Non-intrusive Role based Access Control
Zoom supports hierarchical roles; specify the highest permission a role has and then simply assign users to a role to control access. Several in-built roles are supported out of the box. No need to mess with complex access control lists. Non-intrusive mode implies, Zoom automatically filters assets based on role. User interface navigation menus are dynamically created based on role.
Audit every access to a digital asset
Every access to a resource in Zoom can be logged in an audit trail. Get answers in real-time on who accessed a resource; when was it accessed; what was accessed. A variety of reports are available based on mining the data in the audit trails. Alerts can be setup based on irregular or suspicious activity.
Integrate with Enterprise Authentication Stores
Zoom ships with a built-in authentication database for managing user accounts but you can also integrate enterprise authentication stores like LDAP, Active Directory and Kerberos. Evolphin's professional service team can work with you on tailoring the sign-on module to your existing authentication system.
Standards based Network Encryption
Zoom supports open standards like SSL/TLS for connecting Zoom client applications with the digital asset repository. You can easily configure support for certificate based network encryption using the Zoom web console. Network encryption ensures, all data access over the network stays private and secure.