SlideShare a Scribd company logo
1 of 28
Download to read offline
PLM World ‘06




         Solving PLM Security
      Concerns Using Teamcenter

     Sassan Khoubyari
     Chief Program Manager
     Global Powertrain C3PNG Methods & Deployment
     Ford Motor Company
     skhoubya@ford.com
     www.ford.com


     Suresh Somisetty
     C3PNG PIM Security Specialist
     Mechatronics Inc.
     ssomiset@ford.com
     www.mechatronics-us.com
Evolution of the
                Ford Product Creation Process
                                                             Since
                 1985                 1992       1993        1996              2005+

                 CTC                 WCT        WCP          FPDS              GPDS
                                                                         Global Product
                Concept            World         World    Ford Product    Development
                   to              Class         Class    Development       System
                Customer           Timing       Process     System
                                                                             An Enterprise-
                                                                              wide process
MBJ#1* 72 MBJ#1                  68 MBJ#1 65 MBJ#1          43 MBJ#1     built from Global Best
                                                                                 Practices




   * <KO> equivalent timing for S4/P4 program




PLM World ‘06                                                                    Khoubyari/Somisetty
                                                                          For Joint Programs
Key Business Drivers –
                                     Commonality (Before C3PNG)                              Manual

  Requirements:
                                                                                          Processes and                     Current Situation:
                                                                                            Resources                       •Different PDM
  •Common PDM
                                                                                                                            •Different Product Structure
  •Common Product Structure
                                                                                                                            •Different CAD
  •Common CAD
                                       Manual                                                Supplier                              Supplier   FNA
                                    Processes and
                                                                                                 PDM            CAD                     PDM       CAD
                                      Resources                                                Metaphase       IDEAS                    VPM     CATIA V5

                           Volvo
                Supplier                                        Supplier   FOE
                     PDM        CAD                                 PDM        CAD
                     VPM      CATIA V4                            Metaphase   IDEAS
                                                                                                                                         Manual
                                                                                                                                      Processes and
                                                                                                                                        Resources

                                                                                                        Supplier
                                                                                                                   Mazda
                                   Supplier         Jaguar
                                                                                                            PDM             CAD
                                       PDM             CAD
                                                                                                          Metaphase        IDEAS
           Manual                    Metaphase        IDEAS

          Processes                                                                                                        CAD
             and                                                                                                           GNC
          Resources                      Supplier   Land Rover
                                                                                       Manual
                                              PDM      CAD
                                              VPM    CATIA V4                         Processes
                                                                                         and
                                                                                      Resources
                Our current Methods/Tools/Data environment inhibits cross brand programs
PLM World ‘06                                                                                                                                 Khoubyari/Somisetty
PLM Security

· C3P-Next Generation
   (Ford PLM Initiative)
   CATIA V5(excluding PT), IDEAS
   Teamcenter Engineering(TCe) &
   Teamcenter Manufacturing (TCm)
   AVBOM, Vismock, Tecnomatics, etc….


• Security is probably one of the most important issues during
migration from C3P Classic (Metaphase/TDM) to C3P Next
Generation.
• The real challenge was to customize the TCe security module
to comply with the Ford Motor Company’s C3P Security policy
• Users acceptance to the changes is always a challenge
PLM World ‘06                                           Khoubyari/Somisetty
Challenges

   When FMC Powertrain decides to be part of the single/shared data
   management tool(C3P-NG), there were many concerns/requirements from
   users about the security
       Over exposure of data to many users
        • Many groups need to use/share same database for their daily work
        • Work In Progress data of any user gets exposed to beyond his/her group
        • Proper Naming & Numbering is must from beginning

        Multiple Roles & Responsibilities
        • Demand for following types of Roles
                • Engineer, Designer, Team Designer, Viewer, CAE Analyst, Data
                Admin, Plant Engineer, etc…

PLM World ‘06                                                            Khoubyari/Somisetty
Challenges
Restricting access to highly “Secret” data only for authorized users
     • Any data that is classified as highly ‘Secret” should be protected from
        unauthorized users including FMC users
        Example:
                • Tooling data
                • Research & Advanced Engineering data

  Restricting write privileges on data to only few set of users or group of
  users
    • A demand for clear definition of who should have write access & Who
    should have read access
       • Limiting Data Admin roles

PLM World ‘06                                                           Khoubyari/Somisetty
Challenges

   Restricting Suppliers to only data that they are supposed to view/work
        • Supplier users should have access to the data only on need basis
        • Protecting competitive suppliers data from each other
        • Availability of required data to suppliers with no delay

   A secured place for Joint Ventures to store & collaborate their work
        • Ford Joint Ventures usually work with many OEMs
        • Provision to store Ford & Non Ford data in a single database & provide
          access to Ford users only for their data
        • Secret data should be protected from access by non-JV personnel
        • A provision to store/organise Catalog Parts & restrict access to only JV
        users
PLM World ‘06                                                             Khoubyari/Somisetty
Security in Legacy Environment
   · Legacy environment (FMC calls it as C3P Classic)
     provides two step/level data management.
   · In first level, a group of users manage their working
         data in the localized Team Data Manager i.e IDEAS
         TDM. Users feel their data is secured here by limiting
         access to only TDM users.
                C3P Classic
                                         Metaphase

                               TDM                       TDM
                                       Group of Users          Group of Users

                              I-DEAS
                              I-DEAS                    I-DEAS
                                                        I-DEAS
                               Vehicle & Powertrain Development
PLM World ‘06                                                                   Khoubyari/Somisetty
Security in Legacy Environment cont…
   · Users share/send the data to second level of data
         management (Metaphase) only on need basis &
         users are comfortable to share their data since data
         reached certain maturity.
   ·     Legacy approach gave users to work in their domain
         without exposing the work in progress data to other
         downstream users in the organization and only share
         data that is mature enough. This provides indirect
         security to Work In Progress data.
   ·     Ford Joint Venture companies are able to work with
         this model and keep data secured as required




PLM World ‘06                                                   Khoubyari/Somisetty
Security in Legacy Environment cont…
Following diagram shows how Ford JVs operate in C3P Classic environment


