insync Benefits & Comparison

Similar documents
Druva insync vs. Code42 CrashPlan for Enterprise. Comparison Guide

The Essential Security Checklist. for Enterprise Endpoint Backup

Persona Backup and OS Migration for insync Private Cloud 5.5. June 16, 15

Howtomanage and protectend usersdata? Mati Raidma

APRIL Must-Have Features for Endpoint Backup

Phoenix backs up servers using Windows and Linux operating systems. Here is a list of Windows servers that Phoenix supports:

Security Overview Enterprise-Class Secure Mobile File Sharing

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

How To Backup From Your Computer To Your Phone Or Tablet Or Computer

Druva insync vs. Altiris/Symantec DLO. Comparison Guide

28% Top 10 Endpoint Backup Mistakes And how to avoid them. of corporate data resides exclusively on laptops, smartphones, and tablets

5 Critical Considerations for. Enterprise Cloud Backup

10 Threats to Successful. Enterprise Endpoint Backup

Smarter Endpoint Backup. This whitepaper discusses Druva's unique approach to smarter backup of endpoint devices.

How To Protect Your Data From Harm

5 Things You Didn t Know About Cloud Backup

Support for Multiple Organizations

Enterprise-Class Security

Business and enterprise cloud sync, backup and sharing solutions

Access All Your Files on All Your Devices

How To Secure Shareware Kiteworks By Accellion

MANAGED SERVICE PROVIDERS SOLUTION BRIEF

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise

9 REASONS WHY ENTERPRISES CHOOSE VAULTIZE FOR ENDPOINT DATA PROTECTION

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise

Symantec Mobile Management Suite

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

Access Your Cisco Smart Storage Remotely Via WebDAV

Secure audited file sharing

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud

FileCloud Security FAQ

APS Connect Denver, CO

The Challenge of Securing and Managing Data While Meeting Compliance

The IT Manager s Guide to Simplifying Microsoft Outlook Backup

5 Critical Considerations for. Enterprise Cloud Backup

Top. Reasons Legal Firms Select kiteworks by Accellion

Realizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific

VEMBU VS VEEAM. Why Vembu is Better VEMBU TECHNOLOGIES TRUSTED BY OVER 25,000 BUSINESSES.

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks. Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks

What We Do: Simplify Enterprise Mobility

Casper Suite. Security Overview

The Most Complete Data Protection Platform for MSPs

activecho Frequently Asked Questions

CTERA Cloud Storage Platform Architecture

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

owncloud Architecture Overview

The EVault Portfolio

FTP-Stream Data Sheet

Transform EMC Object Storage Into Enterprise Storage Services

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Spambrella Archiving Service Guide Service Guide

Providing an Enterprise File Share and Sync Solution for

Security Architecture Whitepaper

Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud

ShareFile Enterprise. Jaan Feldmann Sergei Sokolov

CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot

activecho Driving Secure Enterprise File Sharing and Syncing

Cloud Backup and Recovery for Endpoint Devices

White Paper How Noah Mobile uses Microsoft Azure Core Services

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

When enterprise mobility strategies are discussed, security is usually one of the first topics

Data Deduplication and Corporate PC Backup

SOOKASA WHITEPAPER SECURITY SOOKASA.COM

Security Overview kiteworks

Solving the Desktop Dilemma

BMC s Security Strategy for ITSM in the SaaS Environment

Asigra Cloud Backup V13.0 Gives You Greater Flexibility and Expands Your Total Addressable Market

Symantec Mobile Management for Configuration Manager 7.2

Druva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

12 Key File Sync and Share Advantages of Transporter Over Box for Enterprise

DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Comparing Box and Egnyte. White Paper

Cloud Managed Printing

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

How To Make Files Share Secure (Fss) Work For Corporate Use

Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools

insync Installation Guide

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

Transcription:

insync Benefits & Comparison Copyright Notice Copyright 2007-2014 Druva Inc. All Rights Reserved. Any technical documentation that is made available by Druva Inc. ( Druva ) is the copyrighted work of Druva and is owned by Druva. Druva reserves the right to make changes without prior notice. No part of this publication may be copied without the express written permission of Druva. Trademarks Windows is a U.S. registered trademark of Microsoft Corporation. Linux is a U.S. registered trademark of Linus Torvalds. Red Hat Enterprise Linux is a registered trademark of Red Hat Inc. Ubuntu is a registered trademark of Canonical Ltd. Apple, Mac and Mac OS are trademarks of Apple Inc. Other brands and product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Disclaimer The information contained in this document is subject to change without notice. Druva Inc. shall not be liable for errors contained herein or for incidental or consequential damages in connection with the performance, or use of this manual.

