What Constitutes a Complete Data Protection Platform?

Endpoint protection has frequently been treated as an expensive hassle that is not worth it. However, for a number of reasons, organizations can no longer risk leaving employees’ laptops, tablets and other devices unprotected.

The major concern is that data is frequently stored only on the endpoint device itself. For example, a user might download a file directly to their device to work on it while on a plane, disconnected from the Internet. If that device is lost or stolen, or if that file becomes corrupted, the unique changes to the file are irrecoverable. In fact, the file itself may be irrecoverable if it was created directly on the endpoint.

This is a threat because endpoints are vulnerable in a number of ways. Endpoints have always been susceptible to theft, and as they are becoming thinner and lighter they are also becoming more susceptible to being lost. At the same time, endpoints are the primary initiation point for ransomware.

The problem is largely that endpoints historically have been difficult to back up. When legacy backup software platforms kicked off, they all but killed user productivity. Endpoints – and laptops especially – are also turned off or put to sleep when not in use, meaning that backups have to occur when the device is in use.

The solution is an end-to-end strategy that not only facilitates collaboration among multiple users and remote access, like enterprise file sync and share (EFSS), but that also protects data and facilitates compliance.

Backing up data is, naturally, the first step to protection. To avoid an impact to employee productivity, backups need to be non-intrusive to the user and restores need to be as quick as possible.

The second item in the protection checklist is data encryption. Many enterprises are embracing the cloud to store their copy data; as backups are migrated off-premises, the ability for the enterprise to manage its own keys can provide additional control and peace of mind. Equally important is ensuring that the cloud provider’s data center provides encryption of data at rest, and that they adhere to any policies and procedures required by the enterprise’s industry or region.

Beyond these basic protection capabilities, loss prevention is also important. Remote wipe and location tracking can help to mitigate the impact of a lost, stolen or misplaced endpoint – such as data getting into the wrong hands.

To learn more, watch Storage Switzerland’s on demand webinar with Carbonite, “Is It Time to Upgrade Your Endpoint Data Strategy?”. All those who register will receive a copy of Storage Switzerland’s latest report “Moving on From Mozy Endpoint.”

Sign up for our Newsletter. Get updates on our latest articles and webinars, plus EXCLUSIVE subscriber only content.

Senior Analyst, Krista Macomber produces analyst commentary and contributes to a range of client deliverables including white papers, webinars and videos for Storage Switzerland. She has a decade of experience covering all things storage, data center and cloud infrastructure, including: technology and vendor portfolio developments; customer buying behavior trends; and vendor ecosystems, go-to-market positioning, and business models. Her previous experience includes leading the IT infrastructure practice of analyst firm Technology Business Research, and leading market intelligence initiatives for media company TechTarget.

Tagged with: , , , , , , , , , , , , , , ,
Posted in Blog

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 25,553 other subscribers
Blog Stats
%d bloggers like this: