The Essential Security Checklist. for Enterprise Endpoint Backup



Similar documents
APRIL Must-Have Features for Endpoint Backup

10 Threats to Successful. Enterprise Endpoint Backup

Enterprise-Class Security

Druva insync vs. Altiris/Symantec DLO. Comparison Guide

5 Things You Didn t Know About Cloud Backup

How To Backup From Your Computer To Your Phone Or Tablet Or Computer

28% Top 10 Endpoint Backup Mistakes And how to avoid them. of corporate data resides exclusively on laptops, smartphones, and tablets

Smarter Endpoint Backup. This whitepaper discusses Druva's unique approach to smarter backup of endpoint devices.

FileCloud Security FAQ

Security Overview Enterprise-Class Secure Mobile File Sharing

Phoenix backs up servers using Windows and Linux operating systems. Here is a list of Windows servers that Phoenix supports:

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

insync Benefits & Comparison

5 Critical Considerations for. Enterprise Cloud Backup

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud

5 Critical Considerations for. Enterprise Cloud Backup

Security Architecture Whitepaper

When enterprise mobility strategies are discussed, security is usually one of the first topics

Citrix ShareFile Enterprise technical overview

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

activecho Driving Secure Enterprise File Sharing and Syncing

Druva insync vs. Code42 CrashPlan for Enterprise. Comparison Guide

Citrix ShareFile Enterprise: a technical overview citrix.com

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Six Steps Healthcare Organizations Can Take to Secure PHI on Mobile Devices

PortWise Access Management Suite

How To Secure Shareware Kiteworks By Accellion

ShareFile Enterprise technical overview

NCSU SSO. Case Study

Flexible Identity Federation

Top. Reasons Legal Firms Select kiteworks by Accellion

Powered by. FSS Buyer s Guide Why a File Sync & Sharing Solution is Critical for Your Business

Achieving PCI-Compliance through Cyberoam

White Paper. BD Assurity Linc Software Security. Overview

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks. Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks

PortWise Access Management Suite

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION

Top. Enterprise Reasons to Select kiteworks by Accellion

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools

How To Use Egnyte

BUILT FOR YOU. Contents. Cloudmore Exchange

WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW

White Paper How Noah Mobile uses Microsoft Azure Core Services

Supplier Information Security Addendum for GE Restricted Data

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions

PRIVACY, SECURITY AND THE VOLLY SERVICE

Howtomanage and protectend usersdata? Mati Raidma

Secret Server Qualys Integration Guide

Mobile Admin Security

The increasing popularity of mobile devices is rapidly changing how and where we

Securing the Service Desk in the Cloud

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

Executive s Guide to Cloud Access Security Brokers

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

RSS Cloud Solution COMMON QUESTIONS

Ensuring the Security of Your Company s Data & Identities. a best practices guide

Google Identity Services for work

Secure Data Sharing in the Enterprise

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

The Challenge of Securing and Managing Data While Meeting Compliance

Introduction to the Mobile Access Gateway

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

EasiShare Whitepaper - Empowering Your Mobile Workforce

Symantec Enterprise Vault.cloud Overview

Information Technology Branch Access Control Technical Standard

Identity & Access Management in the Cloud: Fewer passwords, more productivity

Symantec Enterprise Vault.cloud Overview

Data Security and Governance with Enterprise Enabler

BMC s Security Strategy for ITSM in the SaaS Environment

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

The User is Evolving. July 12, 2011

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Business and enterprise cloud sync, backup and sharing solutions

How To Protect Your Data From Harm

WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT

Famly ApS: Overview of Security Processes

Entrust IdentityGuard Comprehensive

Ensuring the security of your mobile business intelligence

Transcription:

The Essential Security Checklist for Enterprise Endpoint Backup IT administrators face considerable challenges protecting and securing valuable corporate data for today s mobile workforce, with users accessing and creating data from a wide variety of locations and networks. Protect your company s critical information against breach and leakage by choosing an endpoint backup solution that features enterprise-grade security with the strongest encryption, access control, cloud and private cloud security features, and data loss prevention capabilities.

