Managing access to data and functions
You can install and operate i2® iBase and ensure that access is securely controlled. Access to data and functions is based on the user name and password that are specified by the user when they log on to iBase, but to fully ensure control of the data it is also necessary to manage the physical and logical security of other aspects of the whole system.