Lessons Learned from Endpoint Data Protection, Access and Search (Part 1 of 3)

Posted 11/01/2013 by gbelavadi

In our Edge virtual event webcasts, Greg White (@GregoryDWhite) from product marketing was joined by guests Rachel Dines (@RachelDines) of Forrester, Lisa Romine of Acxiom, Matthew Rubin (@mroobin) from product marketing and Dana Bailey and Roger Hamshaw, members of OnX Managed Services. Rachel is a senior analyst at Forrester with a research focus on IT continuity and disaster recovery services, backup and data center strategies. She talked about the challenges the market continues to see with mobility and endpoint protection. Lisa, a senior manager of enterprise solutions, offered her real-world use cases and experiences protecting distributed workers’ data in a secure environment and simplifying OS migrations for her IT team. In the process, she provided self-service recovery and access for end users. I’ll discuss each of these sessions and its affiliated Q&A portion in separate blogs, starting with Rachel’s session. I’ll discuss Lisa’s session and the managed service approach in future blogs.

Endpoint Trends with Rachel Dines of Forrester

  • Mobile workers are using many different types of applications: 7 or more for work
    • Applications are cloud, local, server-based
    • 53% of workers are using three or more devices such as smart phone, tablet, laptop etc.
    • Corporate and personal devices are interchangeable and data flows back and forth
    • About 1/3 of employees are considered anywhere/anytime workers-number expected to grow next year
  • How do you protect them? Keep them safe? Enable them to do their job the right way?
    • Efficiency is paramount
  • Workers are breaking rules to get their jobs done in the best way possible
    • Two main groups: rogue users (rule breakers) and good corporate citizens (rule followers)
      • 71% of rogue users share files with others inside and outside of organization (ex: personal email and calendars)
      • When rogue users are asked why they do this, the #1 response is that they’re trying to get their job done. They’re not malicious. Rogue users understand the importance of backup—if a method isn’t supplied, users will find their own.
      • Efficiency is key!
  • 61% of workers are backing up their most important data
    • Of that, 45% say they use a company-provided solution
    • But 16% use their own methods: most use removable media or external hard drive that they personally own
    • Some use file/sync share as well
    • 35% of data breaches are caused by the loss or theft of a corporate asset
  • How can we protect them? Endpoint data protection helps address the following challenges:
    • Accidental deletion
    • Control over corporate data: ties back to rogue users/good corporate citizens finding their own way to back up if there is no corporate alternative
    • Mobile workforce: workers are increasingly distributed—saving more data locally—high risk for losing data
    • eDiscovery: costs associated with searching across distributed PCs would be prohibitive
    • Operating system upgrades: companies upgrading to windows 8 or a different OS, like in a BYOD initiative, need a way to transfer data easily and minimize downtime during the upgrade process
  • Organizations’ plans to adopt online PC backup software:
    • 50% of all enterprises use some type of endpoint backup
    • Lots of companies are looking for combination solutions—not one size fits all
    • Endpoint backup and file sync/access solutions are converging - main benefit: provide user a seamless experience. Protect and enable data non-disruptively
  • Final recommendations:
    • If you aren’t already thinking about endpoint backup, start now!
    • In the market for endpoint backup?
      • Can the solution protect lots of different devices?
      • What other features does the solution offer?
      • Does the solution let you leverage the cloud as a target for endpoint backups?

The follow-up Q&A and recommendations included:

  • Data backup is primarily in the IT realm. Are there other use cases? Yes. For endpoint data that is synced and shared there are amazing implications for different business groups. Example for sales staff: if data is backed up, people who travel with just a tablet can access data securely. Marketing: lots of photos, also another important use case. You might not want to protect data the same way for all users; think about setting policies.
  • We have learned about the evolving market, how is endpoint data protection changing? The need isn’t new. For a long time, organizations didn’t allow people to save locally. Problem is users aren’t always on corporate network as they become more mobile. More data is being stored locally, forcing a need for endpoint backup. Today we see 50% of enterprises using endpoint data protection and growing!
  • Pitfalls when implementing endpoint? If you implement a solution that is intrusive, users will disable it. You want solutions that are productive and non-disruptive..
  • What can we do to limit risk for large amounts of unsecured data that is already out there? Start protecting what is out there! Try to understand what people are already using, and how you can protect them going forward. Get an understanding of end-user behavior.
  • What would you say to companies that believe they don’t have budgets to afford endpoint backup? Demonstrate how much it costs not to have backup. No one wants to invest until they feel the pain of not having invested, and then it’s too late! Really important to get out ahead of data loss/breach. Also it is a basic expectation—users will find their own data backup solution if a corporate one isn’t provided- which could be less secure.
  • What are things to consider for global companies to deploy and roll out? Consider what matters to your employees. How can I do this in the least disruptive way for the end user? Provide training. Ask yourself whether self-service and compliance are important features?
  • Is it important to protect data in endpoint devices as well as in the cloud? In short, yes. Especially in BYOD environments, because users are more mobile. No matter where it lives, you need to protect your data.
  • Healthcare perspective on data protection? Medical is becoming more digital. Not anywhere workers, but anytime workers. Information is vital to life and death scenarios!
  • Do you think having an MDM is important to endpoint protection? Need both! Both are important strategies for overall data protection strategy; deployed separately and managed in parallel.

Are you breaking your company’s rules for laptop backup or does your IT department deploy a corporate-wide solution? Look for Part 2 in this series to read about Commvault customer Acxiom’s experiences protecting distributed workers’ data in a secure environment.