Sensitive information can be stored and processed on the local network instead of exposing
it on the Web or a Cloud based server.
User identification can use the Network logon or users can logon when opening the database application. Only users designated by database administrators can access the database.
Administrators can use database application tools to identify current and historical usage by users and computers.
A separate database application can be installed that gives access to the data in a 'Read Only' environment so users can create their own queries and reports while the data is protected.
Database users can be grouped according to different permission levels, from 'Read Only' to full data access.
Database application has tools for administrators
to control user permissions and passwords.