Chapters
Executive summary
Introduction
Achieving Secure Data Retention Strategy
Data Domain Retention Lock Software Overview
Retention Lock Governance
Supported Protocols
Considerations for Replication, Extended Retention, and Cloud Tiering
Conclusion
References