iDAM's security model ensures that all data is stored safely. The permissions model allows you to control who sees what, right down to the individual asset and user. You never have to worry about unauthorized access to your organization's rich media assets.
System Architecture Design
Optional physical separation of key
hardware components enables limitless system
configurations that can adapt to your
specific global distribution requirements
Role-Based Security Model
iDAM is built on a role-based security model
enabling the access or restriction of most
iDAM functions down to the user level.
Overrides can be setup at most nodes to
accommodate complex security structures
Simple Security Mode
iDAM has a built in simple security mode for
users just wanting to get up and running
without the complexity of setting up
permissions or roles.