                                    Metaphase
                                    Metaphase
                                     (PTO- Merk)
                                      (PTO- Merk)



                                                            Non Ford              Supplier
                 Ford Data                                 Data TDM’s
                  TDM’s                                                           Agencie
                                                         (operated by Ford IT)
                (operated by Ford                                                 s
                       IT)

                                                                                    FDX
                                                                                    Odett
                                                                                    e

            Ford Net            JV Subnet           Secured Network Nodes
                                                    (accessible only through JV
                                                    subnet)
                                                          JV Data Coordinator
PLM World ‘06                                                                               Khoubyari/Somisetty
C3P Next Generation

  · When FMC Powertrain started thinking about
    the C3P Next generation tools, following were             NA *


       major requirements
         · Business operations approach has changed and
           now OEMs are spawned across the globe             Europe


         · Severaljob and faster to market approachsimilar
           type of
                   groups in the organization doing

         · Demanding possible to reduce cycleproduct data
           as much as
                       re-usability of company
                                                time

  · PLM toolstoseem to be providing better but
    solutions today's OEMs security needs
       needs reasonable amount of customization.



PLM World ‘06                                                         Khoubyari/Somisetty
C3P-NG Security – Key Concepts

   Security module for C3P NG is built/configured in compliance with
   the FMC CAD/CAM/CAE/PIM Security Policy
   Following are the few key PLM Security concepts implemented as
   part of C3P-NG.
    ·     Groups
           · Ford
           · Supplier
    ·     Data Classification
           · Secret
           · Confidential
           · Proprietary
    ·     Project Based Security
           · Create / Manage Projects on-the-fly
           · Only read access is controlled based on the Project
    ·     Restriction Lists
           · To restrict competitive suppliers viewing each others data
PLM World ‘06                                                             Khoubyari/Somisetty
C3P-NG Security – How does it work?
• For every Engine/Transmission family of programs, a project in TCe
would be created.
    Ex: MODENG
• There are three sub-groups created for Powertrain users under each CBG.




PLM World ‘06                                                      Khoubyari/Somisetty
C3P-NG Security – How does it work?
• Powertrain users could request a role in TCe for any specific project
using a web based user access request system.




                                                                  Authorizer


                                                                  Project


                                                                   Sub-group




PLM World ‘06                                                           Khoubyari/Somisetty
C3P-NG Security – How does it work?
• Powertrain users could request a role in TCe for any specific project
using a web based user access request system. Cont…



                                                                     Access
                                                                     Gatekeepr

                                                                    Role




PLM World ‘06                                                         Khoubyari/Somisetty
C3P-NG Security – How does it work?
A snapshot of TCe My Navigator for user role, group & project




                                              Notice that user
                                              got a Designer
                                              role under
                                              ENGINE group
                                              in FNA for
                                              ‘MODENG’
                                              project



PLM World ‘06                                                    Khoubyari/Somisetty
C3P-NG Security – How does it work?
                                                          Product Configuration
• Every project in TCe gets an                             V    Design
                                             030101             Solution

associated product structure                                    Design
                                                           V    Solution
                                    030100
to store the data
                                                      V
                        030000               030102
                EBOM                                        MP (Carry Over Master Package)




                                    Node
    MODENG      VSS    Node
                                    Node                                                              Publish

                                                                    Reference
                                                                      Copy

                                             Node
                         Collaboration
                                             Node                                      Design Information

                ECS     PDN Deliverables                  Design                   Design           Design
                                                          Context                 Instance           Rep
                        CAE Deliverables
                                                                                         CAD                 CAD




PLM World ‘06                                                                                         Khoubyari/Somisetty
C3P-NG Security – How does it work?
    • Apply Security Data Classification
    The purpose of the Data Classification is to apply a value to the Item that denotes its
    Security Classification based on Ford's Global Information
    Standard 2 (GIS2). This Security Classification is used to control viewing privileges on
    the data.




                                        Double
                                        click




PLM World ‘06                                                                  Khoubyari/Somisetty
C3P-NG Security – How does it work?
    View access to the data is decided based on
    it’s association to a Project

    TCe Projects are an OOTB
   concept that allows for the                        Assign                     Project            Assign
   assignment of Users and                                                      MODENG
   Data Objects to a Project or
   Projects. By comparing the
   User and Data Object
   assignments, Project based
   security controls view access
                                                                            View Access                 Data Object
                                            User 1
   to Data objects.                                                                                          A

View access Privileges
                  User Type                 Data Classification

                                   Secret   Confidential          Proprietary

                  Ford                P          A                 A               View Access Key:

                 Supplier             P          P                 A               A = Across all
                                                                                   Programs/Projects

                                                                                   P = Per Program/Project
PLM World ‘06                                                                                                Khoubyari/Somisetty
C3P-NG Security – How does it work?
    • Applying Restriction List (if necessary)

A Restriction List is applied to a TCe object so that the object is not viewable by
Suppliers on the restriction list. Although any user may request a restriction list for their
data, only a Data Admin may approve and implement the restriction. Once imposed, only
a DBA may remove a restriction list. Another thing to notice here is that the user can
request a Restriction List only for those objects owned by him/her.



                             Choose
                             who
                             should not
                             see the
                             data




PLM World ‘06                                                                   Khoubyari/Somisetty
PLM Security



         Case Studies

         1) Protecting Highly Secret Data
         2) Program Based Data Management
         3) Competitive suppliers working on same
           Project



PLM World ‘06                                  Khoubyari/Somisetty
Case Study 1 --- Protecting Highly Secret data

  Problem: Casting & Forging Engineering (CFE) Team needs a secure place
  /environment in TCe to store their concepts & tooling suppliers data.
   Business drivers:
   •     Only authorized Ford Motor Company
         employees should have access to CFE data

   •     All Casting & Forging suppliers and Joint
         Ventures should interact with TCe through a
         data coordinator
                                                       Challenges:
   •     CFE data access will be granted on a proven
         business case                                 •   Required security is much granular than as
                                                           defined in the FMC C3P Security Policy

                                                       •   Highly secured data is sharing Product structure
                                                           with other data

