Sensitive information can be stored and processed on the local network instead of exposing
it on the Web or a Cloud based server.
User identification can use the Network logon or users can logon when
opening the database application. Only users designated by database
administrators can access the database.
Administrators can use database application tools
to identify current and historical usage by users and computers.
A separate database application can be installed that gives access to the data in a
'Read Only' environment so users can create their own queries and reports while the data
is protected.
Database users can be grouped according to different permission levels, from 'Read Only'
to full data access.
Database application has tools for administrators
to control user permissions and passwords.