Tenants in a shared datacenter environment are concerned with the privacy of their data as it moves from the application to the database servers in clear text. Which of the following can the provider implement to isolate tenants’ data?
A.
Bandwidth hard limits
B.
Reservations
C.
Resource pooling
D.
VLANs
C.