Unmatched security customizations
Based on the user role and criticality of the data involved, security features and policies can be customized. Contextual access can be enabled to evaluate each access request based on parameters like a user's role, device used, geolocation, time etc. before granting permissions.