Sql database object
Young Alista
 
LinkedIn powerpoint
guest2137df
 
Ad

Similar to Advanced User Privileges (20)

PDF
Protecting Sensitive and Critical Financial Data with Privileged Access
Bomgar
 
PDF
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Kehinde Tolude
 
PPTX
SMB Security Product Overview.pptx
kovec2684
 
PDF
MSFT Cloud Architecture Information Protection
Kesavan Munuswamy
 
PDF
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
NCCOMMS
 
PDF
Power Saturday 2019 E1 - Office 365 security
PowerSaturdayParis
 
PPTX
History of Content Security: Take 2 - ShareCloudSummit Houston
Adam Levithan
 
PDF
Control and manage your cloud clients
Olav Tvedt
 
PDF
Oracle Enterprise Manager Security A Practitioners Guide
Courtney Llamas
 
PDF
Softwerx Microsoft 365 Security Webinar Presentation
Patrick Leckie
 
PPTX
MS-500T01A-ENU-PowerPoint_03 ciberseguridad
GaboLopez24
 
PPTX
Privileged User Management: Securing Elevated Access and Enhancing Cybersecurity
Bert Blevins
 
PPTX
Intro to Office 365 Security & Compliance Center
Craig Jahnke
 
PDF
Microsoft Office 365 Security and Compliance
David J Rosenthal
 
PPTX
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
Create IT
 
PDF
#OOW16 - Introduction to Advanced Access Controls
Dane Roberts
 
PDF
DEF CON 27 - DIRK JAN MOLLEMA - im in your cloud pwning your azure environment
Felipe Prado
 
PDF
Oracle Enterprise Manager Security: A Practitioners Guide
Courtney Llamas
 
PDF
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
DirkjanMollema
 
PPT
10135 a 10
Bố Su
 
Protecting Sensitive and Critical Financial Data with Privileged Access
Bomgar
 
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Kehinde Tolude
 
SMB Security Product Overview.pptx
kovec2684
 
MSFT Cloud Architecture Information Protection
Kesavan Munuswamy
 
O365Con18 - Deep Dive into Microsoft 365 - Jussi Roine
NCCOMMS
 
Power Saturday 2019 E1 - Office 365 security
PowerSaturdayParis
 
History of Content Security: Take 2 - ShareCloudSummit Houston
Adam Levithan
 
Control and manage your cloud clients
Olav Tvedt
 
Oracle Enterprise Manager Security A Practitioners Guide
Courtney Llamas
 
Softwerx Microsoft 365 Security Webinar Presentation
Patrick Leckie
 
MS-500T01A-ENU-PowerPoint_03 ciberseguridad
GaboLopez24
 
Privileged User Management: Securing Elevated Access and Enhancing Cybersecurity
Bert Blevins
 
Intro to Office 365 Security & Compliance Center
Craig Jahnke
 
Microsoft Office 365 Security and Compliance
David J Rosenthal
 
2018 11-29 - Future Of SharePoint - SharePoint Keynote and Security
Create IT
 
#OOW16 - Introduction to Advanced Access Controls
Dane Roberts
 
DEF CON 27 - DIRK JAN MOLLEMA - im in your cloud pwning your azure environment
Felipe Prado
 
Oracle Enterprise Manager Security: A Practitioners Guide
Courtney Llamas
 
I'm in your cloud... reading everyone's email. Hacking Azure AD via Active Di...
DirkjanMollema
 
10135 a 10
Bố Su
 
Ad

Recently uploaded (20)

PDF
Software Development Company | KodekX
KodekX
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PDF
CIFDAQ'S Market Insight: BTC to ETH money in motion
CIFDAQ
 
PPTX
Smart Infrastructure and Automation through IoT Sensors
Rejig Digital
 
PDF
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
PDF
This slide provides an overview Technology
mineshkharadi333
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
PDF
Shreyas_Phanse_Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
SHREYAS PHANSE
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Software Development Company | KodekX
KodekX
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
CIFDAQ'S Market Insight: BTC to ETH money in motion
CIFDAQ
 
Smart Infrastructure and Automation through IoT Sensors
Rejig Digital
 
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
Why Your AI & Cybersecurity Hiring Still Misses the Mark in 2025
Virtual Employee Pvt. Ltd.
 
This slide provides an overview Technology
mineshkharadi333
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 
Doc9.....................................
SofiaCollazos
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
Shreyas_Phanse_Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
SHREYAS PHANSE
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 

Advanced User Privileges

  • 1. ADVANCED USER PRIVILEGES MAY 8, 2013 Paul Welch, Product Manager George Lewis, Director of Solutions Consulting
  • 2. Agenda • Overview and user configuration • Live demonstration • Implementation best practices • Using BOMControl as an enterprise cloud content management solution
  • 3. arenasolutions.com | Confidential | Slide 3 What is it? • Category base access control • Disabled categories hidden from the user • Available for Items, Files, Requests and Changes
  • 4. arenasolutions.com | Confidential | Slide 4 Why use Advanced User Privileges? • More control over information • Users see only what they need to see • Securely increase collaboration
  • 5. arenasolutions.com | Confidential | Slide 5 Typical Applications Restricting Users from Viewing Files
  • 6. arenasolutions.com | Confidential | Slide 6 Typical Applications Restricting Users from Viewing Items
  • 7. arenasolutions.com | Confidential | Slide 7 Configuring User Privileges • New Command pop-up for users • Simple, visual configuration screen • Account Administrators cannot be modified
  • 9. arenasolutions.com | Confidential | Slide 9 Implementation Best Practices • Organizational change management • Use a test environment first • Ensure proper access • Category management See the Application note in our Document Library
  • 10. arenasolutions.com | Confidential | Slide 10 Extend BOMControl to Manage Content Across your Enterprise • Easily Manage documents across your organization • One familiar system for product and content management • Cloud storage and proven revision control • Cost effective alternative to other solutions
  • 11. arenasolutions.com | Confidential | Slide 11 www.arenasolutions.com/resources/webinars
  • 12. arenasolutions.com | Confidential | Slide 12 Content Management Examples Controlled Access Throughout Your Organization Engineering Mfg Operations Marketing HR
  • 13. arenasolutions.com | Confidential | Slide 13 Content Management Examples
  • 14. arenasolutions.com | Confidential | Slide 14 Summary • Advanced User Privileges •Increased control over your IP •Easy to configure •Improved, secure collaboration • Content Management •Securely manage documents across your entire organization •Cost effective alternative •A system you already know
  • 15. arenasolutions.com | Confidential | Slide 15 www.arenasolutions.com/resources/webinars

Editor's Notes

  • #6: Here I’ll show you some typical applications for Advanced user Privileges…Restricting Users from Viewing FilesAs your organization grows and more users outside of engineering need access to BOMControl, you may need to apply stricter controls over who can access files that may contain intellectual property.*Click*In this example the user on the left has full access to files including design source files.*Click*Where this user is restricted from viewing design files and can only view general files that contain no IP.By limiting a user’s ability to view specific file categories you can ensure the user always has access to the latest information while knowing he cannot access sensitive files – increasing efficiency AND lowering the risk of your files getting into the wrong hands.
  • #7: Restricting Users from Viewing ItemsThe same controls can be placed on Items as well.*Click* In this example you see one user who has full access to all of the product BOM *Click* While this user has been restricted from seeing some sensitive item on the BOM. When a restricted user looks at a BOM that contains hidden items the user will get a warning message.