4.2 Data Transmission and Logging

As with any applications that access data in a networked environment, sensitive data is transmitted as applications interact. Although much of this risk should be addressed by standard network security techniques, there are some Analyzer-specific issues you should consider: