How does the Windows Integrated Security model support mission critical PI System deployment patterns while easing administrative effort and improving security? What about data access across multi-tier applications? How can the PI system be security hardened for cyber regulated environments and what are the limitations? This session will highlight considerations using the latest security features to protect your data and data sources.