TECH BUYER Mar 2023 - Tech Buyer Presentation - Doc # US50225723

Implementing Zero Trust in Data Protection

By:

Phil Goodwin
Loading
On-line Presentation

Abstract

This IDC Tech Buyer Presentation offers practical guidance for implementing zero trust within backup environments. Backup data sets are often a target for cyber-ransomers. In some cases, they delete the backup so it can't be used to recover encrypted primary. In other cases, ransomers try to exfiltrate (steal) backup that may be easier to access than primary data. This exfiltrated data is then held for a ransom under the threat of exposure publicly or on the dark Web. Zero trust is a principle original networks to thwart or limit outside attacks. The same principles should be applied to backups.


Coverage

Content
  • 15 slides


Get More

When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.



Related Links

Do you have questions about this document
or available subscriptions?

Contact Us