Their backup techniques have a wholly distinctive set of security challenges to maintain out malicious actors in contrast to data in transit that is certainly protected by nicely-outlined protocols in the course of motion. This can be attained by enabling access to only distinct data sets and fields or in the obfuscation of data not necessary prev