Data loss prevention
Print blocking
Remote Desktop Protocol (RDP) blocking
Clipboard privacy controls
Restricted virtual desktop infrastructure (VDI) implementation
Data classification blocking
Data loss detection
Watermarking
Digital rights management (DRM)
Network traffic decryption/deep packet inspection
Network traffic analysis
Data classification, labeling, and tagging
Obfuscation
Tokenization
Scrubbing
Masking
Anonymization
Encrypted vs. unencrypted
Data life cycle
Create
Use
Share
Store
Archive
Destroy
Data inventory and mapping
Data integrity management
Data storage, backup, and recovery
Redundant array of inexpensive disks (RAID)