Benefits of an unified solution insync offers a unified backup and file sharing solution with several benefits Unified administration insync s centralized administration portal provides IT with a single place to manage users and devices for both backup and EFSS. To the same user profile, IT can simply add file sharing policies and controls. Backup and EFSS share the following - Underlying storage Quota management User & device management Profiles & policies AD integration Unified performance and security benefits insync Share runs on the same high performance architecture as the rest of insync. Global deduplication works across backup and sharing, giving you massive bandwidth and storage savings. Our 2-factor encryption ensures that data across backup & sharing are equally secure. 2

Unified data governance and data loss prevention insync gives you end-to-end IT control and visibility compared to pure-play file sharing solutions. Unified data governance across backup & EFSS includes - e-discovery readiness Audit trails Legal hold Federated search Reporting & activity streams Unified DLP across backup & EFSS includes - Encryption of data in the device Remote & auto wipe of data Geo-tracking Mobile containerization Access restrictions Unified end-user experience (client, web app, mobile app) insync unifies the end users interactions for backup and EFSS across all end user interfaces ensuring a high adoption for all the solutions, while saving valuable IT time and resources. 3

insync Primary Differentiation insync Provides End-to-End Security & Data Privacy insync secures endpoint data all the way from the device to the server by adopting the highest-grade security technologies. insync s security and compliance includes: 256-bit SSL encryption for data in transit 256-bit AES encryption for data in storage. For encryption key management, insync uses an industry-first two-factor encryption technology. Modeled after a bank lockbox system, the 2-factor 4

encryption guarantees that Druva or any external party cannot have access to your customer data. Strict authentication and access control with AD/LDAP Secure HTTPS and LDAPS protocols for access SOC-1, 2 and 3 certified Amazon AWS-powered infrastructure SAS-70 certification of cloud infrastructure ISAE 3000 certification of Druva's cloud controls SAML integration with ADFS SAML integration to other 3rd party ID providers Mobile app with secure data container and secure access with SAML 3rd party validated HIPAA SaaS compliant application insync gets a performance boost from de-duplication As an enterprise grows, so with it does the storage and bandwidth requirements for its data. Druva insync employs a proprietary deduplication technology to dramatically reduce the data footprint both in storage and across the network. With the addition of insync Share, Druva unifies storage for both your backup and file sharing data, resulting in zero data replication, optimized bandwidth utilization, and much faster data transfer rates. For the organization, insync delivers lower overall storage and network costs, delivers higher performance and a smoother end-user experience. insync provides complete litigation and compliance readiness insync s integrated approach brings its existing capabilities for backup; time based data identification, custodial legal hold, full audit trails, preservation in place and integration with common e-discovery tools, and extends that to file sharing -- delivering a centralized way, across all your endpoint data, to manage for litigation and compliance responsiveness. Druva is the only endpoint data protection and governance solution that provides this complete of capability today. 5

Consumer file sync & share Pure play EFSS Unified EFSS Example Dropbox, SugarSync Box, Accellion Druva insync File Sync & Sharing Multi-Device sync 4 4 4 Peer-to-peer sharing 4 4 4 File distribution 4 4 4 Mobile access 3 3 4 Sharing groups 1 3 4 IT managed workspaces 1 3 4 Backup & versioning 2 2 4 Collaborative editing 2 3 2 NAS & Sharepoint integration 1 3 2 Governance IT visibility & control 1 3 4 Audit trails 1 2 4 Litigation readiness 0 1 4 Legal hold 0 1 4 Data loss prevention Geolocation 1 2 4 Remote wipe 0 3 4 6

Mobile container 0 3 3 Security Encryption in transit 4 4 4 Encryption at rest (2 factor encryption) 1 2 4 Device encryption 2 4 4 Performance Deduplication 2 2 4 WAN optimization 2 2 4 Total cost of ownership Unified management 0 0 4 Storage savings 1 1 4 Bandwidth savings 1 1 4 7