10 Threats to Successful. Enterprise Endpoint Backup



Similar documents
How To Backup From Your Computer To Your Phone Or Tablet Or Computer

28% Top 10 Endpoint Backup Mistakes And how to avoid them. of corporate data resides exclusively on laptops, smartphones, and tablets

APRIL Must-Have Features for Endpoint Backup

Druva insync vs. Altiris/Symantec DLO. Comparison Guide

The Essential Security Checklist. for Enterprise Endpoint Backup

5 Things You Didn t Know About Cloud Backup

Smarter Endpoint Backup. This whitepaper discusses Druva's unique approach to smarter backup of endpoint devices.

Howtomanage and protectend usersdata? Mati Raidma

5 Critical Considerations for. Enterprise Cloud Backup

5 Critical Considerations for. Enterprise Cloud Backup

Phoenix backs up servers using Windows and Linux operating systems. Here is a list of Windows servers that Phoenix supports:

Druva insync vs. Code42 CrashPlan for Enterprise. Comparison Guide

Cloud Backup and Recovery for Endpoint Devices

How To Protect Your Endpoints From Being Stolen By A Cell Phone Or Other Device

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

Druva insync : Product Overview and Advantage

The Challenge of Securing and Managing Data While Meeting Compliance

insync Benefits & Comparison

Mobility: Strengthening the Weakest Link in ediscovery

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

When is Cloud-managed WLAN a Good Fit?

9 REASONS WHY ENTERPRISES CHOOSE VAULTIZE FOR ENDPOINT DATA PROTECTION

Whitepaper : Cloud Based Backup for Mobile Users and Remote Sites

Secure Your Mobile Device Access with Cisco BYOD Solutions

Druva insync: Simplified, Robust Endpoint Data Protection Date: August 2011 Author: Tony Palmer, Senior Lab Engineer /Analyst

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

Enterprise-Class Security

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services

How to Turn the Promise of the Cloud into an Operational Reality

Cloud and EVault Endpoint Protection Your best friend in Data Protection

Five Drivers of the Cloud in Asset Management


Quattra s Cloud Vision & Framework Value

Data Protection: The Risks and Rewards

Corporate PC Backup - Best Practices

Your New Cloud Storage Business. Three solutions that will impact your organization

2013 Market Outlook for Managed Service Providers

Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

Cloud Computing for SCADA

Data Deduplication for Corporate Endpoints

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace

SECURE FILE SHARING AND COLLABORATION: THE PATH TO INCREASED PRODUCTIVITY AND REDUCED RISK

Moving to the Cloud: What Every CIO Should Know

EOH Cloud Backup - End User. EOH Cloud Services - EOH Cloud Backup - End User

CIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business.

Cloud Failover Appliance

Sage ERP I White Paper. ERP and the Cloud: What You Need to Know

WHITEPAPER. 7 Reasons Why Businesses are Shifting to Cloud Backup

Corporate Enterprise Data Protection Package

Virtualization Support - Real Backups of Virtual Environments

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

Is cloud CRM really that great?

Understanding Total Cost of Ownership (TCO)

APS Connect Denver, CO

Uni Vault. An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service. White Paper Solution Brief

CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot

Integrating a Multi-tiered Deduplication Approach to Simplify Enterprise-wide Backup & Recovery

Executive s Guide to Cloud Access Security Brokers

All can damage or destroy your company s computers along with the data and applications you rely on to run your business.

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Symantec Mobile Management for Configuration Manager 7.2

Page 2. Most Of The Information Workforce Now Works Remotely

If you can't beat them - secure them

Securing Corporate on Personal Mobile Devices

The falling cost and rising value of desktop virtualization

Mobile Madness or BYOD Security?

Top 10 Reasons Enterprises are Moving Security to the Cloud

Top 10 Myths of Desktop Virtualization

Transcription:

10 Threats to Successful Enterprise Endpoint Backup Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise in endpoints, BYOD, and SaaS applications. These 10 threats jeopardize the success of enterprise endpoint backup, so watch out for these threats to ensure that your critical corporate data is protected and end user productivity is improved.

28% of corporate data resides exclusively on laptops, smartphones, and tablets 1. Unprotected data on laptops and mobile devices In a recent report on endpoint user data, Gartner reported that 28% of corporate data resides exclusively on laptops, smartphones, and tablets 1. As the modern workforce becomes increasingly mobile, companies that rely solely on desktop backup put over a quarter of their enterprise data at risk. This is a common mistake according to ESG - only 35% of enterprise laptops are backed up 2. 2. Insufficient protection from legacy server backup solutions Solutions originally designed for server backup are only effective in highly predictive environments where devices are backed up on a schedule and over a secure high-bandwidth LAN. When repurposed for endpoint backup these solutions perform very poorly because endpoint backup environments are highly unpredictable. Faster, non-intrusive backups, the ability to work over VPNless networks, and flexible, opportunistic scheduling are critical features for endpoint backup that are not available in legacy server backup solutions. 3. Slow, heavy backups Up to 80% of an organization s data is duplicate Endpoint data is doubling every 18 months while bandwidth speeds have only grown 10x over the last 10 years 3. In order to deal with this large gap between data growth and bandwidth and computing resource limitations, look for solutions with efficient deduplication technology. These solutions work on the client side, dedupe objects within files, and eliminate data duplication across all users within the enterprise. Up to 80% of an organization s data is duplicate, so enterprise-wide deduplication can provide large bandwidth and storage savings. 1. Gartner: Endpoint User Data Backup Report (ID# G00211731) 2. ESG Report 3. IDC: Digital Universe report 2

