In the last few years, businesses expanded their use of cloud computing from select applications to entire IT infrastructures. With that transition comes new security requirements to ensure the protection, availability and integrity of data, and compliance with privacy regulations.

Technologies recognized in this category support both the policy and protection requirements that emerge with a cloud environment, helping to prevent a compromise of data or applications, or malicious access.