Data sovereignty in public clouds
The IT world has changed substantially: The traditional security perimeter is proving to no longer be effective as fast-growing technologies, such as cloud, mobile and virtualization make the boundaries of an organization blurry.