TECH BUYER Mar 2023 - Tech Buyer Presentation - Doc # US50225723
Implementing Zero Trust in Data Protection
This IDC Tech Buyer Presentation offers practical guidance for implementing zero trust within backup environments. Backup data sets are often a target for cyber-ransomers. In some cases, they delete the backup so it can't be used to recover encrypted primary. In other cases, ransomers try to exfiltrate (steal) backup that may be easier to access than primary data. This exfiltrated data is then held for a ransom under the threat of exposure publicly or on the dark Web. Zero trust is a principle original networks to thwart or limit outside attacks. The same principles should be applied to backups.
CIO and Technology Professionals Agenda , Cloud Data Logistics and Protection
Data security, Future of trust, Technology buyer
- 15 slides
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.