The most important is that the security follows the data itself. When you combine data and provide different views, the resulting views are granularly access-controlled automatically, based on the originating data sources. It tracks it throughout all the different types of views in the platform, from the executive dashboard to the data modeling suites as well.

Keyboard shortcuts

j previous speech k next speech