Data Security Types

Data Security Types



  Cloudtool Technologies Pvt Ltd




Data Security Types - An Overview


Managing the complexities of security administration is one of the growing concerns in any enterprise, especially those open to e-commerce or with large networks. In such demanding times, the availability of Security Management is considered predominant – affecting all sectors of an enterprise. The foundation of any security management is a model with role-based access control, enabling all the required functionality and authentication for a security system.


Zoho CRM provides a set of security features that defines permission to the data as well as the features of Zoho CRM. Administrators can control these security options in the organization's CRM account.


Role based security


Select this option to allow data access within the organization based on the hierarchy structure. Learn more




Profile based security


Select this choice-based option to give the users permission to access only those features that are relevant to their profile like specific modules or data administration tools. Learn more



Group based security


Extend the data-level access to other users with similar job profile. Learn more






























Data Sharing


At times two or more groups may have to co-exist in order to yield better results. In such cases, data sharing is the best option. Using Data Sharing, the user can extend their access rights to any other role or a group. Learn more



Record Sharing


Share specific records with peers, management and subordinates. Learn more




Data Encryption


Data is extremely sensitive and confidential. Zoho CRM helps you to secure your data by encrypting it. Encryption is the process by which the raw data is encoded and can only be decoded by the authorized user. This blocks unauthorized parties from gaining access to your data in Zoho CRM. Learn more



Configure IP Addresses


Zoho CRM deals with tonnes of customers' data and you must make sure that it's not accessed from an insecure network. You can restrict logging into Zoho CRM by allowing specific IP Addresses only. Learn more



Territory Management


Segment customer accounts based on account characteristics such as, products or services, expected revenue, zip code/region, or industry, rather than record ownership. Learn more



Zoho Mail Add-on Users


Manage the users' access for the Mail Add-on feature. Learn more



    • Related Articles

    • Types of Custom Fields

      Cloudtool Technologies Pvt Ltd In Zoho CRM, you can add different types of custom fields as per your requirements. These fields will be available to all the users added to your organization's CRM account. Customize Zoho Defined Fields : You can edit, ...
    • Data Subject Rights

      Cloudtool Technologies Pvt Ltd The GDPR explicitly states certain rights for the data subjects in Articles 12 to 23. We need to understand and fullfil them when individuals seek to exercise those rights. Right of access: The subject's right to obtain ...
    • Setting up Data Sharing Rules

      Cloudtool Technologies Pvt Ltd By default, access rights to CRM records is set as private so that the record owner and his/her manager can oversee the CRM data. However, using the Data Sharing Rules, you can extend the access rights to users ...
    • Data Privacy

      Cloudtool Technologies Pvt Ltd A record's details are available in two sections - Info and Timeline. When you switch on GDPR Compliance in your Zoho CRM account, you will be able to view another section, namely Data Privacy. This section has the ...
    • Setting Data Encryption

      Cloudtool Technologies Pvt Ltd Data encryption is a way to safeguard personal or sensitive information like credit card details, backup phone numbers, personal identification numbers etc. that are stored in your CRM database. It prevents the data ...