Login and data is handled with the same level of security and tracking as used by banks. We take it one step further for key creating in that the tablet and the user are both authenticated. If a tablet is reported lost it can be deactivated and will no longer be able to make keys even with proper user name and password.
Modified on: Sat, 1 Aug, 2015 at 3:02 PM
Did you find it helpful?Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.