17. Complete Data Protection Cycle Usage Access Granularity of Control Protection of data at rest Protection of data in transit Protection of data in use Enterprise DRM Data Loss Prevention Public Key Infrastructure Enterprise Content Mgt. Network Transport Encryption Full Disk Encryption