Access and protection on servers or in the cloud, for the data obtained and processed from the different security-focused technology, shielded and monitored to avoid risks and threats to the organization's information.