                                                       •   A completely new scenario….different from rest
                                                           of the majority of Ford Internal groups

PLM World ‘06                                                                                 Khoubyari/Somisetty
Case Study 1 --- Protecting Highly Secret data
Solution to store highly secured data in TCe
                                         Isolated group with                             Transfer WIP                  Many idiosyncrasies
             Create PTO
                                         data only accessible                               data to                    in transfer process
               specific                  to members of the                                                             from secure to
                                                                                          non-secure
            secure group                 group                                                                         non-secure group
                                                                                             group

                                                                                           Manage                      Once transferred to
            Assign Users
                                            Standard UARS                                Project and                   non-secure group
                 to                         request process                                                            normal TCe viewing
                                                                                            Data
            secure group                                                                                               behavior exists
                                                                                        Classification

                                         All data created by                               Restriction                 Where required, use
            Create Data in               members is
                                         automatically
                                                                                             List for                  Restriction lists to
            secure group                                                                                               block Supplier access
                                         owned by the group                                 suppliers

        ·     Pros:
                ·   Maintains extremely tight control of data within Secure group
       ·      Cons:
                ·   There is no cross-group access to data, including other secure groups within the PTO discipline
                       ·   Cross group access could be created, but would be a permanent condition. PTO would not have access to grant or
                           revoke this access “on the fly”.
                       ·   Any change to the original set-up between secure groups would require a CR with an extended timeline for deployment
                           of the change.
                ·   Once an Item Revision is transferred to a non-secure group and frozen, it is not possible to restrict it again.
                ·   This set-up violates the current corporate security policy and a change to the policy would require Engineering Director
                    approval from all functional areas.
PLM World ‘06                                                                                                                             Khoubyari/Somisetty
Case Study 2 --- Program based data management
   Problem: Program based data management to support Powertrain
   Program life cycle
   Business drivers:
   Powertrain needs top level program
   nodes for all engine/transmission
   families/programs in TCe. This
   enables Powertrain to develop
   Powertrain
   commodities based on the P/T
   product development process.
   Furthermore,
   This allows Powertrain to operate
   multiple engine/transmission
   programs
   under top level program nodes and
   provide data to vehicle programs as
   needed.                               Solution:
                                         Creation of a Project for each engine/transmission program family and
                                         Utilize project based security concept that exists in TCe
PLM World ‘06                                                                                 Khoubyari/Somisetty
Case Study 3 --- Problem Statement

   Restricting competitive suppliers working on
   same project viewing from each others data

   Business drivers:                                                                               Restricted for
                                                     Context for Supplier B                         Supplier A
   FMC agreements with Suppliers
   prohibit to share competitive suppliers
   data with each other
                                                                                                                    DR 1?   prt
                                                        DI-8S7G-9H487-BA         DR-8S7G-9H487-BA
           PH Engine Fuel
                            PH Fuel Injectors   DS     MANF ASY-FUL CHG          MANF ASY-FUL CHG
           Charging Unit                                                   asm                       asm            DR 2?   prt



                                                       DI-8S7G-12257-AA2         DR-8S7G-12257-AA2                  DR 3?   prt
                                                       BRKT-IGN CIL MTNG         BRKT-IGN CIL MTNG
                                                                           asm                       asm            DR 4?   prt


                                                                                                                    DR 5?   prt
                                                        DI-8S7G-9F593-AB          DR-S7G9F593-AB
                                                           INJ ASY FUL             MANF ASY-FUL
                                                                           asm                       asm            DR 6?   prt




                                                     Context for Supplier A
     Supplier’s are working on different data
     for the same Powertrain program                                                               Restricted for
                                                                                                    Supplier B
PLM World ‘06                                                                                                               Khoubyari/Somisetty
Case Study 3 --- Solution
   FMC is making use of Access Control List(ACL) or Restriction List concept
   available in TCe




                  Before Applying ACL




PLM World ‘06                                                       Khoubyari/Somisetty
Case Study 3 --- Solution cont….
   FMC is making use of Access Control List(ACL) or Restriction List concept
   available in TCe.




                After Applying ACL




                            Restricted Supplier user’s view
PLM World ‘06                                                       Khoubyari/Somisetty
PLM Security
                  Q&A




PLM World ‘06           Khoubyari/Somisetty

More Related Content

What's hot

BA and CMMI by Ivaylo Gueorguiev
BA and CMMI by Ivaylo GueorguievBA and CMMI by Ivaylo Gueorguiev
BA and CMMI by Ivaylo GueorguievIIBA_Bulgaria
 
Fcs Software Solutions Corporate Presentation V1 0 (3)
Fcs Software Solutions Corporate Presentation V1 0 (3)Fcs Software Solutions Corporate Presentation V1 0 (3)
Fcs Software Solutions Corporate Presentation V1 0 (3)Akshay Pandita
 
Lego handout-agile2012
Lego handout-agile2012Lego handout-agile2012
Lego handout-agile2012drewz lin
 
Proj desresdeliv gsw
Proj desresdeliv gswProj desresdeliv gsw
Proj desresdeliv gswwoznite65
 
PMI NA Global congress 2011
PMI NA Global congress 2011PMI NA Global congress 2011
PMI NA Global congress 2011Joseph Flahiff
 
Hercules C Project Overview
Hercules C Project OverviewHercules C Project Overview
Hercules C Project Overviewnkyrt
 
2007 EBU Training VRT integrated newsroom project
2007 EBU Training VRT integrated newsroom project2007 EBU Training VRT integrated newsroom project
2007 EBU Training VRT integrated newsroom projectEuropean Broacasting Union
 
Vsc Overview
Vsc OverviewVsc Overview
Vsc Overviewmlouderb
 
Day 1 p3 - project and portfolio management
Day 1   p3 - project and portfolio managementDay 1   p3 - project and portfolio management
Day 1 p3 - project and portfolio managementLilian Schaffer
 
Corporate Presentation It Rspl
Corporate Presentation It   RsplCorporate Presentation It   Rspl
Corporate Presentation It RsplNeha Bagga
 
