Blog Archives

Cloud Endpoint Protection: Potential Pitfalls to Avoid

Backing up endpoint data is no longer a nice-to-have. Leaving endpoints unprotected leaves critical enterprise data vulnerable to malware, deletion, theft or corruption, and to running afoul of data privacy regulations. This can quickly result in a tarnished brand reputation,

Tagged with: , , , , , , , , , ,
Posted in Blog

Creating an Endpoint Backup Strategy that Works for Everyone

Backing up endpoints is a crucial aspect of a comprehensive, modern data protection strategy. Laptops and mobile devices are the primary means through which employees read and modify corporate data. Despite the ongoing shift to software-as-a-service (SaaS), users commonly save

Tagged with: , , , , , , , , , ,
Posted in Blog

Is File Sync and Share OK for Endpoint Backup?

A surprising number of organizations and users consider their file sync and share (FSS) solution to be a suitable replacement for backup. With an FSS solution if a user accidentally deletes a file the FSS service can provide the user

Tagged with: , , , , , , , , , ,
Posted in Blog

Revamping Your Endpoint Protection Strategy to Minimize Downtime and Data Loss

Endpoint protection threatens to be the Achilles heel of modern IT shops. The need to protect endpoints has been around for decades – but doing so remains largely painful, especially as enterprise mobility usage proliferates. Protecting hundreds or thousands of

Tagged with: , , , , , , , ,
Posted in Blog

Protecting Your Data Protection’s Blind Side – Endpoints

Laptops, smartphones, and tablets are how users get work done. A surprising amount of organizational data is stored exclusively on laptops, never touching data center storage. Endpoints are also on the front lines of business where they are the most

Tagged with: , , , , , , , ,
Posted in Blog

Backup Endpoints So You Can Wipe Them

One of the best reasons to backup endpoints like laptops, tablets and smartphones has nothing to do with restores, it has to do with deletion. Endpoints are the most vulnerable to theft. They are left in airport security lines, Starbucks

Tagged with: , , , , , , ,
Posted in Blog

SlideShare: Using the Cloud to Fix Backup’s Blind Spot – Endpoint Data Protection

Many data centers unwittingly have a blind spot in their backup strategy, endpoints like laptops and other devices are left exposed. Most organizations have no formal endpoint data protection strategy even though studies indicate that over 60% of data on

Tagged with: , , , , , , ,
Posted in Slideshare

Webinar: Using the Cloud to Fix Backup’s Blind Spot – Endpoint Data Protection

Many data centers unwittingly have a blind spot in their backup strategy, endpoints like laptops and other devices are left exposed. Most organizations have no formal endpoint data protection strategy even though studies indicate that over 60% of data on

Tagged with: , , , , , , ,
Posted in Webinar

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 22,250 other followers

Blog Stats
  • 1,566,173 views