Authentication is how users (humans, devices, other applications) prove that they are who they say they are. Our products support a number of authentication mechanisms, including two-factor authentication.
Determines what resources a user is allowed to use, view, or alter. Assignation and management of privileges (including role-based and application-based privileges) are easily accomplished through our products’ System Management Portals.
In our products, all system and application events are recorded in an append-only log, which is compatible with any query or reporting tool that uses SQL.
We provide mechanisms for encrypting both data-at-rest and data-in-motion.