ISVs will have to protect their IP from tampering or thieving when it is actually deployed in customer knowledge centers on-premises, in remote places at the sting, or in just a buyer’s general public cloud tenancy. If entire anonymization is impossible, lessen the granularity of the information in your dataset should you intention to create mix