Data security is a pillar of Zero Trust. Security leaders must use data security technologies and capabilities to enforce data security and privacy policies.
This report highlights key categories of tools and controls for data security and intersections with technologies that support the ecosystem of adjacent pillars of Zero Trust: workloads, networks, devices, and people.
- Data Isn't "Data" Anymore: How to understand what this new data is
- The Who And The What Both Matter For Securing Data: How to uncover blind spots
- Behavior Is The Key: How to use behavioral monitoring to gain insights into data problems