1. Encryption Endpoint backup solutions should encrypt data in transit and in store. Because endpoint devices frequently connect to unprotected networks, endpoint backup solutions should encrypt data in transit and in store to prevent unauthorized viewing of sensitive corporate data. Data in transit should be protected with encryption like 256-bit SSL, which allows users to securely access corporate data without the use of a VPN. Data in store should be protected with encryption like 256-bit AES, which has been established by the National Institute of Standards and Technology (NIST) and adopted by government, financial institutions, and other organizations that require the highest level of security. 2. Access control Endpoint backup solutions should offer secure access that is easy for IT to manage. Web-based access to the administrative control panel and client should be over HTTPS, to provide authentication of the website and web server and encrypt communication between the client and the server. To make managing user access easy, some endpoint backup solutions offer single sign-on capabilities through Security Assertion Markup Language (SAML), which permits users to securely log into the backup client using their credentials on external identity services such as Microsoft Active Directory. This allows organizations to use their existing identity management policies with the endpoint backup solution. Less than half of users enable passwords for their mobile devices, 1 so choose a backup solution that allows administrators to mandate that employees use a PIN to access the backup mobile app. This regulates access to corporate data from the app, even if the device itself isn t password-protected. 1. http://kraasecurity.com/data-breach-problems-with-byod/ 2

3. Cloud security Choose a solution that is compliant with international standards such as SAS 70 and ISAE 3000 Type II. With so many cloud solutions out there, you should be confident that the endpoint backup solution you choose sufficiently protects your corporate data. Ensure enterprise-grade protection by choosing a solution that is compliant with international standards such as SAS 70 and ISAE 3000 Type II. These external audits assess all aspects of cloud infrastructure, operations, and control, including facilities, physical security, storage and network infrastructure, firewalls, network configuration, account management, and more. Cloud backup solutions should segregate each customer s data from other customers and use unique encryption keys for each customer. Each customer s unique encryption key should be further encrypted to prevent the key from being compromised. Avoid solutions that save the encryption key in plain text on the client device or server. Instead, look for solutions that feature two-factor encryption management where encryption and authentication keys are mutually shared between the customer and the cloud, so that the cloud service provider does not have any access to customer data. 4. Private cloud security For private cloud deployment, select a solution with server architecture that protects your network from intrusion by allowing you to block your inbound firewall ports from unsecure inbound connections. This can be done by placing an edge server in a subnetwork with limited connectivity (demilitarized zone), while the cloud master and storage nodes remain behind the corporate firewall. Incoming backup and restore requests from outside the corporate network are forwarded by the edge server to the cloud master over a secure connection. Authentication and storage of data therefore occur behind the corporate firewall without opening any inbound ports. 3

5. Data loss prevention 34% of data breaches occur as the result of a lost or stolen device. 34% of data breaches occur as the result of a lost or stolen device. 2 Protect data on laptops, smartphones, and tablets from breach and leaks with an endpoint backup solution that includes data loss prevention capabilities. Endpoint backup solutions should encrypt files on devices by leveraging endpoint operating systems built-in encryption technology, such as Microsoft Encrypting File System. Administrators should be able to easily configure which files and folders are backed up to ensure that sensitive corporate data is protected without requiring full-disk encryption. Endpoint backup solutions should include geo-location and remote wipe capabilities. Administrators should be able to pinpoint the exact location of an endpoint device at any point in time and initiate a remote decommission on a lost or stolen device, as well as configure an auto-delete policy to wipe data if a device has not connected to the backup server for a specified number of days. 6. Audit Trails With the proliferation of data on laptops and mobile devices, organizations need to maintain visibility and control of how regulated data is being accessed, shared, and distributed in order to ensure compliance. However, only 19% of IT professionals say their organizations actually know how much regulated data is on endpoint devices like laptops, smartphones, and tablets (Ponemon Institute). If your organization deals with regulated data, audit trails are an essential feature for meeting compliance needs, as they allow stakeholders to see how, when and where data is being accessed, shared, stored and deleted. Audit trails provide IT with insights into data activity so that administrators can be on top of data risks. When audit trails are combined with global policies that let administrators set privileges around data access and sharing, regulated organizations can ensure compliance of endpoint data. 2. http://www.esecurityplanet.com/hackers/symantec-attacks-on-the-rise-but-spam-and-botnets-down.html 4

About Druva Druva provides integrated data protection and governance solutions for enterprise laptops, PCs, smartphones and tablets. Its flagship product, insync, empowers an enterprise's mobile workforce and IT teams with backup, ITmanaged file sharing, data loss prevention and rich analytics. Deployed in public or private cloud scenarios or on-premise, insync is the only solution built with both IT needs and end user experiences in mind. With offices in the U.S., India and U.K., Druva is privately held and is backed by Nexus Venture Partners, Sequoia Capital and Tenaya Capital. For more information, visit www.druva.com. Druva, Inc. Americas: +1 888-248-4976 Europe: +44.(0)20.3150.1722 APJ: +919886120215 sales@druva.com www.druva.com