top of page
Why Security-ITAR
When you initially installed PLM, intellectual property was protected so you could access your intellectual property. Your business may need to have ITAR-like compliance on the product data as it develops or when security-sensitive business units are added. The security model needs to be updated to take into account new selection criteria.
Examples of the security model alignment with the new selection include:
-
Project or product name specific access
-
Security clearance level access
-
Vendor or customer specific access
-
Business unit specific access

Challenges we Help you Solve:
-
Complexity of existing security model
-
Approach for transition without disruption – incremental deployment by user or criteria
-
Mass update of access control attributes

bottom of page