SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
EXECUTIVE SUMMARY

Cloud Backup for
Endpoint Devices

Icomm  
37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk
According to Gartner, by 2015 more than
60% of enterprises will have suffered
material loss of sensitive corporate data
via mobile devices.

Armed with their own mobile devices and faster
wireless speeds, your employees are looking to
access corporate data on the move. They are creating,
consuming and storing mission-critical business
information on laptops, smartphones and tablets.
Sometimes those devices are corporate-issued,
but often they are using their own personal devices.

Imagine if an employee’s laptop or tablet containing
critical business data was lost or stolen: you could
remotely wipe the device to prevent anyone else from
having access to the information, but what if you’ve
never backed up the data? You too would lose access
to it. And how do you ensure your data and corporate
intellectual property (IP) is protected in this scenario?

As noted by Forrester Research1, in order to avoid
employees operating in an IT underground, you may
be one of many organizations that are developing a
Bring-Your-Own-Device (BYOD)2 policy to address
security concerns. Letting your employees use their
own mobile devices may boost employee morale, but
it also moves sensitive data outside the boundaries of
an enterprise’s data center onto devices that are out
of your control.

If you do not have a policy for backing up the data on
these endpoint devices, there’s a good chance your
employees have been backing up data themselves.
Some might backup data to USB devices, including
external hard drives, and some to unsecure public
cloud services such as iCloud. Others may use
sync and share software. In all cases, you face the
possibility of data being leaked outside your firewall.
Your corporate IP may be residing unprotected on
USBs which can be lost or stolen or might be getting
shared indiscriminately across multiple devices with
people who shouldn’t have access to it.

Even if your organization has implemented policies
to govern applications employees are permitted to
use on mobile devices to access corporate data and
configuring them so their memory can be wiped clean
when required, you still run the risk of losing access
to this data unless it is safely backed up to your
authorized data center.

Not having a policy for backing up endpoint devices
puts your corporate data at risk. To protect yourself
from threats to your competitive advantage, loss of
reputation and regulatory non-compliance, you need a
secure end-to-end data backup and recovery solution
that protects all of your data, including the data
residing on endpoint devices.

¹	 Your workforce is already using their personal computers to boost efficiency. Instead of forcing them to operate in an IT underground, it’s time to develop
a bring-your-own-device (BYOD) program that addresses security concerns while building a solid base for future innovation. – Forrester Research
²	 Bring-your-own-device (BYOD) is an alternative strategy allowing employees, business partners and other users to use a personally selected and
purchased client device to execute enterprise applications and access data. – Gartner Research

Icomm  
37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk
According to MSP Mentor, 52% of
companies offering BYOD placed a
mobile usage policy in place that their
employees must agree to and sign.

Introduction
Thanks to the rampant popularity of tablets and
smartphones, the BYOD phenomenon is not going away.
As employees bring their personal devices to the office
your corporate IP now resides alongside family photos
and personal text messages. Have you ever wondered
what happens to your data when an employee leaves
your organization? What if the device is lost and gets
into the hands of someone who should not have access
to this information?
To protect unauthorized access and loss of corporate
data, you can obtain the consent of employees to wipe
the device of all data in the event of device loss or theft.
This is something your service provider can enable on any
devices employees use to access corporate data. However,
once you wipe the data, no one has access to it anymore –
including you.
Most organizations do not have a policy for backing up
data sitting on endpoint devices. So many employees
have been using their own methods to makes copies of
corporate data they consume and create, including USB
devices and sync and share software, but these methods
are not secure. They also move corporate data out of your
control, potentially putting corporate IP into the hands
of people who should not have access to this confidential
data. Imagine if your competition gets its hands on
sensitive information or if it reaches the media. Think of
instances where highly sensitive corporate information in
heavily regulated sectors such as healthcare and financial
services is leaked. Your business may just come to an end
and you may be left facing legal consequences.

