Data is everywhere; on endpoints, in the cloud, on-premises in remote, branch, and corporate offices. How do you protect your data from ransomware when the attack surface is so great? The first step to securing and protecting your data is to identify it.