
The open-source nature allows for full security audits. On-premise deployment gives us complete data sovereignty. Review collected by and hosted on G2.com.
Lack of some "bells and whistles" found in flashier competitors, but we prefer the focus on core security. Review collected by and hosted on G2.com.
The reviewer uploaded a screenshot or submitted the review in-app verifying them as current user.
Validated through a business email account
Invitation from G2. This reviewer was not provided any incentive by G2 for completing this review.




