The data is stored within the protected perimeter in its native form, and when sent outside, it is encrypted at a gateway. Through the widespread use of cloud-based software, this paradigm breaks down. The information either has to be decrypted for further processing on the cloud server, or it has to be taken back into the secure network