Coming to Grips with Distributed Data: It’s Time to Concentrate on Protecting Data in Use

Andrew Buss, IDC

This IDC Technology Spotlight discusses how an approach to encrypting information and requiring authorization access allows organizations to regain control of their critical digital assets.

  • The importance of protecting information at the point it is created, accessed, and consumed
  • How information spreads while the enterprise retains complete insight as to how extensively
  • How data can be controlled or deleted once it has moved beyond critical control points in the infrastructure

Close ()