inSync provides a unified solution for the protection and governance of end-user data, no matter where it resides across endpoints and cloud applications. For IT, inSync provides a full suite of management capabilities, including backup and restore, eDiscovery enablement with tamper-proof audit trails, and compliance monitoring. For the end-user, inSync provides self-restore capabilities and anywhere, anytime, any device access and sharing.
The Druva inSync dashboard provides an intuitive interface with quick links for more in-depth details. The unified console provides complete data visibility and control of corporate data, with services such as backup, eDiscovery enablement, compliance management, DLP and anomaly detection. IT administrators can easily see the total number of users for devices and cloud applications, on legal hold, or with potential compliance issues. Administrators are also able to see the number of devices and their locations; storage usage across all global regions; backup and restore status across endpoints and cloud applications; file sharing statistics; and the number of devices being tracked and encrypted.
Cloud Application Integration
Druva’s integration with cloud applications, such as Office 365, G Suite, Box, and Salesforce, enables IT to have a single access point for viewing, managing and recovering end-user data. By bringing disparate data sources together, inSync empowers the organization to quickly identify data risks, place legal holds and monitor and track their data to better adhere to company data governance and industry regulations.
User management is simplified through the use of profiles, to which users are assigned. For each profile, the administrator has complete control and configurability over backup content, and also can enable the backup of personal settings in order to aid in OS migration and device refreshes. Administrators can also determine whether to allow users to modify the content that is backed up.
Administrators can easily set separate backup schedules for laptops and desktops; smartphones and tablets; and cloud applications. Additional options include setting retention schedules, network preferences, and resource allotment.
Administrators can determine how much control to give users over backups, such as whether the backup schedule can be changed, backups can be paused, backup folders can be altered, or backup settings can be changed. Administrators can also set a per user quota, set limits on the number of devices users can backup with inSync, prevent inSync from appearing in the system tray, and control when a device is deemed inactive.
Data Loss Protection
Data loss protection features are available on all mobile devices, including laptops where the corporate data can be wiped. Remote wipe can be initiated by the administrator or set to occur automatically after a designated period of time. Geo-location capabilities allow a device to be tracked across any location.
With inSync, administrators have a centralized interface for managing legal holds across all end-user data on endpoints and in cloud applications. Custodian data is held in place and chain of custody reporting, extended metadata and file fingerprinting ensure data integrity. Data can easily be passed to any eDiscovery vendor, even cloud-to-cloud, without the need for exporting.
With Proactive Compliance, organizations gain the ability to automate the process of identifying files that may contain sensitive information like personal health information (PHI), personally identifiable information (PII), personal credit information (PCI), and intellectual property (IP). inSync provides a unified dashboard for IT and compliance teams to configure, assess and take corrective action for non-compliance on regulated or policy managed end-user data.
Unusual Data Activity
Unusual data activity monitoring alerts IT of any unexpected activity, such as if a large number of file changes, which may indicate malware, or the deletion of a large amount of data, which may indicate a rogue employee. Administrators can clearly identify which backup set is affected, making it possible to revert back to an earlier, intact data set.
Enterprise search enables organizations to conduct internal investigations, locate a malware-infected file or find corporate-specific sensitive data. Administrators are able to quickly locate any file or email across users, devices, cloud applications, or storage locations.