G2 Crowd User in Legal Services

How can I control who is able to access sensitive data in Nextpoint?

over 2 years ago

We insist on the strongest passwords, two-factor authentication, and device authentication. Administrators can set up differentiated access levels for unique users, providing control over what individual users can do in the application. Every use of the application is authenticated and logged, providing an audit trail of user activities and modifications.