Securing i2 Analyze

Depending on the requirements of the deployment, you can configure your deployment to use additional security mechanisms.