Enterprises today face unprecedented data security risks, increasingly complicated by the continuing trends of data-growth and business data moving to the edge of their business. Regardless of the data moving to mobile devices, or remote locations, protecting and managing corporate data in this environment calls for a multi-layered security approach that delivers coverage at every level while facilitating a non-disruptive end user experience.

$7.2
million

Average cost of recovering from a corporate data breach.

Unparalleled Cloud Security

Druva provides comprehensive protection of corporate data in the cloud, and leverages the AWS cloud infrastructure, which features numerous industry certifications, including SOC 1 (Covers SAS-70 Type II, SSAE-16). Additionally, Druva's cloud operations are ISAE 3000 Type II certified. Customer data is completely compartmentalized, and unique two-factor encryption prevents anyone—including Druva—from accessing customer data under any condition.

Your Own Secure Private Cloud

Private cloud deployments (inSync Only) provide enhanced on-premise capabilities to meet the most stringent data control requirements. Every request is authenticated by a single on-premise cloud master, and an edge server in the DMZ provides secure communication with inSync servers behind the firewall. To ensure zero downtime and continuous employee access to data, inSync Private Cloud features multi-destination backups and automatic failover of backups and restores.

End-to-End Security You Can Count On

Druva secures corporate data all the way from the device to the server with 256-bit SSL encryption for data in transit and 256-bit AES encryption for stored data. Secure HTTPS and LDAPS protocols prevent unauthorized access to data. For end user devices, inSync integrates with Microsoft Active Directory for authentication and access. Single sign-on capabilities through SAML enable users to login with existing credentials from Microsoft AD or another third-party ID provider, even on mobile devices. For Phoenix, authenticating servers for backup is done using a token that is known only to the administrator.

Protect Mobile Devices Against Data Breach and Leakage

For mobile devices, inSync provides complete protection of corporate data if a device is lost or stolen. With geo-location, you can pinpoint the location of all devices at any time. Device-level encryption prevents unauthorized viewing of data, while remote wipe lets you completely remove corporate data.

Geo-Location-Remote=Wipe=Inline=Lightbox

See how to geo-locate and remotely
wipe devices with inSync

Suggested Resources

5 Cloud Backup Considerations Access White Paper >
Druva Tech Moments: Two Factor Encryption Explained Watch Video >
Virtual Tour Access Tour >
inSync Trial Try inSync Free >