With municipal, county, and state government remaining a high-priority target for hacking, many IT and security teams are looking to strengthen their holistic security capabilities rather than relying purely on perimeter security. This includes ensuring all data is encrypted at rest (for example, when in a storage array) and in flight.

%alt% Preview