A. to compress, deduplicate and inventory data
B. to catalog, analyze and orchestrate data
C. to obfuscate, encrypt and duplicate data
D. to protect, control and copy data
Explanation:
Reference: https://www.redbooks.ibm.com/redbooks/pdfs/sg248488.pdf