“…to subpoena-proof the cloud!” We had asked one of our largest customers what they were looking to accomplish with the deployment of our application-level data protection software. This was their response. This certainly did not seem like the typical statement of requirements for a data protection solution! I’ve been in data and network security for nearly […]