NEXYTE product description Page 18 + Data Flow Controls. NEXYTE architecture ensures that users have no direct access to the database records or to storage files. Only approved data access operations via the business logic layer can be performed, and users can access only their assigned cases, entities and content types according to the system's permission management. + Network Separation. The system's network is sub-netted to separate client workstations from the servers and computers. By doing so, NEXYTE safeguards its servers, and potentially the organization’s network, from malware infections incurred by the workstation. + User Rights and Workstation Access. Only authorized personnel are allowed to access NEXYTE workstations, and each analyst can access only their own assigned cases. + Single Sign-On. Enables users to securely access all workstation applications using a single set of user authentication credentials. + Auditing. Auditing capabilities allow administrators and managers to follow-up and monitor all user activities, specific activities per investigation, entities, etc. Administrators can view the audit trail by running a query regarding a specific user and/or a date range.