Be in complete control over your data privacy and security by choosing your deployment models and architecture