Using the CMMI-SVC to Transform an Organization into a High-Functioning, Cust...
Using the CMMI-SVC to Transform an Organization into a High-Functioning, Cust...Using the CMMI-SVC to Transform an Organization into a High-Functioning, Cust...
Using the CMMI-SVC to Transform an Organization into a High-Functioning, Cust...Henry Schneider
 

What's hot (20)

Heizer 02
Heizer 02Heizer 02
Heizer 02
 
BA and CMMI by Ivaylo Gueorguiev
BA and CMMI by Ivaylo GueorguievBA and CMMI by Ivaylo Gueorguiev
BA and CMMI by Ivaylo Gueorguiev
 
Fcs Software Solutions Corporate Presentation V1 0 (3)
Fcs Software Solutions Corporate Presentation V1 0 (3)Fcs Software Solutions Corporate Presentation V1 0 (3)
Fcs Software Solutions Corporate Presentation V1 0 (3)
 
Heizer 16
Heizer 16Heizer 16
Heizer 16
 
Snp T bone-dpm_overview
Snp T bone-dpm_overviewSnp T bone-dpm_overview
Snp T bone-dpm_overview
 
T bone brochure en(1)
T bone brochure en(1)T bone brochure en(1)
T bone brochure en(1)
 
Lego handout-agile2012
Lego handout-agile2012Lego handout-agile2012
Lego handout-agile2012
 
Proj desresdeliv gsw
Proj desresdeliv gswProj desresdeliv gsw
Proj desresdeliv gsw
 
MT-C - company presentation
MT-C - company presentationMT-C - company presentation
MT-C - company presentation
 
GBM Corporate Brochure
GBM Corporate BrochureGBM Corporate Brochure
GBM Corporate Brochure
 
PMI NA Global congress 2011
PMI NA Global congress 2011PMI NA Global congress 2011
PMI NA Global congress 2011
 
Hercules C Project Overview
Hercules C Project OverviewHercules C Project Overview
Hercules C Project Overview
 
2007 EBU Training VRT integrated newsroom project
2007 EBU Training VRT integrated newsroom project2007 EBU Training VRT integrated newsroom project
2007 EBU Training VRT integrated newsroom project
 
Vsc Overview
Vsc OverviewVsc Overview
Vsc Overview
 
Ch07
Ch07Ch07
Ch07
 
Day 1 p3 - project and portfolio management
Day 1   p3 - project and portfolio managementDay 1   p3 - project and portfolio management
Day 1 p3 - project and portfolio management
 
Corporate Presentation It Rspl
Corporate Presentation It   RsplCorporate Presentation It   Rspl
Corporate Presentation It Rspl
 
Using the CMMI-SVC to Transform an Organization into a High-Functioning, Cust...
Using the CMMI-SVC to Transform an Organization into a High-Functioning, Cust...Using the CMMI-SVC to Transform an Organization into a High-Functioning, Cust...
Using the CMMI-SVC to Transform an Organization into a High-Functioning, Cust...
 
Heizer Chapter ch02
Heizer Chapter  ch02Heizer Chapter  ch02
Heizer Chapter ch02
 
BPM enabled e-governance
BPM enabled e-governanceBPM enabled e-governance
BPM enabled e-governance
 

Viewers also liked

Lean in new Product Development by Jim Morgan
Lean in new Product Development by Jim MorganLean in new Product Development by Jim Morgan
Lean in new Product Development by Jim MorganLean Enterprise Academy
 
4 Steps to Successful Big Data Product Management
4 Steps to Successful Big Data Product Management4 Steps to Successful Big Data Product Management
4 Steps to Successful Big Data Product ManagementTravis Turney
 
Forge - DevCon 2016: Cloud PDM Demystified – The Future of File Management
Forge - DevCon 2016: Cloud PDM Demystified – The Future of File ManagementForge - DevCon 2016: Cloud PDM Demystified – The Future of File Management
Forge - DevCon 2016: Cloud PDM Demystified – The Future of File ManagementAutodesk
 
SharePoint PLM Software Overview
SharePoint PLM Software OverviewSharePoint PLM Software Overview
SharePoint PLM Software OverviewAras
 
Merging PLM and Microsoft SharePoint Strategies from GPDIS 2009
Merging PLM and Microsoft SharePoint Strategies from GPDIS 2009Merging PLM and Microsoft SharePoint Strategies from GPDIS 2009
Merging PLM and Microsoft SharePoint Strategies from GPDIS 2009Razorleaf Corporation
 
COE2010 Razorleaf ENOVIA SmarTeam Deployment at AS&E
COE2010 Razorleaf ENOVIA SmarTeam Deployment at AS&ECOE2010 Razorleaf ENOVIA SmarTeam Deployment at AS&E
COE2010 Razorleaf ENOVIA SmarTeam Deployment at AS&ERazorleaf Corporation
 
Siemens Teamcenter Express software
Siemens Teamcenter Express softwareSiemens Teamcenter Express software
Siemens Teamcenter Express softwarePritesh Patel
 
High Performance PLM: Key Success Factors for PLM Strategy, Implementation, a...
High Performance PLM: Key Success Factors for PLM Strategy, Implementation, a...High Performance PLM: Key Success Factors for PLM Strategy, Implementation, a...
High Performance PLM: Key Success Factors for PLM Strategy, Implementation, a...PTC
 
Dassault systemes enovia multi cad 2012
Dassault systemes enovia multi cad 2012Dassault systemes enovia multi cad 2012
Dassault systemes enovia multi cad 2012David Segal
 
Managing CATIA V5 in PDM... Simply for COE Ask The Expert
Managing CATIA V5 in PDM... Simply for COE Ask The ExpertManaging CATIA V5 in PDM... Simply for COE Ask The Expert
Managing CATIA V5 in PDM... Simply for COE Ask The ExpertRazorleaf Corporation
 
Toyota’s Management System Tools and Behaviours
Toyota’s Management System Tools and Behaviours Toyota’s Management System Tools and Behaviours
Toyota’s Management System Tools and Behaviours Lean Enterprise Academy
 
