Control access at row, user or role level.
pi is aligned to your user authentication and role-based permissions. These security restrictions drive user capability and data visibility. This gives you complete control over who sees what, adding an extra layer of internal security.
User based permissions and restricted views means a department or job function will only see what they need to see or have permissions to see. You can also lock down dashboards and reports or give certain users the ability to change chart types and add in new ones.
Don’t just take our word for it.
We have a range of security activities that regularly take place including 3rd party penetration testing, vulnerability scans, upgrades, threat mitigations, and ECSC outsource security testing of our platform.