This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.
(SELECT count( D1.UserID) AS Users, FinYear FROM ext_UserAudit AS D1 INNER JOIN Dates ON CONVERT(VARCHAR, D1.AuditDate, 110) = CONVERT(VARCHAR, Dates.[DATE], 110) WHERE D1.AuditType = 'User Authenticated' GROUP BY FinYear)
Join the community of 500,000 technology professionals and ask your questions.