07-06-2020 , 11:56 PM
SAFETY: Ensure that reliable copies of your data, applications, and systems are always available
ACCESSIBILITY: Make your data, applications, and systems easily available from anywhere at any time
PRIVACY: Control who has visibility and access to all of your digital assets
AUTHENTICITY: Create undeniable, certifiable proof that a copy is an exact replica of the original
SECURITY: Protect your data, applications, and systems against today’s ever-changing cyberthreats
source