Safeguarding data against loss, theft or corruption has always been one of the most critical functions of IT organizations. However, the process has become far more complex over the past several years. With the continued transition to cloud, mobile and remote working, the days of simply establishing a secure perimeter around a single, monolithic data repository are long gone.