Icomm  
37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk

The Risk of Leaving Endpoint
Data Unprotected
Business decision makers understand the need for
safeguarding data on these devices in the same way they
protect all on-premise data that resides on your LAN,
but you may be holding off enabling this much needed
protection because of resistance from your employees.
For example, mobile workers who connect infrequently to
your enterprise network may oppose the installation of any
backup software on their laptops because they worry that
time-consuming backup jobs will impact the performance
of their machines. When it comes to personal devices,
including smartphones, end users are wary of installing
any applications provided by corporate IT. After all, they
contend, it is their device and so they have the right
to refuse to install any software that may harm their
smartphone.
IT managers may be tempted to look the other way when
it comes to backing up endpoint devices because it might
increase bandwidth use and lead to clogged networks
when mobile devices hop back on to corporate networks
after a long time and time-consuming backup jobs kick in.
They may also be concerned that managing the backup
of these devices will need special tools and strategies to
support the wide array of devices employees are bringing
into the corporate environment, leading to additional costs
and the need for completely new service providers and
investments in new infrastructure.
Whatever your reasons, not implementing a policy for
backing up the data on these devices can leave you
exposed to the threat of losing confidential information
and the consequences of data loss.
Figure 1: Asigra supports the backup and restore on a wide
range of endpoint devices and operating systems

Complete Endpoint Device Backup
Powered by Asigra
Our cloud backup solution powered by Asigra provides
organizations with a single solution to protect all data
in the enterprise, no matter where it resides, including
mobile endpoints. We can backup data and applications
from any device that holds your organization’s confidential
information. From enterprise servers to physical
and virtual machines to desktops, laptops, tablets,
smartphones and cloud-based applications, our cloud
backup service can backup all data seamlessly to your
own authorized, secure offsite data center.

Comprehensive OS support
The BYOD world is full of aficionados who swear by
particular operating systems and device brands, so we
understand that any solution to protect data on these
endpoints must be broad-based and include support for
multiple operating systems and platforms. Our cloud
backup service is hardware and software independent
and supports all major operating systems. Whether your
desktop or laptop users run Windows, Linux, or Mac
OS, our solution can protect the data on their PCs. It can

Icomm  
37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk

also protect Apple iOS and Android devices, thereby
supporting the majority of tablets and smartphones
found in corporate environments today, whether they
are personal devices brought into the organization by
employees or issued by the company.

Bandwidth and storage optimized backups
Our cloud backup service uses incremental forever
functionality to make sure only changed files are sent over
the network to the backup repository. In addition, all data
is deduplicated and compressed before it is transmitted,
thereby ensuring efficient use of your bandwidth. Our
cloud backup solution also performs deduplication at the
target to efficiently store your data in our secure offsite
data center.

Secure backups
Our cloud backup service powered by Asigra encrypts
your data at the source and during transmission to the
backup repository using secure AES encryption to encode
the information to prevent unauthorized access during
the backup and restore processes and when it is stored in
backup repositories.
Intuitive and easy to use
We can configure your backups to run according to your
preferences to ensure your data is backed up at regular
intervals and that it is always protected. Our cloud backup
application lets employees run backup and restore jobs on
their devices if necessary, using a simple and user-friendly
interface.

Certified Endpoint Backup Apps available
for download
The Asigra Cloud Backup application for tablets and
smartphones that powers our cloud backup service is
available for download from the Apple App Store and
from Google Play, so your employees can download it for
free. This helps you overcome their objections about not
wanting to install a suspect custom application on their
personal devices.

For more information on our cloud backup services for endpoint devices or
to schedule a complimentary Recoverability Assessment contact us today.
About Asigra Cloud Backup
Award-winning Asigra Cloud Backup is an agentless hardware-and-software platform agnostic
cloud backup, recovery and restore software solution that supports servers, virtual machines,
desktops, laptops, tablets, smartphones, cloud-based applications, enterprise applications and
databases enabling organizations to resume business operations quickly while reducing costs
and achieving peace of mind.