Siemens PLM Connection Europe - Helmuth Ludwig
Siemens PLM Connection Europe - Helmuth LudwigSiemens PLM Connection Europe - Helmuth Ludwig
Siemens PLM Connection Europe - Helmuth LudwigDora Smith
 
Guide to New Product Development (NPD)
Guide to New Product Development (NPD)Guide to New Product Development (NPD)
Guide to New Product Development (NPD)Technology Multipliers
 
Toyota Management System by Takashi Tanaka and Sharon Tanner
Toyota Management System by Takashi Tanaka and Sharon TannerToyota Management System by Takashi Tanaka and Sharon Tanner
Toyota Management System by Takashi Tanaka and Sharon TannerLean Enterprise Academy
 

Viewers also liked (16)

Lean in new Product Development by Jim Morgan
Lean in new Product Development by Jim MorganLean in new Product Development by Jim Morgan
Lean in new Product Development by Jim Morgan
 
4 Steps to Successful Big Data Product Management
4 Steps to Successful Big Data Product Management4 Steps to Successful Big Data Product Management
4 Steps to Successful Big Data Product Management
 
Forge - DevCon 2016: Cloud PDM Demystified – The Future of File Management
Forge - DevCon 2016: Cloud PDM Demystified – The Future of File ManagementForge - DevCon 2016: Cloud PDM Demystified – The Future of File Management
Forge - DevCon 2016: Cloud PDM Demystified – The Future of File Management
 
SharePoint PLM Software Overview
SharePoint PLM Software OverviewSharePoint PLM Software Overview
SharePoint PLM Software Overview
 
Merging PLM and Microsoft SharePoint Strategies from GPDIS 2009
Merging PLM and Microsoft SharePoint Strategies from GPDIS 2009Merging PLM and Microsoft SharePoint Strategies from GPDIS 2009
Merging PLM and Microsoft SharePoint Strategies from GPDIS 2009
 
COE2010 Razorleaf ENOVIA SmarTeam Deployment at AS&E
COE2010 Razorleaf ENOVIA SmarTeam Deployment at AS&ECOE2010 Razorleaf ENOVIA SmarTeam Deployment at AS&E
COE2010 Razorleaf ENOVIA SmarTeam Deployment at AS&E
 
Siemens Teamcenter Express software
Siemens Teamcenter Express softwareSiemens Teamcenter Express software
Siemens Teamcenter Express software
 
High Performance PLM: Key Success Factors for PLM Strategy, Implementation, a...
High Performance PLM: Key Success Factors for PLM Strategy, Implementation, a...High Performance PLM: Key Success Factors for PLM Strategy, Implementation, a...
High Performance PLM: Key Success Factors for PLM Strategy, Implementation, a...
 
Dassault systemes enovia multi cad 2012
Dassault systemes enovia multi cad 2012Dassault systemes enovia multi cad 2012
Dassault systemes enovia multi cad 2012
 
Managing CATIA V5 in PDM... Simply for COE Ask The Expert
Managing CATIA V5 in PDM... Simply for COE Ask The ExpertManaging CATIA V5 in PDM... Simply for COE Ask The Expert
Managing CATIA V5 in PDM... Simply for COE Ask The Expert
 
Leading using the Oobeya Room
Leading using the Oobeya RoomLeading using the Oobeya Room
Leading using the Oobeya Room
 
Toyota’s Management System Tools and Behaviours
Toyota’s Management System Tools and Behaviours Toyota’s Management System Tools and Behaviours
Toyota’s Management System Tools and Behaviours
 
Siemens PLM Connection Europe - Helmuth Ludwig
Siemens PLM Connection Europe - Helmuth LudwigSiemens PLM Connection Europe - Helmuth Ludwig
Siemens PLM Connection Europe - Helmuth Ludwig
 
Guide to Product Lifecycle Management
Guide to Product Lifecycle ManagementGuide to Product Lifecycle Management
Guide to Product Lifecycle Management
 
Guide to New Product Development (NPD)
Guide to New Product Development (NPD)Guide to New Product Development (NPD)
Guide to New Product Development (NPD)
 
Toyota Management System by Takashi Tanaka and Sharon Tanner
Toyota Management System by Takashi Tanaka and Sharon TannerToyota Management System by Takashi Tanaka and Sharon Tanner
Toyota Management System by Takashi Tanaka and Sharon Tanner
 

Similar to Plm World 06

Metamation overview presentation
Metamation overview presentationMetamation overview presentation
Metamation overview presentationMetamation Inc.
 
Caddzoom june10
Caddzoom june10Caddzoom june10
Caddzoom june10caddcentre
 
IBM i 7.1 - Desarrollo de aplicaciones
IBM i 7.1 - Desarrollo de aplicacionesIBM i 7.1 - Desarrollo de aplicaciones
IBM i 7.1 - Desarrollo de aplicacionesHELP400
 
Ceradyne and Aras PLM Software for Complex Materials
Ceradyne and Aras PLM Software for Complex MaterialsCeradyne and Aras PLM Software for Complex Materials
Ceradyne and Aras PLM Software for Complex MaterialsAras
 
Transnet’S Competitive Supplier Development Program (Csdp)
Transnet’S Competitive Supplier Development Program (Csdp)Transnet’S Competitive Supplier Development Program (Csdp)
Transnet’S Competitive Supplier Development Program (Csdp)Railways and Harbours
 
Career timeline KDS JAN 2013
Career timeline KDS JAN 2013Career timeline KDS JAN 2013
Career timeline KDS JAN 2013Kurt De Somviele
 
Opportunities in challenging_times-steve_robinson
Opportunities in challenging_times-steve_robinsonOpportunities in challenging_times-steve_robinson
Opportunities in challenging_times-steve_robinsonIBM
 
Opportunities In Challenging Times - Steve Robinson
Opportunities In Challenging Times - Steve RobinsonOpportunities In Challenging Times - Steve Robinson
Opportunities In Challenging Times - Steve RobinsonRoopa Nadkarni
 
Opportunities in challenging_times-steve_robinson
Opportunities in challenging_times-steve_robinsonOpportunities in challenging_times-steve_robinson
Opportunities in challenging_times-steve_robinsonIBM
 
