Endpoint Backup: It’s Not Just Data Protection Anymore (Pt. 1)

Endpoint Backup: It’s Not Just Data Protection Anymore (Pt. 1)

This is the first in a three part series

With the spread of endpoint devices across broad market segments, endpoint data security and backup has transformed from nice-to-have to an imperative. Businesses want endpoint data security risks minimized and to realize increases in endpoint device backup performance that yield greater productivity. Additionally, as global businesses continue to leverage virtual teams, secure file sharing has become a necessity and governance of data access and sharing essential.

Today’s growing mobile workforce, along with the adoption of BYOD, increases data and security risks. Additionally, new endpoint backup functionality must increase user productivity via fewer interruptions at the endpoint and more efficient data handling techniques.

Innovation and the proven success in improving efficiency of endpoint backup have driven resurgence in its embrace by enterprise and cloud computing environments.With this success and a growing market come new challenges such as increased competition and new user requirements such as file sync and sharing.

Security is Key
As companies continue to leverage the fast paced innovation of mobile devices and their functionalities, which enable greater business productivity, they face new challenges in data security and data leakage. The mobile workforce spectrum of endpoint technologies includes desktops, laptops, and a growing array of hand held devices and tablets.

In some cases companies will provide employees a company-owned endpoint device while a growing number of companies are encouraging, and in some cases requiring, employees to participate in the BYOD concept. In both cases the threats to data security are a real and present danger. Data security threats include devices that remain with ex-employees that take company data with when they leave, endpoint devices that are lost or stolen, and illegal network hacking by digital information thieves.

Given numerous real-time data security threats, those responsible for data security on endpoint devices need to implement a comprehensive and integrated solution that provides not only backup but also additional capabilities such as device encryption, the ability to remotely wipe sensitive company data, the ability to locate an endpoint device anywhere on the globe, and the ability to create an impenetrable virtual box – or container – BYOD environment so that data can only be accessed by an authorized user. Additionally, IT security personnel need to assure that their comprehensive solution supports configurable polices that can control which apps access local and remote data.

Performance and Productivity
With regards to backup and restore, many companies today use various brands and models of endpoint devices coupled with a multitude of server platforms that run applications which leverage the flexibility of the endpoint devices. Without implementing a comprehensive data management solution, admins are left with a massive amount of complexity that also translates into increased costs due to the sheer number of disparate data management solutions required. Managing backups and restores in a disparate and complex environment quickly becomes a tricky balancing act and can easily spiral out of control, leaving data virtually unprotected and endpoint users frustrated over losing the use of their device while IT juggles a backup.

Clearly, it’s important for those responsible for backup and restore of endpoint devices to seek out, identify and deploy a comprehensive backup and restore solution. This kind of solution includes nearly all brand name endpoint devices and their various models along with a multitude of server platform and operating systems. Choosing a comprehensive backup and restore solution will eliminate the complexity and reduce overall costs.

Join us next week for part two in the series


Tom Trainer

Tom Trainer is founder and president of analyst firm Analytico. Prior to founding Analytico, Trainer was Principal Storage Product Marketing Manager at Red Hat, and Director of Marketing at Gluster prior to its acquisition by Red Hat. Tom has worked as managing senior partner at Evaluator Group, and also held senior positions at EMC, HDS, Auspex, and Memorex-Telex during his 30-year career in IT.


Leave a reply

Your email address will not be published. Required fields are marked *