{"id":125095,"date":"2022-12-13T09:00:00","date_gmt":"2022-12-13T17:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=125095"},"modified":"2024-04-08T13:45:04","modified_gmt":"2024-04-08T20:45:04","slug":"4-things-to-look-for-in-a-multicloud-data-protection-solution","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/","title":{"rendered":"4 things to look for in a multicloud data protection solution"},"content":{"rendered":"\n

What does it mean to be a multicloud organization? As the name implies, the term describes a model of cloud computing where an organization uses multiple clouds\u2014two or more public clouds, private clouds, or a combination of public, private, and edge clouds\u2014to distribute applications and services. Subscribing to multiple cloud vendors can help your business access best-of-breed solutions along with competitive pricing.<\/p>\n\n\n\n

The downside? Using multiple cloud platforms can create inconsistent infrastructures that don\u2019t scale across environments. This can lead to teams working in silos\u2014bringing increased complexity, additional costs, network security gaps, and risks to business-critical applications and data. It\u2019s not unheard of for some organizations to own 80 to 100 different security tools stitched across hybrid and multicloud environments, while still wondering: are we secure? In this blog, we\u2019ll help you answer that question by detailing four qualities a multicloud data-protection solution should provide and how Microsoft Purview<\/a> can help unify security, compliance, and data protection across your enterprise. <\/p>\n\n\n\n

Multiple clouds require unified data protection<\/h2>\n\n\n\n

Enabling multicloud integration and automation at scale is essential for fostering a robust partner ecosystem. Since 89 percent of enterprise customers have moved to a multicloud environment, maintaining security across your expanding data estate is necessary.1<\/sup> Patchwork solutions can create vulnerabilities; whereas, a comprehensive solution is able to deliver seamless data protection and data governance across your entire digital estate.<\/p>\n\n\n\n

Look for a multicloud security and data-protection solution that:<\/strong><\/p>\n\n\n\n

    \n
  1. Unifies auto-discovery and protection of sensitive data. <\/strong>Your multicloud data-protection solution<\/a> should provide comprehensive security and compliance tools that span both first- and third-party apps and services to include Personally Identifiable Information (PII), such as home addresses, date of birth, and Social Security Numbers. Look for features such as built-in sensitivity labeling within applications and services, including popup user notifications that help guide users on security best practices. These features help ensure all sensitive data is correctly classified and labeled so that files can\u2019t be exfiltrated without proper permissions.

    A data-protection solution with rights management and automatic encryption of emails (and attachments), as well as co-authoring of encrypted documents, will help to ensure secure collaboration. Your multicloud security tool should be flexible enough to allow manual labeling of some sensitive files for leadership-only access (like mergers and acquisitions projects), while also enabling admins to automatically label and protect business files stored in Microsoft SharePoint or Microsoft Teams (like Confidential <\/em>labels for Finance or HR records). This tool should also be able to scan and classify on-premises file shares, as well as cloud applications and services.<\/li>\n\n\n\n
  2. Protects sensitive files and documents from being exfiltrated to third-party applications<\/strong> and services.<\/strong> More than 40 percent of corporate data is dark<\/em>.2<\/sup> Meaning, it\u2019s not classified, protected, or governed. This invites risk in the form of sensitive data leakage, which can harm your reputation and, in the case of leaked PII, lead to costly litigation. Your multicloud security solution should be able to classify files and documents, apply sensitivity labels, provide sharing controls and file governance, and use near real-time data loss prevention<\/a> policies to prevent data leakage across third-party apps.<\/li>\n\n\n\n
  3. Uses automated data discovery across structured and unstructured data. <\/strong>Every organization needs to be able to securely share data both internally and with partners and customers. That\u2019s why your data protection solution needs to provide data scanning and classification for all types of assets across multicloud and on-premises environments. Metadata and descriptions of data assets should be integrated into a holistic map of your data estate. Atop this map, purpose-built apps can create environments for data discovery<\/a>, access management, and insights about your data landscape.<\/li>\n\n\n\n
  4. Applies Zero Trust principles to your entire digital estate.<\/strong> This includes strong multifactor authentication<\/a> to verify user identities, as well as ensuring all endpoints are in compliance. Your data-protection solution should also ensure that governance and compliance policies are built in, and continuous risk assessment and forensics capabilities are implemented. Other key functions should include classifying, labeling, and encrypting emails and documents, as well as adaptive access to software as a service (SaaS) applications and on-premises applications.<\/li>\n<\/ol>\n\n\n\n