Zwcad+ 2012 definitions
Zwcad+ 2012 definitionsZwcad+ 2012 definitions
Zwcad+ 2012 definitionsVX
 
11 Strategies to Deploy PCI Compliant Networks
11 Strategies to Deploy PCI Compliant Networks11 Strategies to Deploy PCI Compliant Networks
11 Strategies to Deploy PCI Compliant NetworksCradlePoint
 
Adopting Agile Tools & Methods In A Legacy Context
Adopting Agile Tools & Methods In A Legacy ContextAdopting Agile Tools & Methods In A Legacy Context
Adopting Agile Tools & Methods In A Legacy ContextXavier Warzee
 
Partner Companies and Super Spec
Partner Companies and Super SpecPartner Companies and Super Spec
Partner Companies and Super SpecTJ Goetz
 
qualcomm annual reports 2003
qualcomm annual reports 2003qualcomm annual reports 2003
qualcomm annual reports 2003finance43
 
From Requirements Management to Release with Git for Android System
From Requirements Management to Release with Git for Android System From Requirements Management to Release with Git for Android System
From Requirements Management to Release with Git for Android System Intland Software GmbH
 
Koen vosters improving-yoursp_solutiondesign-spsbe13
Koen vosters improving-yoursp_solutiondesign-spsbe13Koen vosters improving-yoursp_solutiondesign-spsbe13
Koen vosters improving-yoursp_solutiondesign-spsbe13BIWUG
 
Carestream Health Global Product Development using Aras for Enterprise-wide PLM
Carestream Health Global Product Development using Aras for Enterprise-wide PLMCarestream Health Global Product Development using Aras for Enterprise-wide PLM
Carestream Health Global Product Development using Aras for Enterprise-wide PLMAras
 

Similar to Plm World 06 (20)

Metamation overview presentation
Metamation overview presentationMetamation overview presentation
Metamation overview presentation
 
Caddzoom june10
Caddzoom june10Caddzoom june10
Caddzoom june10
 
IBM i 7.1 - Desarrollo de aplicaciones
IBM i 7.1 - Desarrollo de aplicacionesIBM i 7.1 - Desarrollo de aplicaciones
IBM i 7.1 - Desarrollo de aplicaciones
 
Ceradyne and Aras PLM Software for Complex Materials
Ceradyne and Aras PLM Software for Complex MaterialsCeradyne and Aras PLM Software for Complex Materials
Ceradyne and Aras PLM Software for Complex Materials
 
Transnet’S Competitive Supplier Development Program (Csdp)
Transnet’S Competitive Supplier Development Program (Csdp)Transnet’S Competitive Supplier Development Program (Csdp)
Transnet’S Competitive Supplier Development Program (Csdp)
 
Career timeline KDS JAN 2013
Career timeline KDS JAN 2013Career timeline KDS JAN 2013
Career timeline KDS JAN 2013
 
Opportunities in challenging_times-steve_robinson
Opportunities in challenging_times-steve_robinsonOpportunities in challenging_times-steve_robinson
Opportunities in challenging_times-steve_robinson
 
Opportunities In Challenging Times - Steve Robinson
Opportunities In Challenging Times - Steve RobinsonOpportunities In Challenging Times - Steve Robinson
Opportunities In Challenging Times - Steve Robinson
 
Opportunities in challenging_times-steve_robinson
Opportunities in challenging_times-steve_robinsonOpportunities in challenging_times-steve_robinson
Opportunities in challenging_times-steve_robinson
 
Zwcad+ 2012 definitions
Zwcad+ 2012 definitionsZwcad+ 2012 definitions
Zwcad+ 2012 definitions
 
Understanding Mda
Understanding MdaUnderstanding Mda
Understanding Mda
 
11 Strategies to Deploy PCI Compliant Networks
11 Strategies to Deploy PCI Compliant Networks11 Strategies to Deploy PCI Compliant Networks
11 Strategies to Deploy PCI Compliant Networks
 
Introduction to cad cam
Introduction to cad camIntroduction to cad cam
Introduction to cad cam
 
Adopting Agile Tools & Methods In A Legacy Context
Adopting Agile Tools & Methods In A Legacy ContextAdopting Agile Tools & Methods In A Legacy Context
Adopting Agile Tools & Methods In A Legacy Context
 
Partner Companies and Super Spec
Partner Companies and Super SpecPartner Companies and Super Spec
Partner Companies and Super Spec
 
qualcomm annual reports 2003
qualcomm annual reports 2003qualcomm annual reports 2003
qualcomm annual reports 2003
 
From Requirements Management to Release with Git for Android System
From Requirements Management to Release with Git for Android System From Requirements Management to Release with Git for Android System
From Requirements Management to Release with Git for Android System
 
PLM - ERP integration
PLM - ERP integrationPLM - ERP integration
PLM - ERP integration
 
Koen vosters improving-yoursp_solutiondesign-spsbe13
Koen vosters improving-yoursp_solutiondesign-spsbe13Koen vosters improving-yoursp_solutiondesign-spsbe13
Koen vosters improving-yoursp_solutiondesign-spsbe13
 
Carestream Health Global Product Development using Aras for Enterprise-wide PLM
Carestream Health Global Product Development using Aras for Enterprise-wide PLMCarestream Health Global Product Development using Aras for Enterprise-wide PLM
Carestream Health Global Product Development using Aras for Enterprise-wide PLM
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Plm World 06