Icomm  
37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk
© 2012 Asigra, the Asigra logo and Asigra Cloud Backup are trademarks of Asigra Inc. All other product and company names are trademarks or registered trademarks of their respective owners.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

The Industrialist: Sparks
The Industrialist: SparksThe Industrialist: Sparks
The Industrialist: Sparks
 
Harnessing potential of artificial intelligence in energy & oil and gas
Harnessing potential of artificial intelligence in energy & oil and gasHarnessing potential of artificial intelligence in energy & oil and gas
Harnessing potential of artificial intelligence in energy & oil and gas
 
IoT in aircraft manufacturing-tech m
IoT in aircraft manufacturing-tech mIoT in aircraft manufacturing-tech m
IoT in aircraft manufacturing-tech m
 
Internet of Industrial Things Presentation - Sophie Peachey - IoT Midlands Me...
Internet of Industrial Things Presentation - Sophie Peachey - IoT Midlands Me...Internet of Industrial Things Presentation - Sophie Peachey - IoT Midlands Me...
Internet of Industrial Things Presentation - Sophie Peachey - IoT Midlands Me...
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 published
 
Digital Transformation in the Lab
Digital Transformation in the LabDigital Transformation in the Lab
Digital Transformation in the Lab
 
Emerging industry trends
Emerging industry trendsEmerging industry trends
Emerging industry trends
 
IoT Aerospace
IoT AerospaceIoT Aerospace
IoT Aerospace
 
Ibm cloud and IOT industry
Ibm cloud and IOT industryIbm cloud and IOT industry
Ibm cloud and IOT industry
 
Wind Riverpost - Company Profile
Wind Riverpost - Company ProfileWind Riverpost - Company Profile
Wind Riverpost - Company Profile
 
Artificial Intelligence In Automotive Industry: Surprisingly Slow Uptake And ...
Artificial Intelligence In Automotive Industry: Surprisingly Slow Uptake And ...Artificial Intelligence In Automotive Industry: Surprisingly Slow Uptake And ...
Artificial Intelligence In Automotive Industry: Surprisingly Slow Uptake And ...
 
The Internet of Flying Things - Part 2
The Internet of Flying Things - Part 2The Internet of Flying Things - Part 2
The Internet of Flying Things - Part 2
 
Data Science at Roche: From Exploration to Productionization - Frank Block
Data Science at Roche: From Exploration to Productionization - Frank BlockData Science at Roche: From Exploration to Productionization - Frank Block
Data Science at Roche: From Exploration to Productionization - Frank Block
 
mAutomotive - Every Car Connected
mAutomotive - Every Car ConnectedmAutomotive - Every Car Connected
mAutomotive - Every Car Connected
 
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
 
Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017
 
Mobile Convention Amsterdam 2014 - GE - Peter van der Fluit
Mobile Convention Amsterdam 2014 - GE - Peter van der FluitMobile Convention Amsterdam 2014 - GE - Peter van der Fluit
Mobile Convention Amsterdam 2014 - GE - Peter van der Fluit
 
Digital Transformation in the Manufacturing sector
Digital Transformation in the Manufacturing sectorDigital Transformation in the Manufacturing sector
Digital Transformation in the Manufacturing sector
 
IoT customer centric smart applications offered by utility companies
IoT customer centric smart applications offered by utility companiesIoT customer centric smart applications offered by utility companies
IoT customer centric smart applications offered by utility companies
 
Digital Twin Market by Type, Application, Technology and Region: Global Indus...
Digital Twin Market by Type, Application, Technology and Region: Global Indus...Digital Twin Market by Type, Application, Technology and Region: Global Indus...
Digital Twin Market by Type, Application, Technology and Region: Global Indus...
 

Ähnlich wie Cloud backup-for-endpoint-devices

how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
Marta Kusinska
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
IBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
IBM Software India
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's Guide
Reece Gaumont
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
olivier lussac
 

Ähnlich wie Cloud backup-for-endpoint-devices (20)

Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's Guide
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What?
 

Mehr von Icomm Technologies

Mehr von Icomm Technologies (20)

The truth behind cyber attacks
The truth behind cyber attacks The truth behind cyber attacks
The truth behind cyber attacks
 
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
 
Anatomy of a cyber-attack
Anatomy of a cyber-attackAnatomy of a cyber-attack
Anatomy of a cyber-attack
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
 
Swivel Secure and Office 365
Swivel Secure and Office 365Swivel Secure and Office 365
Swivel Secure and Office 365
 
Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Top 10 Trends in Telecommuting
Top 10 Trends in TelecommutingTop 10 Trends in Telecommuting
Top 10 Trends in Telecommuting
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Tackling consumerization of it
Tackling consumerization of it Tackling consumerization of it
Tackling consumerization of it
 
