BeeCastle Help
Go to BeeCastle
All Collections
Privacy, Security and Data

Privacy, Security and Data

Tom Hilton avatar
2 articles in this collection
Written by Tom Hilton

Roles and Permissions in BeeCastle

An explanation of the different roles a user can hold in BeeCastle and what they enable
Tom Hilton avatar
Written by Tom Hilton
Updated this week

How BeeCastle handles possible security incidents

A detailed explanation of how BeeCastle will respond to possible or real security threats and breaches
Tom Hilton avatar
Written by Tom Hilton
Updated over a week ago
BeeCastle Help