Securing the Data Infrastructure

Secure data by first protecting the infrastructure on which it resides, then securing runtime databases.