• information on local and cloud storage
  • confidential user documents
  • network perimeter of the customer's infrastructure
  • applications and applications
  • endpoint protection