Admin users have the ability to manage all other users in their company. This includes inviting new users, changing their privacy settings, and adding admin users. But it also includes blocking and deleting other users which we will explain in this ...
Data at rest is stored un-encrypted. From a security perspective, access to any data item is always handled through a service, for example, a service to request the sensor names of particular machine. This service will only act if the request passes ...
By establishing trusted relationships, companies join your network. Read more about this in the article: How to set up trusted companies. It is then possible to share particular machines with particular companies as described in the article: How do I ...