target audience: TECH BUYER  Publication date: Mar 2023 - Document type: Tech Buyer Presentation - Doc  Document number: # US50225723

Implementing Zero Trust in Data Protection

By:  Phil Goodwin Loading

Content

  • 15 slides


Get More

When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.



Related Links

On-line Presentation

Abstract


This IDC Tech Buyer Presentation offers practical guidance for implementing zero trust within backup environments. Backup data sets are often a target for cyber-ransomers. In some cases, they delete the backup so it can't be used to recover encrypted primary. In other cases, ransomers try to exfiltrate (steal) backup that may be easier to access than primary data. This exfiltrated data is then held for a ransom under the threat of exposure publicly or on the dark Web. Zero trust is a principle original networks to thwart or limit outside attacks. The same principles should be applied to backups.



Coverage


Do you have questions about this document
or available subscriptions?