1 5 Things You Didn t Know About Cloud Backup 1. Data privacy can easily be compromised by encryption key holders. Encryption is vital to data protection and most backup solutions offer it. However, encryption is not always a guarantee of security and privacy of business data. After all, if an employee at your data backup company can access your encryption keys, is your data truly secure? Some service providers have responded to this concern by purporting to escrow the key, saving it separately from data, and rotating it frequently. But no matter the steps taken, as long as the service provider has access to your encryption keys, your data is just not private. And a subpoena will force service providers to produce unencrypted customer data even when encryption keys have been escrowed. Another response to securing encryption keys has been to use an onsite server, behind the client s firewall, to house encryption keys in order to guarantee sole ownership. However, this is not a true solution for cloud-based backups since there is still hardware to manage and maintain, defeating the purpose of cloud services. Additionally, an onsite server adds another point of potential failure, requiring additional data protection. If your service provider has access to your encryption keys, your data is just not private.
2 For maximum privacy, two-factor encryption key management is the recommended solution. With two-factor encryption key management, the encryption key is further encrypted using customer admin credentials, and only a token is stored in the cloud. With this solution, the service provider has zero access to encryption keys and customers avoid the hassle of supporting key servers on-premises. Only customers have access to the key and, subsequently, their data, once authenticated. And to truly guarantee privacy, the key is destroyed at the end of each customer session. 2. Choosing the wrong cloud could mean permanent data loss. Of course, most of the cloud actually exists at ground-level, supported by many connected servers and other devices which require electricity and protection from the elements. As much as dependability of data centers has increased over time, these server farms are still vulnerable to power outages, sabotage, and natural disaster. This is why it s important to understand the Service Level Agreements for any backup providers under consideration. Many cloud service providers don t offer data redundancy across multiple data centers. In the event of a power supply disruption, service is suddenly unavailable and files are out of reach until the problem is corrected. A natural disaster, such as a flood, could even result in permanent loss of your critical corporate data. Leading service providers offer data redundancy across multiple facilities, each of which is physically separate, located in lower risk flood plains and fed via distinct grids from independent utilities. These facilities are connected to different networks to ensure the highest data availability and durability possible. 3. Local cloud backups can violate data residency laws. Traditionally, cloud backup providers have employed a limited number of data centers and housed those data centers within the borders of a single country. Adding Server farms are still vulnerable to power outages, sabotage, and natural disaster. Many cloud service providers don't offer data redundancy across multiple data centers.
3 storage typically requires following a multi-step process, often cumbersome and not immediate. If your business has global reach, these localized backup providers are simply unable to offer a premium, worry-free experience. By definition, a global enterprise supports internal systems which are utilized by employees and other users all over the world, subjecting the enterprise to a specific set of laws in each country. Using localized cloud backup providers from a single country is not only inefficient but, in many cases, it results in a violation of local data residency laws. By contrast, leading cloud backup providers are equipped with multiple redundant data centers across the globe, enabling customers to control which data centers are used for their data backups. Leading providers also utilize an elastic storage concept, enabling customers to add storage instantly in any data center without having to worry about scaling their storage requirements. 4. Without deduplication, your backup speed is a fraction of what it could be. One of the reasons traditional cloud backup systems can be very slow is that the software must compare the last file and directory structure with the latest file and directory structure in order to determine what s changed. Unfortunately, as much as 80 percent of data is duplicated across a typical enterprise. This is because users often have multiple copies of an identical file stored locally, as well as on shared or removable drives. This causes storage requirements to boom, considerably slowing cloud data transfer. When backup solutions practice global deduplication, cloud backup and restore times are dramatically improved because an enormous amount of duplicate data has been identified and removed. To perform enterprise restores quickly, a backup solution must also use multi-threaded restores in order to allow parallel transfers of multiple files. Using multi-threaded restoration significantly accelerates the time it takes to restore data to a user s computer. Using localized cloud backup providers is inefficient and often results in violation of data residency laws. Traditional cloud backup systems without global deduplication can be very slow.
