IP Based Security
Restrict access to your workflows to only your network via an IP, a range or a list of IP addresses. Use in conjunction with encryption, strong password policies and form IP security to create a robust security framework.
Auditing and Tracking
Every single action taken with your workflows by logged in users is tracked and recorded. You can view what pages they viewed and any actions they've taken. All updates made to your data is also tracked and can be accessed via the audit log, or use our comparison tools to view a DIFF view history of every single field of data in your database.