Manage change orders through a robust process

Create Engineering Change Orders (ECOs) to track design changes and manage major versions. Release designs through an approval process that brings together key stakeholders
Geometric shapeGeometric shapeGeometric shapeGeometric shapeGeometric shapeGeometric shapeGeometric shapeGeometric shapeGeometric shapeGeometric shapeGeometric shape
Engineering Change Orders (ECOs)

Create ECOs to manage revisions

Process driven changes ensure accuracy and remove risk from the development cycle. ECOs capture a group of versions and roll up to a major release.

Change history

Automatically capture design changes and commit history within an ECO

Custom attributes

Add custom ECO attributes, such as attachments, to organize information across complex design changes
Dashboard mockup
Dashboard mockup

Release management

Manage major versions and revisions together for a confident review and release process

View change history

Quickly view change history and contextually understand design updates and releases

Lock designs

Automatically lock designs during the ECO process to ensure no unaccounted changes are captured
Approvals Management

Run an approval process

Request approvals from collaborators before releasing designs. Receive feedback from reviewers and tie them to ECOs.
Ensure everyone is looking at the same design version
Lock designs during the approval process
Set custom workflows across different team members
Security

Security at the heart of it

Vendor access controls

Securely share your designs with vendors for them to view, download, upload designs.

SSO & on-prem

Ensure your account is safe with custom integrations to your enterprise's infrastructure.

Daily encrypted backups

Worried about an accidental deletion of design files? Keep an encrypted backup on the cloud.

Role based access controls

Enable different user permissions and visibility for members across your organization.

Multi-factor authentication

Require your team and vendors to go through a two-step method for authentication.

256-bit encryption

Design files, feedback, comments, approvals. Encrypted in-transit and at rest, so no data can be leaked.