    Integrate for comprehensive protection<\/h2>\n\n\n\n

    Overcoming the siloed approach in a multicloud environment can be a challenge. However, the risks are too great to make do with ad-hoc, patchwork security solutions. Beyond PII, also at stake is your business\u2019s intellectual property (IP), financial statements, organizational structures, employee contacts, and other information that could be targeted with ransomware, phishing, and password attacks.<\/p>\n\n\n\n

    Microsoft Purview\u2019s information protection and governance <\/a>capabilities help your organization address potential data vulnerabilities across a multicloud environment by integrating information protection<\/a> and data lifecycle management,<\/a> along with data loss prevention, insider risk management<\/a>, and eDiscovery<\/a>. Microsoft Purview\u2019s data governance portal<\/a> helps manage your entire data landscape\u2014on-premises, multicloud, and SaaS\u2014allowing you to create a comprehensive, up-to-date map of your data wherever it resides. This unified governance enables data curators and security admins to keep your data secure; all while empowering users to find the trustworthy data they need.<\/p>\n\n\n\n

    Microsoft Priva<\/a> adds another layer of protection with privacy risk management<\/a>, helping to identify data-privacy risks and automate mitigation wherever the data lives. To accommodate individuals making requests to review or manage their personal data about themselves, Microsoft Priva Subject Rights Requests<\/a> includes the Microsoft Graph subject rights requests API<\/a>. This powerful API helps your organization do more with less by automating searches across Microsoft Exchange, Microsoft OneDrive, SharePoint, or Teams.<\/p>\n\n\n\n

    And to protect the business-critical apps you rely on, Microsoft Defender for Cloud Apps<\/a> helps you classify sensitive information using real-time controls that monitor data accessed across your multicloud environment. As a cloud access security broker (CASB), Defender for Cloud Apps blocks attacks against your apps using automated identity governance, and it integrates seamlessly with Microsoft Entra Permissions Management<\/a> to root out and remediate permission risks.<\/p>\n\n\n\n

    Look for a built-in data protection solution<\/h2>\n\n\n\n

    Any data-protection solution needs to address the four areas discussed\u2014unified discovery and protection, protection against data exfiltration, control of unstructured data, and a foundation of Zero Trust\u2014across hybrid and multicloud environments. Both Microsoft 365<\/a> and Microsoft Azure<\/a> are purpose-built with Zero Trust<\/a> as a core architectural principle. And with comprehensive, integrated solutions for information protection, data governance, risk management, and compliance, Microsoft Purview<\/a> builds on all four pillars\u2014so you can move forward, fearless.<\/p>\n\n\n\n

    To learn more about Microsoft Security solutions, visit our website<\/a>. Bookmark the Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n\n\n\n

    <\/div>\n\n\n\n
    \n\n\n\n

    1<\/sup>How Many Companies Use Cloud Computing in 2022? All You Need To Know<\/a>, Jacquelyn Bulao, Tech Jury, November 26, 2022.<\/p>\n\n\n\n

    2<\/sup>Unlocking the hidden value of dark data<\/a>, Maria Korolov, CIO. August 11, 2022.<\/p>\n","protected":false},"excerpt":{"rendered":"