  • 1. PLM World ‘06 Solving PLM Security Concerns Using Teamcenter Sassan Khoubyari Chief Program Manager Global Powertrain C3PNG Methods & Deployment Ford Motor Company skhoubya@ford.com www.ford.com Suresh Somisetty C3PNG PIM Security Specialist Mechatronics Inc. ssomiset@ford.com www.mechatronics-us.com
  • 2. Evolution of the Ford Product Creation Process Since 1985 1992 1993 1996 2005+ CTC WCT WCP FPDS GPDS Global Product Concept World World Ford Product Development to Class Class Development System Customer Timing Process System An Enterprise- wide process MBJ#1* 72 MBJ#1 68 MBJ#1 65 MBJ#1 43 MBJ#1 built from Global Best Practices * <KO> equivalent timing for S4/P4 program PLM World ‘06 Khoubyari/Somisetty For Joint Programs
  • 3. Key Business Drivers – Commonality (Before C3PNG) Manual Requirements: Processes and Current Situation: Resources •Different PDM •Common PDM •Different Product Structure •Common Product Structure •Different CAD •Common CAD Manual Supplier Supplier FNA Processes and PDM CAD PDM CAD Resources Metaphase IDEAS VPM CATIA V5 Volvo Supplier Supplier FOE PDM CAD PDM CAD VPM CATIA V4 Metaphase IDEAS Manual Processes and Resources Supplier Mazda Supplier Jaguar PDM CAD PDM CAD Metaphase IDEAS Manual Metaphase IDEAS Processes CAD and GNC Resources Supplier Land Rover Manual PDM CAD VPM CATIA V4 Processes and Resources Our current Methods/Tools/Data environment inhibits cross brand programs PLM World ‘06 Khoubyari/Somisetty
  • 4. PLM Security · C3P-Next Generation (Ford PLM Initiative) CATIA V5(excluding PT), IDEAS Teamcenter Engineering(TCe) & Teamcenter Manufacturing (TCm) AVBOM, Vismock, Tecnomatics, etc…. • Security is probably one of the most important issues during migration from C3P Classic (Metaphase/TDM) to C3P Next Generation. • The real challenge was to customize the TCe security module to comply with the Ford Motor Company’s C3P Security policy • Users acceptance to the changes is always a challenge PLM World ‘06 Khoubyari/Somisetty
  • 5. Challenges When FMC Powertrain decides to be part of the single/shared data management tool(C3P-NG), there were many concerns/requirements from users about the security Over exposure of data to many users • Many groups need to use/share same database for their daily work • Work In Progress data of any user gets exposed to beyond his/her group • Proper Naming & Numbering is must from beginning Multiple Roles & Responsibilities • Demand for following types of Roles • Engineer, Designer, Team Designer, Viewer, CAE Analyst, Data Admin, Plant Engineer, etc… PLM World ‘06 Khoubyari/Somisetty
  • 6. Challenges Restricting access to highly “Secret” data only for authorized users • Any data that is classified as highly ‘Secret” should be protected from unauthorized users including FMC users Example: • Tooling data • Research & Advanced Engineering data Restricting write privileges on data to only few set of users or group of users • A demand for clear definition of who should have write access & Who should have read access • Limiting Data Admin roles PLM World ‘06 Khoubyari/Somisetty
  • 7. Challenges Restricting Suppliers to only data that they are supposed to view/work • Supplier users should have access to the data only on need basis • Protecting competitive suppliers data from each other • Availability of required data to suppliers with no delay A secured place for Joint Ventures to store & collaborate their work • Ford Joint Ventures usually work with many OEMs • Provision to store Ford & Non Ford data in a single database & provide access to Ford users only for their data • Secret data should be protected from access by non-JV personnel • A provision to store/organise Catalog Parts & restrict access to only JV users PLM World ‘06 Khoubyari/Somisetty
  • 8. Security in Legacy Environment · Legacy environment (FMC calls it as C3P Classic) provides two step/level data management. · In first level, a group of users manage their working data in the localized Team Data Manager i.e IDEAS TDM. Users feel their data is secured here by limiting access to only TDM users. C3P Classic Metaphase TDM TDM Group of Users Group of Users I-DEAS I-DEAS I-DEAS I-DEAS Vehicle & Powertrain Development PLM World ‘06 Khoubyari/Somisetty
  • 9. Security in Legacy Environment cont… · Users share/send the data to second level of data management (Metaphase) only on need basis & users are comfortable to share their data since data reached certain maturity. · Legacy approach gave users to work in their domain without exposing the work in progress data to other downstream users in the organization and only share data that is mature enough. This provides indirect security to Work In Progress data. · Ford Joint Venture companies are able to work with this model and keep data secured as required PLM World ‘06 Khoubyari/Somisetty
  • 10. Security in Legacy Environment cont… Following diagram shows how Ford JVs operate in C3P Classic environment Metaphase Metaphase (PTO- Merk) (PTO- Merk) Non Ford Supplier Ford Data Data TDM’s TDM’s Agencie (operated by Ford IT) (operated by Ford s IT) FDX Odett e Ford Net JV Subnet Secured Network Nodes (accessible only through JV subnet) JV Data Coordinator PLM World ‘06 Khoubyari/Somisetty
  • 11. C3P Next Generation · When FMC Powertrain started thinking about the C3P Next generation tools, following were NA * major requirements · Business operations approach has changed and now OEMs are spawned across the globe Europe · Severaljob and faster to market approachsimilar type of groups in the organization doing · Demanding possible to reduce cycleproduct data as much as re-usability of company time · PLM toolstoseem to be providing better but solutions today's OEMs security needs needs reasonable amount of customization. PLM World ‘06 Khoubyari/Somisetty
  • 12. C3P-NG Security – Key Concepts Security module for C3P NG is built/configured in compliance with the FMC CAD/CAM/CAE/PIM Security Policy Following are the few key PLM Security concepts implemented as part of C3P-NG. · Groups · Ford · Supplier · Data Classification · Secret · Confidential · Proprietary · Project Based Security · Create / Manage Projects on-the-fly · Only read access is controlled based on the Project · Restriction Lists · To restrict competitive suppliers viewing each others data PLM World ‘06 Khoubyari/Somisetty
  • 13. C3P-NG Security – How does it work? • For every Engine/Transmission family of programs, a project in TCe would be created. Ex: MODENG • There are three sub-groups created for Powertrain users under each CBG. PLM World ‘06 Khoubyari/Somisetty
  • 14. C3P-NG Security – How does it work? • Powertrain users could request a role in TCe for any specific project using a web based user access request system. Authorizer Project Sub-group PLM World ‘06 Khoubyari/Somisetty
