As Data in Transit and at Rest is increasingly protected and the threats on network and storage diminish, attackers have shifted to targeting Data in Use.
With more data being moved to the Cloud, standard security solutions are increasingly limited in their ability to protect against attacks.
New regulations (GDPR) hold custodians accountable in case of a breach leading to leaked data.
The processing and the storage of an increased amount of Data in remote and often difficult to secure locations makes its protection during execution increasingly important.
COVID19 has induced changes in business workflows, IT architectures have become any more isolated than before and IT infrastructure control is increasingly complex. In the process of shaping their post-COVID defense strategy, companies must protect their most-sensitive Data in Use.
Companies with geopolitical and geo-economic responsibilities have to protect their data when sharing it and during processing by third parties.