What is an endpoint and do you need an endpoint data protection solution?
Jargon abounds in the technical world of IT, with obscure-but-precise language sometimes getting in the way of conceptual understanding. The term “endpoint” fits the bill. While it may make sense to a seasoned IT professional, the rest of us may need a little help. What exactly is an endpoint, why does it matter, and do you need an endpoint backup solution?
According to Wikipedia, Endpoint is a hardcore punk band from Louisville, Kentucky. A more common definition for endpoint in computer networking, architecture, and operations, however, is a mobile device such as a laptop, phone, or tablet.
The term has its origin in reference to computer networks. The endpoint is a device or node that connects to the LAN or WAN and accepts communications back and forth across the network. In a traditional sense, an endpoint can be a modem, hub, bridge, or switch. It also could be data terminal equipment (such as a digital telephone handset, router, or printer) or a host computer (such as a workstation or a server).
Yet today, endpoint is used most commonly in network security and end-user mobility circles to mean any device outside the corporate firewall. This could be laptops, tablets, or mobile phones on the “edge” (or periphery) of the network, which individuals connect to the central network.
Why is endpoint data backup important?
Endpoint use is increasing in the business world due to workforce mobility, by which I mean the rarity that you’re ever in your office, much less tethered to a desk. Traditional network-focused protocols are designed for the PC-era and the desktop. With an ever-growing amount of data outside the firewall on endpoint devices, IT needs to deal with security and communications in real time across varying locations and bandwidths. Adding to this risk are the possibly insecure apps loaded on employees’ ever-increasing number of devices, with consistent exposure to malware across Internet protocols.
IT teams solve for the challenges of endpoints using a variety of technologies, such as virtual private networks (VPNs), that enable safe connection to the main, managed network. Endpoint cloud backup technologies like Druva also enable real-time backup of the data on endpoints, minimizing the risk of data loss. They provide IT the tools to manage corporate data on endpoints, such as the ability to remote wipe and create a trusted data store in the cloud. They can even be used to automatically detect a malware or ransomware attack, allowing an IT admin to address it immediately – before it causes further damage.
Ironically, endpoints are quickly becoming a more common way to compute and communicate than the local, fixed machines from which they were derived. The notion of a safe and secure network and insecure endpoints is fast giving way to a more modern concept — computing across any device or network, with always-on security protecting companies and users across local, and cloud-enabled storage.
Protect your business with endpoint cloud backup
Protect your business and remote workforce against data loss, accidental or malicious data theft, and ransomware attacks with Druva’s endpoint cloud backup solution. Ready to try it for yourself? Visit the Druva website for a free trial or request a demo.