The Missing Piece:
Runtime data protection
Data is unprotected and subject to attack when processed or used in memory (data-in-use).
We use memory encryption technologies to solve this problem.
Transport Layer Security (TLS/SSL) and encrypted communication (VPN) take care of protecting data-in-transit.
File and storage encryption can protect data-at-rest.