target audience: TECH BUYER Publication date: Mar 2023 - Document type: Tech Buyer Presentation - Doc Document number: # US50225723
Implementing Zero Trust in Data Protection
Content
- 15 slides
Get More
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.
Related Links
Abstract
This IDC Tech Buyer Presentation offers practical guidance for implementing zero trust within backup environments. Backup data sets are often a target for cyber-ransomers. In some cases, they delete the backup so it can't be used to recover encrypted primary. In other cases, ransomers try to exfiltrate (steal) backup that may be easier to access than primary data. This exfiltrated data is then held for a ransom under the threat of exposure publicly or on the dark Web. Zero trust is a principle original networks to thwart or limit outside attacks. The same principles should be applied to backups.