Unlike most applications today, we employ security not just at the application level i.e. the application takes care of what data a user has access to, but at the data record level. We protect data as well as the application from unauthorized access, independently. This means for a user, restricted data is not just inaccessible, it is invisible and even if the application we to be compromised, data would still be secure.
With growing complexity of applications and as new third-party applications are built on top of our APIs, we believe this approach to provide unparalleled safeguards against data leakage allowing users to collaborate freely, rest assured that their confidential data, stays that way.