Office 365-technical-overview-deck
Office 365-technical-overview-deckOffice 365-technical-overview-deck
Office 365-technical-overview-deck
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paper
 
Icomm cloud-backup-overview
Icomm cloud-backup-overviewIcomm cloud-backup-overview
Icomm cloud-backup-overview
 
Icomm agentless-architecture
Icomm agentless-architectureIcomm agentless-architecture
Icomm agentless-architecture
 
Efficiently protect-virtual-machines
Efficiently protect-virtual-machinesEfficiently protect-virtual-machines
Efficiently protect-virtual-machines
 

Kürzlich hochgeladen

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Dipal Arora
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 

Kürzlich hochgeladen (20)

Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 

Cloud backup-for-endpoint-devices

  • 1. EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices Icomm   37­55 Camden Street, Birmingham,  B1 3BP United Kingdom T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk
  • 2. According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with their own mobile devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating, consuming and storing mission-critical business information on laptops, smartphones and tablets. Sometimes those devices are corporate-issued, but often they are using their own personal devices. Imagine if an employee’s laptop or tablet containing critical business data was lost or stolen: you could remotely wipe the device to prevent anyone else from having access to the information, but what if you’ve never backed up the data? You too would lose access to it. And how do you ensure your data and corporate intellectual property (IP) is protected in this scenario? As noted by Forrester Research1, in order to avoid employees operating in an IT underground, you may be one of many organizations that are developing a Bring-Your-Own-Device (BYOD)2 policy to address security concerns. Letting your employees use their own mobile devices may boost employee morale, but it also moves sensitive data outside the boundaries of an enterprise’s data center onto devices that are out of your control. If you do not have a policy for backing up the data on these endpoint devices, there’s a good chance your employees have been backing up data themselves. Some might backup data to USB devices, including external hard drives, and some to unsecure public cloud services such as iCloud. Others may use sync and share software. In all cases, you face the possibility of data being leaked outside your firewall. Your corporate IP may be residing unprotected on USBs which can be lost or stolen or might be getting shared indiscriminately across multiple devices with people who shouldn’t have access to it. Even if your organization has implemented policies to govern applications employees are permitted to use on mobile devices to access corporate data and configuring them so their memory can be wiped clean when required, you still run the risk of losing access to this data unless it is safely backed up to your authorized data center. Not having a policy for backing up endpoint devices puts your corporate data at risk. To protect yourself from threats to your competitive advantage, loss of reputation and regulatory non-compliance, you need a secure end-to-end data backup and recovery solution that protects all of your data, including the data residing on endpoint devices. ¹ Your workforce is already using their personal computers to boost efficiency. Instead of forcing them to operate in an IT underground, it’s time to develop a bring-your-own-device (BYOD) program that addresses security concerns while building a solid base for future innovation. – Forrester Research ² Bring-your-own-device (BYOD) is an alternative strategy allowing employees, business partners and other users to use a personally selected and purchased client device to execute enterprise applications and access data. – Gartner Research Icomm   37­55 Camden Street, Birmingham,  B1 3BP United Kingdom T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk
  • 3. According to MSP Mentor, 52% of companies offering BYOD placed a mobile usage policy in place that their employees must agree to and sign. Introduction Thanks to the rampant popularity of tablets and smartphones, the BYOD phenomenon is not going away. As employees bring their personal devices to the office your corporate IP now resides alongside family photos and personal text messages. Have you ever wondered what happens to your data when an employee leaves your organization? What if the device is lost and gets into the hands of someone who should not have access to this information? To protect unauthorized access and loss of corporate data, you can obtain the consent of employees to wipe the device of all data in the event of device loss or theft. This is something your service provider can enable on any devices employees use to access corporate data. However, once you wipe the data, no one has access to it anymore – including you. Most organizations do not have a policy for backing up data sitting on endpoint devices. So many employees have been using their own methods to makes copies of corporate data they consume and create, including USB devices and sync and share software, but these methods are not secure. They also move corporate data out of your control, potentially putting corporate IP into the hands of people who should not have access to this confidential data. Imagine if your competition gets its hands on sensitive information or if it reaches the media. Think of instances where highly sensitive corporate information in heavily regulated sectors such as healthcare and financial services is