To ensure data segregation, each tenant organization is assigned its own secure database within the Neurons for ITSM Data Center.
Users access Neurons for ITSM over the Internet using a browser. Communication between the browser and Neurons for ITSM is secured using HTTPS.
Application functions, such as email, quick actions, or business rules, use internal safeguards to prevent hacking.
This topic contains the following sections:
See also Setting Up User Login.