Views: 8 Comprehensive Security for Critical Business Processes The user can decide whether the reports created are made public for those users who have the option to access them, or alternatively keep them private. Request a demo