Dispelling Endpoint Data Protection Myths: World Backup Day 2018

Posted 03/27/2018 by Gregg Odgen

If you’re in the data backup and recovery business like Commvault, World Backup Day bears resemblance to your favorite holiday: it only comes once a year but you wish it happened more often. Why? Because despite all the news reports about data loss, many of you still don’t back up your endpoints. So having a few extra days dedicated to educating about backup data can only help, since data loss events consume time, money, resources AND can greatly diminish your company’s reputation.

The independent group sponsoring this event says:

  • Thirty percent of people have NEVER backed up1
  • Twenty-nine percent of [data] disasters are caused by accident1
  • One in 10 computers are infected with viruses each month1

The last factoid is especially troubling for endpoints, like desktops and laptops, since these devices live on the edge of your network. History has demonstrated repeatedly that malware often enters an organization through endpoints. It can be as simple as an unsuspecting end user clicking on just one of a thousand innocuous-looking website links – only to release yet another piece of malware into your company.

In my continuing conversations with customers and prospects, it seems there are still some persistent myths out there about endpoint data protection and how easy it is to enable. Allow me to dispel some of the more persistent myths that I've heard.

Myth – Endpoint protection is just backup

Well, there’s no denying that endpoint backup and end user data recovery processes are absolutely critical for any organization. The best solution must provide advanced tools for automating these critical processes to reduce cost, improve efficiency and ensure coverage.  Additionally, automation also frees up your end users and IT resources to focus on more important issues – like improving your business. But what else do you need for complete endpoint protection?

Just as important as backup, you need a proven way of securing endpoint data devices with remote data wiping, data encryption, geo-location, etc. – especially on laptops – to reduce the risk of data loss from events like a data breach, employee departure, or lost or stolen endpoints. The primary goal in securing endpoints is to maintain control over company data – like intellectual property, customer information, or any other sensitive data – in the face of threats from data breaches and malware, as I mentioned earlier.

Today, regulations seem to be increasing in virtually every industry. As a result, most organizations require additional visibility into company data residing on end user laptops and cloud-share services. Having an endpoint protection method that provides more visibility helps you regain control of company information for data governance purposes, and to expand access to data for improved decision-making and superior business outcomes.

Myth – My end users and administrators can’t handle the extra workload

Of course, no one would add the endpoint data protection I’ve described if it meant your end user productivity would slow to a crawl. However, the solution I’m suggesting should have little to no impact on workloads or system performance. It provides a rich end user experience that enables your users with self-service features and anytime access via a powerful mobile app and web portal – because you never know when a data-loss event will require your users to recover and restore lost, damaged, or accidentally deleted files. By empowering your end users with this ability, you can take additional burden away from IT.

You should also be protecting your data centrally, in a single repository, with streamlined discovery across all of your electronically stored information. Your IT teams will benefit from the simplified administration with push installations, automated workflows, and support for multiple OS. The solution must also be designed with the features needed to secure, backup, and provide visibility into endpoints - while minimizing any hit on performance.

Myth – There are no deployment models that fit my business

Everyone’s business is different, and a one-size-fits-all deployment approach just won’t cut it. You need a solution that provides flexible deployment options so that your business can meet any unique performance, data security, management and budget needs. You should be able to deploy on-premises, with SaaS, in the cloud or as a hybrid solution – with auto-discover for new desktops and laptops, and be able to install backup agents automatically to further reduce administrative workload. All this, while supporting the most popular cloud-storage options.

Endpoint data protection as a service must provide you with all necessary, hardware, software, facilities, people, processes, reporting and oversight to meet your business needs. It must run effortlessly on most devices, in any location, with the same self-service and automation as your on-premises solution, so that end users can retrieve and recover files without IT intervention. And only consume minimal device resources, so there are no slowdowns or interruptions for your end users.

Myth – No company can do everything described here

Wrong. In fact, Commvault Endpoint Data Protection can do everything I mentioned and more. I didn’t even cover customizable IT policies, secure collaboration, discoverability, secure file sync and sharing capabilities, or our advanced risk mitigation services, to name a few, but now I’m really starting to digress. The real reason I’m speaking to you is to remind you to consider your endpoint data protection needs in your World Backup Day activities on March 31. They’re asking us all to take the pledge and backup; I hope this is something we can all support.

You can also check out our endpoint data protection trial download (on-premises or Cloud) for 30 days free.

1 World Backup Day 2018 Website - http://www.worldbackupday.com/en/
Gregg Ogden is a Senior Manager, Solutions Marketing for Commvault.