  • 15. C3P-NG Security – How does it work? • Powertrain users could request a role in TCe for any specific project using a web based user access request system. Cont… Access Gatekeepr Role PLM World ‘06 Khoubyari/Somisetty
  • 16. C3P-NG Security – How does it work? A snapshot of TCe My Navigator for user role, group & project Notice that user got a Designer role under ENGINE group in FNA for ‘MODENG’ project PLM World ‘06 Khoubyari/Somisetty
  • 17. C3P-NG Security – How does it work? Product Configuration • Every project in TCe gets an V Design 030101 Solution associated product structure Design V Solution 030100 to store the data V 030000 030102 EBOM MP (Carry Over Master Package) Node MODENG VSS Node Node Publish Reference Copy Node Collaboration Node Design Information ECS PDN Deliverables Design Design Design Context Instance Rep CAE Deliverables CAD CAD PLM World ‘06 Khoubyari/Somisetty
  • 18. C3P-NG Security – How does it work? • Apply Security Data Classification The purpose of the Data Classification is to apply a value to the Item that denotes its Security Classification based on Ford's Global Information Standard 2 (GIS2). This Security Classification is used to control viewing privileges on the data. Double click PLM World ‘06 Khoubyari/Somisetty
  • 19. C3P-NG Security – How does it work? View access to the data is decided based on it’s association to a Project TCe Projects are an OOTB concept that allows for the Assign Project Assign assignment of Users and MODENG Data Objects to a Project or Projects. By comparing the User and Data Object assignments, Project based security controls view access View Access Data Object User 1 to Data objects. A View access Privileges User Type Data Classification Secret Confidential Proprietary Ford P A A View Access Key: Supplier P P A A = Across all Programs/Projects P = Per Program/Project PLM World ‘06 Khoubyari/Somisetty
  • 20. C3P-NG Security – How does it work? • Applying Restriction List (if necessary) A Restriction List is applied to a TCe object so that the object is not viewable by Suppliers on the restriction list. Although any user may request a restriction list for their data, only a Data Admin may approve and implement the restriction. Once imposed, only a DBA may remove a restriction list. Another thing to notice here is that the user can request a Restriction List only for those objects owned by him/her. Choose who should not see the data PLM World ‘06 Khoubyari/Somisetty
  • 21. PLM Security Case Studies 1) Protecting Highly Secret Data 2) Program Based Data Management 3) Competitive suppliers working on same Project PLM World ‘06 Khoubyari/Somisetty
  • 22. Case Study 1 --- Protecting Highly Secret data Problem: Casting & Forging Engineering (CFE) Team needs a secure place /environment in TCe to store their concepts & tooling suppliers data. Business drivers: • Only authorized Ford Motor Company employees should have access to CFE data • All Casting & Forging suppliers and Joint Ventures should interact with TCe through a data coordinator Challenges: • CFE data access will be granted on a proven business case • Required security is much granular than as defined in the FMC C3P Security Policy • Highly secured data is sharing Product structure with other data • A completely new scenario….different from rest of the majority of Ford Internal groups PLM World ‘06 Khoubyari/Somisetty
  • 23. Case Study 1 --- Protecting Highly Secret data Solution to store highly secured data in TCe Isolated group with Transfer WIP Many idiosyncrasies Create PTO data only accessible data to in transfer process specific to members of the from secure to non-secure secure group group non-secure group group Manage Once transferred to Assign Users Standard UARS Project and non-secure group to request process normal TCe viewing Data secure group behavior exists Classification All data created by Restriction Where required, use Create Data in members is automatically List for Restriction lists to secure group block Supplier access owned by the group suppliers · Pros: · Maintains extremely tight control of data within Secure group · Cons: · There is no cross-group access to data, including other secure groups within the PTO discipline · Cross group access could be created, but would be a permanent condition. PTO would not have access to grant or revoke this access “on the fly”. · Any change to the original set-up between secure groups would require a CR with an extended timeline for deployment of the change. · Once an Item Revision is transferred to a non-secure group and frozen, it is not possible to restrict it again. · This set-up violates the current corporate security policy and a change to the policy would require Engineering Director approval from all functional areas. PLM World ‘06 Khoubyari/Somisetty
  • 24. Case Study 2 --- Program based data management Problem: Program based data management to support Powertrain Program life cycle Business drivers: Powertrain needs top level program nodes for all engine/transmission families/programs in TCe. This enables Powertrain to develop Powertrain commodities based on the P/T product development process. Furthermore, This allows Powertrain to operate multiple engine/transmission programs under top level program nodes and provide data to vehicle programs as needed. Solution: Creation of a Project for each engine/transmission program family and Utilize project based security concept that exists in TCe PLM World ‘06 Khoubyari/Somisetty
  • 25. Case Study 3 --- Problem Statement Restricting competitive suppliers working on same project viewing from each others data Business drivers: Restricted for Context for Supplier B Supplier A FMC agreements with Suppliers prohibit to share competitive suppliers data with each other DR 1? prt DI-8S7G-9H487-BA DR-8S7G-9H487-BA PH Engine Fuel PH Fuel Injectors DS MANF ASY-FUL CHG MANF ASY-FUL CHG Charging Unit asm asm DR 2? prt DI-8S7G-12257-AA2 DR-8S7G-12257-AA2 DR 3? prt BRKT-IGN CIL MTNG BRKT-IGN CIL MTNG asm asm DR 4? prt DR 5? prt DI-8S7G-9F593-AB DR-S7G9F593-AB INJ ASY FUL MANF ASY-FUL asm asm DR 6? prt Context for Supplier A Supplier’s are working on different data for the same Powertrain program Restricted for Supplier B PLM World ‘06 Khoubyari/Somisetty
  • 26. Case Study 3 --- Solution FMC is making use of Access Control List(ACL) or Restriction List concept available in TCe Before Applying ACL PLM World ‘06 Khoubyari/Somisetty
  • 27. Case Study 3 --- Solution cont…. FMC is making use of Access Control List(ACL) or Restriction List concept available in TCe. After Applying ACL Restricted Supplier user’s view PLM World ‘06 Khoubyari/Somisetty
  • 28. PLM Security Q&A PLM World ‘06 Khoubyari/Somisetty