About Application Security

To ensure data segregation, each tenant organization is assigned its own secure database within the Neurons for ITSM Data Center.

Users access Neurons for ITSM over the Internet using a browser. Communication between the browser and Neurons for ITSM is secured using HTTPS.

Application functions, such as email, quick actions, or business rules, use internal safeguards to prevent hacking.

This topic contains the following sections:

About Authorization

About Authentication

Working with Encryption Keys

Security Examples

IP Whitelisting

See also Setting Up User Login.