a different system needs access to data - advice on what to use and how to secure it?

Printable View