Select Page

Accessing data

Whether across departments or multiple locations: GAIN Collaboration makes unwanted access to documents and files impossible. This is ensured by an individual rights system, the check-in/check-out procedure and document encryption.

GAIN Collaboration supports you in these areas

PDM data access

ALWAYS AN ORIGINAL

Check-In / Check-Out

Check-In - Check-Out procedure for the protection of your documents. Direct access to your archive documents without GAIN Collaboration is impossible.

To ensure that your archived documents are protected at all times, GAIN Collaboration works according to the check-in / check-out procedure:

  • For editing, GAIN Collaboration loads the document from the archive to a workstation, where it is then edited (check-out).
  • After editing, GAIN Collaboration transfers the document back to the PDM archive (check-in).

Direct access to your archive documents without GAIN Collaboration is impossible.

WHO MAY DO WHAT?

User rights

Extensive options for user rights. For example, which products or documents may be worked with.

Which processes in product data management do you want? With GAIN Collaboration you assign practicable user rights:

User:
Everyone who works with GAIN Collaboration receives a user account in GAIN Collaboration. You can assign the user to one or more groups. In addition, you can control which variant the user is allowed to work with (GAIN Collaboration Professional, GAIN Collaboration Office or GAIN Collaboration View).

Groups:
Groups in GAIN Collaboration regulate the affiliation of users. You use group policies to specify which documents a user is allowed to work with. Each group is assigned an access rule.

Rules:
In the rules, you define the access rights (read, write, delete) for users and user groups.

… XIiO–53tuip.H1-l–rsst …

Document encryption

Document encryption optional before each transfer. Unauthorized access to your documents is excluded.

Before each transfer of your documents, you can optionally encrypt your data. If the corresponding certificates are stored, they are decrypted again at the destination – automatically and imperceptibly.
Without using the appropriate certificate keys, unauthorized access to your documents is impossible.

EXCHANGING PRODUCT DATA SECURELY

access worldwide

Access worldwide: for example, between multiple locations. With the add-on module GAIN Collaboration Location you can also replicate entire document structures ...

Exchange product data between multiple locations. With the add-on module GAIN Collaboration Location you can replicate single documents or entire document structures …