4. Cumbersome end-user experience 51% of end users found their current backup solution to be intrusive Users frequently disengage backup software when the backup process interferes with their ability to work. In fact, 51% of end users found their current backup solution to be intrusive 4. An effective backup solution must include bandwidth and CPU throttling capabilities, efficient deduplication, and WAN optimization to provide end-users with a non-intrusive user experience, resulting in successful backups and protected data. In addition, solutions that allow self-restore not only empower the end user but also save IT support time and resources. 5. Ineffective security for enterprises $39,000 avg. cost of data breach for every lost laptop Endpoints are prone to theft and loss, and if not secured expensive data breaches are expensive imminent. In a recent study, Intel concluded that the average cost of data breach on a lost laptop is over $39,000 5. Prevent such serious financial consequences by looking for solutions that encrypt data on the device, in-transit, and at-rest on the server, as well as provide remote wipe and geo-locate capabilities as an additional layer of security. Enterprises evaluating cloud endpoint backup solutions must ascertain that the provider satisfies physical data center security requirements and has appropriate 3rd party security certifications. Some leading endpoint backup solutions use sophisticated two-factor encryption mechanisms that prevent even these solution providers from accessing your data on the servers. 4. Ponemon Institute: Quantifying the Benefits of Unified Endpoint Data Management 5. Intel: Billion Dollar Lost Laptop Problem 3

6. Limited scalability that won t meet future needs Consider both your current and future business needs and don t limit yourself to consumer-grade solutions that work adequately in the short term but may not scale in the long term. Look for an enterprise endpoint backup solution that provides scalable storage, advanced deduplication to deal with exponential data growth, and the ability to support a geographically distributed organization. 7. A deployment model that doesn t fit the organization The decision to go with a cloud or on-premise deployment should be based on business factors such as budget, timeline, corporate policies, and external compliance regulations among others. Define your deployment requirements first or you may be pigeon-holed into managing a solution that does not align with your organization s IT strategy. Cloud-based solutions offer you on-demand scalability and allow shifting of capital expenses to operating expenses. On-premise solutions may provide higher performance along with cost advantages from hosting infrastructure behind your corporate firewall. $ Comparing up-front costs alone when evaluating solutions could mean you pay more in the long term. 8. Upfront cost savings that mask long-term costs Comparing up-front costs alone when evaluating solutions could mean you pay more in the long term. Consider total cost of ownership: opportunity cost of the initial setup time, hardware costs, deployment time, and cost of resources to manage the solution. For instance, a solution that has low upfront costs may require weeks of initial setup time and effort which not only increases the time-to-value but also increases TCO from the enormous amount of IT man hours required. Also, solutions that do not support mass client deployment impact both IT and end user productivity severely, again increasing TCO. Some other features to consider are centralized policy management, automatic client upgrades, on-demand scalability, user self-restore options, and optimized storage and bandwidth utilization. 4

9. Uncontrolled BYOD BYOD allows employees to maximize their productivity and can t be taken lightly by IT departments even if it creates numerous challenges to keep corporate data secure. Look for solutions that provide end users with mobile apps to access their data but allows IT to set up profiles to limit access on BYOD devices. 10. Backup that doesn t do more than backup $8,100 savings per user each year by employing a solution that integrates endpoint backup, secure file sharing, DLP, and analytics The needs of today s mobile workforce requires IT departments to consider how to improve productivity while maintaining control over corporate data. For instance, knowledge workers see immense productivity gains from popular consumer file sharing solutions, which in turn put the enterprise at serious risk of data breach because of the lack of security of these applications. Additional integration with data loss prevention tools that enable remote wipe and geo-location for lost or stolen devices can also assist IT in mitigating risk. IT can further ensure regulatory compliance by using features such as e-discovery enablement, legal hold, and federated search. Solutions that integrate these features into their endpoint backup provides huge efficiencies for saving cost, time, and effort involved in endpoint data protection and management. A recent study by the Ponemon Institute quantified that an enterprise can save up to $8100 per user each year by employing a solution that integrates endpoint backup, secure file sharing, data loss prevention, and analytics 6. 6. Ponemon Institute: Quantifying the Benefits of Unified Data Management 5

About Druva Druva provides integrated data protection and governance solutions for enterprise laptops, PCs, smartphones and tablets. Its flagship product, insync, empowers an enterprise's mobile workforce and IT teams with backup, ITmanaged file sharing, data loss prevention and rich analytics. Deployed in public or private cloud scenarios or on-premise, insync is the only solution built with both IT needs and end user experiences in mind. With offices in the U.S., India and U.K., Druva is privately held and is backed by Nexus Venture Partners, Sequoia Capital and Tenaya Capital. For more information, visit www.druva.com. Druva, Inc. Americas: +1 888-248-4976 Europe: +44.(0)20.3150.1722 APJ: +919886120215 sales@druva.com www.druva.com