You are here: Best Practices > Surround SCM Security Best Practices

Surround SCM Security Best Practices

Use the following best practices to keep your Surround SCM and Seapine License Server data secure. Implementing these practices can help you avoid common mistakes that could leave your data vulnerable to theft, damage, or loss.

Note: Best practices for securing TestTrack data are similar. If you also use TestTrack, see the TestTrack Security Best Practices.

View PDF version

Server management

Use the following information to properly manage and secure the Surround SCM Server and Seapine License Server.

Database management

Use the following information to secure Surround SCM and Seapine License Server databases.

User management

Use the following information to efficiently manage user access to Surround SCM clients and the Seapine License Server Admin Utility.