4 WAN optimization will also speed up endpoint backups because WAN optimization makes best use of the available bandwidth. If there s a network interruption, WAN optimization ensures that the dropped backup automatically resumes at precisely the right point. 5. Outdated backup solutions severely restrict IT control. Using older principles of storage technology, some backup companies are not able to leverage federated search, which can quickly locate information anywhere on the network. This is a challenge when attempting to track down a file or to enforce a new policy. Because federated search looks across every file and device in the enterprise, it becomes easy to locate files, gather or even collect them for legal hold, in order to preserve custodian data for e-discovery. On the other hand, modern backup solutions empower IT with visibility and make it easy to enforce policies on data backup, restore, and access. These leading backup companies also make use of detailed audit trails to strengthen IT s oversight and to prevent material information, such as intellectual property, from being compromised due to the increasingly mobile workforce. Detailed audit trails preserve a record of all user and admin activity, as well as provide real-time visibility, enabling organizations to support their governance and compliance needs. If the enterprise is subject to industry regulation, it s well worth it to select a service provider that already has passed the requisite certifications (e.g., HIPAA, PCI-DSS, ITAR) for its data centers and operations. Without federated search, it is a challenge to track down a file or enforce a policy
5 About Druva Druva offers a full suite of endpoint data management solutions for enterprise laptops, PCs, smartphones, and tablets. Its flagship product, insync, empowers an enterprise s mobile workforce with award-winning backup, secure file sharing, data loss prevention, and rich analytics. Deployed on the cloud or on premise, insync is the only solution built with both IT needs and end-user experiences in mind. Druva has over 1,500 customers and protects a million endpoints across 46 countries. With offices in the United States, India and the United Kingdom, Druva is privately held and is backed by Nexus Venture Partners and Sequoia Capital. Information on Druva is available at Druva, Inc. Americas: Europe: +44.(0) APJ:
5 Critical Considerations for Enterprise Cloud Backup This guide is written for IT professionals who play a part in data protection and governance at their enterprises. It is meant to provide an initial
The Essential Security Checklist for Enterprise Endpoint Backup IT administrators face considerable challenges protecting and securing valuable corporate data for today s mobile workforce, with users accessing
APRIL 2013 8 Must-Have Features for Endpoint Backup Ensure corporate data is secure and protected by choosing an endpoint backup solution with the eight features below. 1. Advanced deduplication Because
Your Guide to Cost, Security, and Flexibility What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility 10 common questions answered Over the last decade, cloud backup, recovery
Frequently Asked Questions about Cloud and Online Backup With more companies realizing the importance of protecting their mission-critical data, we know that businesses are also evaluating the resiliency
Moving to the Cloud: What Every CIO Should Know CONTACT SALES US: 1.877.734.6983 UK: +44 (0)845.528.0588 www.egnyte.com WHITEPAPER Overview Enterprise data storage needs are growing exponentially, doubling
Brochure Best practices for cloud-based information governance Autonomy Cloud solutions Information governance in the cloud Key advantages to cloud computing Cloud computing alleviates adoption complexity,
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS Disasters happen. Don t wait until it s too late. OVERVIEW It s inevitable. At some point, your business will experience data loss. It could
PARTNER BRIEF: IS ONLINE BACKUP RIGHT FOR YOUR BUSINESS?........................................ Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid Who
Best Practices for Cloud-Based Information Governance Autonomy White Paper Index Introduction 1 Evaluating Cloud Deployment 1 Public versus Private Clouds 2 Better Management of Resources 2 Overall Cloud
CLOUD IN MOTION QUESTIONS EVERY LIFE SCIENCES COMPANY SHOULD ASK BEFORE MOVING TO THE CLOUD. FRANK JACQUETTE, JACQUETTE CONSULTING, INC. S EVERY LIFE SCIENCES COMPANY SHOULD ASK BEFORE MOVING TO THE CLOUD.
Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Abstract Retrospect backup and recovery software provides a quick, reliable, easy-to-manage disk-to-disk-to-offsite backup solution for SMBs. Use
White Paper: Cloud Solutions for Continuity 2014, igroup ltd. All rights reserved. INTELLECTUAL PROPERTY DISCLAIMER This white paper is for informational purposes only and is provided as is with no warranties
white paper Public or Private Cloud: The Choice is Yours Current Cloudy Situation Facing Businesses There is no debate that most businesses are adopting cloud services at a rapid pace. In fact, a recent
Buyers Guide to ERP Business Management Software one 1. Introduction When you search for ERP or Enterprise Resource Planning on the web, the sheer amount of information that appears can be overwhelming
Technical white paper Top 5 reasons to choose HP Information Archiving Proven, market-leading archiving solutions The value of intelligent archiving The requirements around managing information are becoming
Why cloud backup? Top 10 reasons HP Autonomy solutions Table of contents 3 Achieve disaster recovery with secure offsite cloud backup 4 Free yourself from manual and complex tape backup tasks 4 Get predictable
WHITEPAPER Why Businesses are Embracing Cloud IaaS Why Businesses Are Embracing Cloud IaaS The rise in virtualization means that businesses of all sizes must be positioned to take advantage of the flexibility,
THE BENEFITS OF CLOUD NETWORKING 1 White Paper The Benefits of Cloud Networking Enable cloud networking to lower IT costs & boost IT productivity 2 THE BENEFITS OF CLOUD NETWORKING Table of Contents Introduction
WHITE PAPER: CHOOSING A CLOUD HOSTING PROVIDER WITH CONFIDENCE White Paper Choosing a Cloud Hosting Provider with Confidence Thawte SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers
Enterprise Mobility Management: A Data Security Checklist Executive Summary Secure file sharing, syncing and productivity solutions enable mobile workers to access the files they need from any source at