    Learn four must-haves for multicloud data protection, including how an integrated solution provides greater scalability and protection across your multicloud and hybrid environment.<\/p>\n","protected":false},"author":107,"featured_media":125101,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3669,4121,3675,3678,3689],"products":[3690,3692,3702,3704,3707,3872,3858,3710,3717,3715,3711],"threat-intelligence":[],"tags":[],"coauthors":[3003,3284],"class_list":["post-125095","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-data-protection","topic-data-security","topic-information-protection-and-governance","topic-multifactor-authentication","topic-zero-trust","products-microsoft-defender","products-microsoft-defender-for-cloud-apps","products-microsoft-entra","products-microsoft-entra-permissions-management","products-microsoft-priva","products-microsoft-priva-risk-management","products-microsoft-priva-subject-rights-requests","products-microsoft-purview","products-microsoft-purview-data-loss-prevention","products-microsoft-purview-information-protection","products-microsoft-purview-insider-risk-management","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-integ-1694638263-281","review-flag-partn-1694638263-177","review-flag-percent"],"yoast_head":"\nUnify your security with Microsoft Purview | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"Discover four solutions for multicloud data protection and how Microsoft Purview helps unify security, compliance, and data protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unify your security with Microsoft Purview | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Discover four solutions for multicloud data protection and how Microsoft Purview helps unify security, compliance, and data protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-13T17:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-08T20:45:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/12\/MSC22_Getty_UK_Healthcare_1130586553.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"684\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anna Chiang, Hammad Rajjoub\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/12\/MSC22_Getty_UK_Healthcare_1130586553.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anna Chiang, Hammad Rajjoub\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/anna-chiang\/\",\"@type\":\"Person\",\"@name\":\"Anna Chiang\"},{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/hammad-rajjoub\/\",\"@type\":\"Person\",\"@name\":\"Hammad Rajjoub\"}],\"headline\":\"4 things to look for in a multicloud data protection solution\",\"datePublished\":\"2022-12-13T17:00:00+00:00\",\"dateModified\":\"2024-04-08T20:45:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/\"},\"wordCount\":1132,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/12\/MSC22_Getty_UK_Healthcare_1130586553.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/\",\"name\":\"Unify your security with Microsoft Purview | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/12\/MSC22_Getty_UK_Healthcare_1130586553.jpg\",\"datePublished\":\"2022-12-13T17:00:00+00:00\",\"dateModified\":\"2024-04-08T20:45:04+00:00\",\"description\":\"Discover four solutions for multicloud data protection and how Microsoft Purview helps unify security, compliance, and data protection.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/12\/MSC22_Getty_UK_Healthcare_1130586553.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/12\/MSC22_Getty_UK_Healthcare_1130586553.jpg\",\"width\":1200,\"height\":684,\"caption\":\"Female surgeon typing on digital tablet in hospital or surgery.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 things to look for in a multicloud data protection solution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unify your security with Microsoft Purview | Microsoft Security Blog","description":"Discover four solutions for multicloud data protection and how Microsoft Purview helps unify security, compliance, and data protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/","og_locale":"en_US","og_type":"article","og_title":"Unify your security with Microsoft Purview | Microsoft Security Blog","og_description":"Discover four solutions for multicloud data protection and how Microsoft Purview helps unify security, compliance, and data protection.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/","og_site_name":"Microsoft Security Blog","article_published_time":"2022-12-13T17:00:00+00:00","article_modified_time":"2024-04-08T20:45:04+00:00","og_image":[{"width":1200,"height":684,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/12\/MSC22_Getty_UK_Healthcare_1130586553.jpg","type":"image\/jpeg"}],"author":"Anna Chiang, Hammad Rajjoub","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/12\/MSC22_Getty_UK_Healthcare_1130586553.jpg","twitter_misc":{"Written by":"Anna Chiang, Hammad Rajjoub","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/anna-chiang\/","@type":"Person","@name":"Anna Chiang"},{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/hammad-rajjoub\/","@type":"Person","@name":"Hammad Rajjoub"}],"headline":"4 things to look for in a multicloud data protection solution","datePublished":"2022-12-13T17:00:00+00:00","dateModified":"2024-04-08T20:45:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/"},"wordCount":1132,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/12\/MSC22_Getty_UK_Healthcare_1130586553.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/","name":"Unify your security with Microsoft Purview | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/12\/MSC22_Getty_UK_Healthcare_1130586553.jpg","datePublished":"2022-12-13T17:00:00+00:00","dateModified":"2024-04-08T20:45:04+00:00","description":"Discover four solutions for multicloud data protection and how Microsoft Purview helps unify security, compliance, and data protection.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/12\/MSC22_Getty_UK_Healthcare_1130586553.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/12\/MSC22_Getty_UK_Healthcare_1130586553.jpg","width":1200,"height":684,"caption":"Female surgeon typing on digital tablet in hospital or surgery."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/13\/4-things-to-look-for-in-a-multicloud-data-protection-solution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"4 things to look for in a multicloud data protection solution"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/125095"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/107"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=125095"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/125095\/revisions"}],"predecessor-version":[{"id":133954,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/125095\/revisions\/133954"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/125101"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=125095"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=125095"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=125095"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=125095"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=125095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=125095"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=125095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}