A security approach which focuses its efforts on a company’s data stores first and foremost, detecting sensitive data, mapping its attack surface and protecting it. This approach puts an emphasis on the involvement of sensitive data and prioritizes its focus accordingly.