Today’s global enterprises must navigate a complex data landscape fraught with both data privacy and security risks, increasingly complicated by the continuing trends of data growth, corporate data moving to the edge of their business, and shifting global data privacy regulations. Protecting and managing corporate data in this environment, especially for cloud solutions, calls for a multi-faceted approach that delivers on today’s need for both data security and privacy at every layer, while also facilitating a non-disruptive end user experience.

Bullet-Proof Security and Privacy for Cloud Stored Data

Druva’s approach to storing enterprise data, utilizing both an advanced data-scrambling algorithm and a unique envelope-based encryption model, where the data and metadata is decoupled and encrypted, guarantees that your data is only accessible by your company. Under no circumstance can Druva provide access to your data — a critical component to meeting today’s stringent global data privacy regulations.

$5.9 million

Average cost of recovering from a corporate data breach

A Cloud You Can Trust, Wherever You Store Your Data

Setting the standard for the industry, Druva leverages AWS’s global infrastructure, providing 11 selectable storage regions, which gives enterprises the flexibility to meet geographic specific data residency, security and privacy needs. Each region features numerous industry certifications, including SOC1 (Covers SAS-70 Type II, SSAE-16) and ISO-27001. Also, Druva's cloud operations are ISAE 3000 Type II certified and have been audited to be in adherence with HIPAA guidelines.

Securing Endpoints, Servers, and Everything in Between

Druva secures corporate data all the way from the device to the server with 256-bit AES enforceable encryption for stored data on endpoints and in the cloud and 256-bit SSL encryption for data in transit. Additionally, Druva integrates with Microsoft Active Directory (AD) and LDAPS for authentication and access permissions. Single-sign-on (SSO) capabilities through SAML enable users to login with existing credentials from Microsoft AD or another third-party ID provider, even on mobile devices.

Policies and Controls for Today’s Global Privacy Needs

To meet the increasing concerns around global data privacy regulations, Druva has implemented a rich set of controls that enable our customers to keep pace with these evolving requirements. Advanced policy settings restrict employee data and audit trails from being accessible to admins, delegated and granular administrative settings allow for management segregation by region, and containerization and exclusionary policies ensure personal data can be properly segregated in BYOD environments.

Protect Mobile Devices Against Data Breach & Exposure

For both laptops and smart-devices, inSync provides complete protection of corporate data if a device is lost or stolen. With geo-location, you can pinpoint the location of all devices at any time. Device-level encryption prevents unauthorized viewing of data, while remote wipe lets you completely remove corporate data, while leaving personal data on the device untouched.

data privacy

See how to geo-locate and remotely
wipe devices with inSync

Your Own Secure Private Cloud

Private cloud deployments (inSync only) provide enhanced on-premise capabilities to meet the most stringent data control requirements. Every request is authenticated by a single on-premise inSync master, and can leverage a secure proxy in the DMZ to prevent unneeded additional port configurations. To ensure zero downtime and continuous employee access to data, inSync Private Cloud features multi-destination backups and automatic failover of backups and restores.

Suggested Resources

data privacy
5 Cloud Backup Considerations Access White Paper >
data privacy
Druva Tech Moments: Two Factor Encryption Explained Watch Video >
data privacy
Virtual Tour Access Tour >
data privacy
inSync Trial Try inSync Free >