You can manage content at every level using CrownPeak’s sophisticated permission management system to grant rights to users, groups and roles. The system is already configured with preset workflows, which can be customized, to get your content moving.
- Out-of-the box workflows for small work teams, multi-lingual sites, content-sharing multi-site, segmented email creative and other advanced workflow scenarios
- Easy-to-configure custom workflow designer interface
- Infinite workflows, down to the individual user or asset level
- Full system audit, tracking every action in the system
- Ability to hide content or functions from any user or groups of users
- Permissions integration with content systems like SharePoint
We understand the security and workflow requirements of global enterprises. Your content and customer data is a valuable asset that must be protected. As a result, we have built our Workflow and Content Security capabilities to be managed at varying levels of detail.
Within CrownPeak, you can manage content at the component and element levels using a sophisticated permission management system to grant rights to users, groups and roles. Strict role-based access control (RBAC) is enforced, down to the individual asset level, if required. The platform comes standard with full auditing and reporting capabilities.
Workflows:
- CrownPeak provides a rich set of preconfigured workflows, including support for many of the more complex scenarios such as language translation, content collaboration and approval processes in regulated environments
- Workflows can be copied, improved and adjusted easily using graphical configuration tools – no programming required.
- Individual departments and local regions can independently design workflows to suit their local business models and regulatory and compliance requirements, as well as their local resources and timelines.
- Central administrators can leverage CrownPeak security to regulate access to critical common components, such as brand style sheets, navigation mechanisms, legal disclosures, document retention and expiry policies.