Cloud Endpoint Protection: Potential Pitfalls to Avoid

Backing up endpoint data is no longer a nice-to-have. Leaving endpoints unprotected leaves critical enterprise data vulnerable to malware, deletion, theft or corruption, and to running afoul of data privacy regulations. This can quickly result in a tarnished brand reputation, heavy fines and missed revenue opportunities. The problem is that protecting the myriad of devices on which the modern employee conducts business every day – many of which enter the organization through “bring-your-own-device” as opposed to corporate-sanctioned initiatives – is an expensive management nightmare for IT.

The cloud is a strong starting point for comprehensive endpoint data protection. It provides a centralized and singular data management point for IT, massively scalable storage capacity, and it makes data globally accessible for users. That being acknowledged, there are a few potential pitfalls that storage managers should be cognizant of avoiding by ensuring the solution provides certain key capabilities. These include:

  • The ability to conduct frequent backups, in order to meet stringent recovery point objectives (RPOs).
  • Avoiding slow time-to-recovery, and slow recovery performance. The cloud is notorious for its latency, which is not acceptable in the event that a mission-critical system goes down and a disaster state must be declared. Failover must occur rapidly, and performance in the disaster recovery state must also be fast.
  • Along the above lines, data should be able to be recovered not just from the cloud, but also locally, so that users may access their data as quickly as possible (within seconds or minutes of an outage).
  • Vendor lock in. The enterprise should have the flexibility to deploy not just in the public cloud, but also the ability to choose from which public cloud provider to procure the service. Also, the flexibility to use a purpose-built off-premises cloud, or an on-premises private cloud. Every business has unique requirements, and each cloud provider will offer unique price points, features and levels of security.
  • Encryption of data at rest and in flight. Consumer-grade data stored in the cloud may not be encrypted, so it is important to confirm that data is protected and to what degree it is protected (military-grade encryption, etc).

See Storage Switzerland’s on demand webinar with Infrascale, “Using the Cloud to Fix Backup’s Blind Spot – Endpoint Data Protection”, to learn more about the challenges of using on-premises infrastructure to meet modern endpoint protection needs, and how to utilize the cloud in a way that will most effectively address these requirements.

Sign up for our Newsletter. Get updates on our latest articles and webinars, plus EXCLUSIVE subscriber only content.

Senior Analyst, Krista Macomber produces analyst commentary and contributes to a range of client deliverables including white papers, webinars and videos for Storage Switzerland. She has a decade of experience covering all things storage, data center and cloud infrastructure, including: technology and vendor portfolio developments; customer buying behavior trends; and vendor ecosystems, go-to-market positioning, and business models. Her previous experience includes leading the IT infrastructure practice of analyst firm Technology Business Research, and leading market intelligence initiatives for media company TechTarget.

Tagged with: , , , , , , , , , ,
Posted in Blog

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 25,553 other subscribers
Blog Stats
%d bloggers like this: