business intelligence authentication business user-proof protection crm data warehouse security management encryption data warehousing single console erp customer strong file-based encryption cryptography