The ever-increasing threat of theft and
misuse of data provides new challenges for the IT infrastructure. Not only the
availability of data but also their protection is important for companies of
all sizes. In the meantime, there are targeted attacks on individual companies
by paid organizations. Systems and data can be encrypted and rendered unusable
for the owner.