Three Key Steps to Endpoint Protection

In a world where data is only becoming more critical to the business, many enterprises look over the fact that endpoints are the weak link when it comes to data protection and availability. Data does not only live in the cloud today; users are accessing and storing sensitive corporate data directly on their endpoints. This is an important liability to overcome because endpoints are the primary malware penetration target, and because devices may easily be lost or stolen. Also, users may accidentally or maliciously delete data, or they may leave the company with a device that contains corporate data.

A proper endpoint protection strategy centers on three key tenets:

  • First, endpoint protection via a consistent stream of quality backups. This may seem like a given, but for many companies, endpoint backups have been a “nice-to-have,” if they have even occurred at all. Legacy endpoint backup software is notorious as a user productivity killer. In order to facilitate frequent backups to meet aggressive recovery point objectives (RPOs), a low-impact approach is necessary. Additionally, tiering these backups automatically to the cloud can help to protect against malware, because malware is typically designed to breach endpoint Windows or Mac systems.
  • Detection, of data anomalies and impacted backups, alongside the ability to identify the last known good backup. Requires further necessitates incremental backups.
  • The ability to recover data. In the event of a ransomware attack, it is important that data can be recovered as opposed to paying ransoms. Paying the ransom only serves to further proliferate ransomware attacks, and at the same time, the company is not guaranteed that all data can be recovered, or that infected files have been deleted. Instead, IT professionals should look for the ability to quickly identify and react to suspicious files, as well as for the ability to access data from and restore data to anywhere. The latter is especially important when it comes to facilitating business continuity during a restore, and for protecting against endpoint loss or theft.

The ability to facilitate continuous data access, built from a solid backup strategy, is foundational to future forward endpoint protection. Access Storage Switzerland’s webinar with Druva, “Ransomware: Strategies for Protecting Your Weakest Link – Endpoints”, on demand to learn more about how to architect an endpoint protection strategy that will comprehensively protect against key data loss vectors.

Sign up for our Newsletter. Get updates on our latest articles and webinars, plus EXCLUSIVE subscriber only content.

Senior Analyst, Krista Macomber produces analyst commentary and contributes to a range of client deliverables including white papers, webinars and videos for Storage Switzerland. She has a decade of experience covering all things storage, data center and cloud infrastructure, including: technology and vendor portfolio developments; customer buying behavior trends; and vendor ecosystems, go-to-market positioning, and business models. Her previous experience includes leading the IT infrastructure practice of analyst firm Technology Business Research, and leading market intelligence initiatives for media company TechTarget.

Tagged with: , , , , , , , , , ,
Posted in Blog

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 22,131 other followers

Blog Stats
  • 1,480,009 views
%d bloggers like this: