Watch this video on YouTube
When addressing the security of data being transmitted within a cloud environment, which of the following technologies is not conventionally employed for the protection of data in transit?