Smarter Copy-Paste to Protect Your Data
You work across environments — test, production, staging — and you copy more than text. Sometimes it’s formulas. Sometimes it’s data that shouldn’t mo...
You work across environments — test, production, staging — and you copy more than text. Sometimes it’s formulas. Sometimes it’s data that shouldn’t mo...
The purpose of this article is to show how, in an easy-to-implement way, you can sign and verify documents transparently. The obvious benefit of this...
In recent releases, 4D’s security capabilities have been significantly expanded, particularly in the area of certificates. This includes auto-generate...
Today, you can benefit from a powerful feature to filter access to data, which is essential for preventing malicious access to your application. This...
We recently provided a new way of controlling access to the REST API via the privileges and the ds.authentify function: Force Login. This feature offe...
In an era where data security is paramount, updating security libraries is crucial. 4D v20 has taken a significant step forward by upgrading its Open...
Filter access to data is a must-have feature to prevent malicious access to your application. So far, you could expose or not expose as a REST resour...
4D offers several great avenues for keeping your business application secured. One of these avenues is to secure the data itself using 4D's built-in e...
Security is a fundamental topic for today's business solution systems. At 4D, we understand its importance; that's why we keep delivering features tha...
4D solutions have always been safe and stable. This is because 4D invests heavily in developing and updating security features. 4D continues this focu...
Got a question, suggestion or just want to get in touch with the 4D bloggers? Drop us a line!
* Your privacy is very important to us. Please click here to view our Policy