leaked. Your business may just come to an end and you may be left facing legal consequences. Icomm   37­55 Camden Street, Birmingham,  B1 3BP United Kingdom T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk The Risk of Leaving Endpoint Data Unprotected Business decision makers understand the need for safeguarding data on these devices in the same way they protect all on-premise data that resides on your LAN, but you may be holding off enabling this much needed protection because of resistance from your employees. For example, mobile workers who connect infrequently to your enterprise network may oppose the installation of any backup software on their laptops because they worry that time-consuming backup jobs will impact the performance of their machines. When it comes to personal devices, including smartphones, end users are wary of installing any applications provided by corporate IT. After all, they contend, it is their device and so they have the right to refuse to install any software that may harm their smartphone. IT managers may be tempted to look the other way when it comes to backing up endpoint devices because it might increase bandwidth use and lead to clogged networks when mobile devices hop back on to corporate networks after a long time and time-consuming backup jobs kick in. They may also be concerned that managing the backup of these devices will need special tools and strategies to support the wide array of devices employees are bringing into the corporate environment, leading to additional costs and the need for completely new service providers and investments in new infrastructure. Whatever your reasons, not implementing a policy for backing up the data on these devices can leave you exposed to the threat of losing confidential information and the consequences of data loss.
  • 4. Figure 1: Asigra supports the backup and restore on a wide range of endpoint devices and operating systems Complete Endpoint Device Backup Powered by Asigra Our cloud backup solution powered by Asigra provides organizations with a single solution to protect all data in the enterprise, no matter where it resides, including mobile endpoints. We can backup data and applications from any device that holds your organization’s confidential information. From enterprise servers to physical and virtual machines to desktops, laptops, tablets, smartphones and cloud-based applications, our cloud backup service can backup all data seamlessly to your own authorized, secure offsite data center. Comprehensive OS support The BYOD world is full of aficionados who swear by particular operating systems and device brands, so we understand that any solution to protect data on these endpoints must be broad-based and include support for multiple operating systems and platforms. Our cloud backup service is hardware and software independent and supports all major operating systems. Whether your desktop or laptop users run Windows, Linux, or Mac OS, our solution can protect the data on their PCs. It can Icomm   37­55 Camden Street, Birmingham,  B1 3BP United Kingdom T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk also protect Apple iOS and Android devices, thereby supporting the majority of tablets and smartphones found in corporate environments today, whether they are personal devices brought into the organization by employees or issued by the company. Bandwidth and storage optimized backups Our cloud backup service uses incremental forever functionality to make sure only changed files are sent over the network to the backup repository. In addition, all data is deduplicated and compressed before it is transmitted, thereby ensuring efficient use of your bandwidth. Our cloud backup solution also performs deduplication at the target to efficiently store your data in our secure offsite data center. Secure backups Our cloud backup service powered by Asigra encrypts your data at the source and during transmission to the backup repository using secure AES encryption to encode the information to prevent unauthorized access during the backup and restore processes and when it is stored in backup repositories.
  • 5. Intuitive and easy to use We can configure your backups to run according to your preferences to ensure your data is backed up at regular intervals and that it is always protected. Our cloud backup application lets employees run backup and restore jobs on their devices if necessary, using a simple and user-friendly interface. Certified Endpoint Backup Apps available for download The Asigra Cloud Backup application for tablets and smartphones that powers our cloud backup service is available for download from the Apple App Store and from Google Play, so your employees can download it for free. This helps you overcome their objections about not wanting to install a suspect custom application on their personal devices. For more information on our cloud backup services for endpoint devices or to schedule a complimentary Recoverability Assessment contact us today. About Asigra Cloud Backup Award-winning Asigra Cloud Backup is an agentless hardware-and-software platform agnostic cloud backup, recovery and restore software solution that supports servers, virtual machines, desktops, laptops, tablets, smartphones, cloud-based applications, enterprise applications and databases enabling organizations to resume business operations quickly while reducing costs and achieving peace of mind. Icomm   37­55 Camden Street, Birmingham,  B1 3BP United Kingdom T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk © 2012 Asigra, the Asigra logo and Asigra Cloud Backup are trademarks of Asigra Inc. All other product and company names are trademarks or registered trademarks of their respective owners.