SlideShare a Scribd company logo
Protecting Data on Endpoints

EVault Endpoint Protection
Turnkey backup and recovery for enterprises concerned about
data availability and data loss on laptops

www.evault.com
Protecting Data on Endpoints

• Understand the unique requirements
• How it fits with key corporate initiatives today
• Increase your strategic value to your customers

www.evault.com
EVault, A Seagate Company
Seagate Subsidiary
Global Presence to partner/demo/solve customer needs:
HQ in California
EMEA HQ in the Netherlands
APAC HQ in Singapore
LATAM HQ in Ft. Lauderdale

 EVault offers 24/7/365 support.
 Support staff is located in the US

>43,000 customers worldwide
>15,000 data recoveries a month
>98% customer satisfaction
www.evault.com

2
Trends Driving Endpoint Opportunities

• Changing work policies
and work environments
• Increased data on
laptops: IP, content, 24/7
information
• Productivity is
competitive advantage
• Remote offices
• Endpoint vulnerability

www.evault.com
Protecting Data on Endpoints

EVault’s turnkey backup

and

recovery solution
for enterprises
concerned about data availability and

data loss on laptops

www.evault.com
EVault Solves Every Day Use Cases

d Data
s
Keeping IT and On-the-Go Employees Productive
-

d

No employee or device impact
Self-service; reduces help desk calls
24/7 • no connectivity required
Network aware backup
Automated, synchronized

red
dwidth
d policies

Average
value of a
lost laptop
is
$49,246

ions

ork

Source:
Ponemon
cache
Institute

Mitigating Risks of Data Loss
-

2012
employee
turnover rate
37.1%
Source: BLS.gov

www.evault.com

Laptop loss, breakage
Identify data at risk
Wipe data, track device
No connectivity required

Timely Data Availability
in Case of Employee Turnover
-

No wait time
Device suspension
Remote wipe
Designed for Cloud Deployment
Overcoming Limited Bandwidth:
Network Caching, Deduplication
Agent:
>90% bandwidth
savings; global
dedup at source;
shortened backup

Secure Key Management
Complete Data Separation

Per Device Keys

•
•

Keeps data separated
Does not risk global access

No Decryption During De-duplication

Optional Onsite
Network Cache
-

LAN speed
performance

Key Escrow

-

Scheduled and
controlled uploads

-

www.evault.com

Optional Onsite Key Server

Minimized network
impact and costs

•

Stores keys inside network

6
Market Positioning
Traditional Server
Based Backup

Positioning Strength
= excellent

= poor

Designed for end user productivity
Dedup at source, self-recovery
Silent, flexible backup, no connectivity
requirements

Cloud-connected efficiency
Increased reliability, upload control
Secure, global dedup

Complete visibility and control
Timely recovery, data wipe, device tracing,
key management

www.evault.com

Designed for
Endpoint Backup
Who Benefits? How to Qualify?

•

Desktop Administrator Lead

•

Security Officers

•

Small to midsize enterprises, enterprises

•

Budget/Influence:

Organizations with remote offices

•

Organization looking for cloud migration

•

Highly mobile workforces

•

Compliance, IP driven organizations

Questions to ask:
How do you handle employee turnovers?
Do you have any problems getting the equipment back and making data available in a timely
manner?
Have employees lost laptops in the past?
How did you determine what data was at risk?
How did you minimize the risk? What compliance actions did you have to take?
How did you restore the laptop’s data?
How do you enable end users recover lost or overwritten files?
It is a burden to IT?
Have you found that employees are starting to implement ad-hoc solutions to backup their laptops
and desktops?
Are you in control of where your data resides with these ad-hoc solution?
www.evault.com
Enterprise Grade Deployments

www.evault.com
Available to all
customers
Ideal for customers with
< 1000 devices



MRR and referral fees





Simplest to deploy and
manage
No deployment costs
No Vault infrastructure costs or
maintenance requirements
EVault manages Vault uptime








www.evault.com





CC-Reseller
CC-SP
Special Offers
available in FY14

250 devices min order
+ deployment fees
Ideal for enterprises w/
> 1000 devices
Increases consumption Azure
through MS
Software revenue EVault
Service installations
Azure committed dollars
Greater data separation and
customization
EVault manages Vault uptime

CC-Reseller
CC-SP
On Premise

EVault Cloud

CC-Resellers

Partner/Customer
Azure Cloud

Deployment Options

250 devices min order
+ deployment fees
Ideal for partners w/
> 1000 devices



Installations, software



Deploy on customer/partner’s
hardware
Data stored in
customer/partner’s datacenter
Customer/partner manages
Vault uptime




11/19/2013 | © 2013 EVault, Inc. All Rights Reserved |

10
24x7x365 Global Support
North America Region

Europe Region

Canada
- Mississauga
- Toronto

N and Central
- Europe
- Netherlands
- UK
- Germany

East
- New York

West
- San
Francisco
Mountain
- Salt Lake

N. Central
- Chicago

Asia Pacific Region

W. Europe
- France

Asia
- Singapore
- Hong Kong
- India

S. East
- Ft.
Lauderdale

LATAM
- Mexico
- Chile
- Colombia
- Argentina

EVault Office

Australia

Sales
Leadership
www.evault.com

11
Global Language Support
Based on the local
OS:
 English
 Spanish
 French
 Portuguese
 German
 Polish
 Japanese
 Simplified
Chinese
 Korean

Endpoint user interface now available in 9 languages
www.evault.com

12
Guidance to Sell

1
3

Get the Skills
Sales & Technical
Training
Video, Whitepapers
Datasheets
Use Cases

Engage
Field Marketing
Utilize Campaign Tools
& Collateral
Joint Presos
NFR licenses

2
4

Start
Account Planning
with your
Partner Manager

Close & Deploy
Demo
Proposal
PoC
Close
Deploy

Get started, improve your
www.evault.com

Skills today
We got you covered!

Cloud Connected™
Data Protection

Over 17,000 recoveries monthly

www.evault.com

Over 43,000 customers world wide

11/19/2013

Cloud Connected Backup & Recovery
since 1997

| © 2013 EVault, Inc. All Rights Reserved |

14

More Related Content

What's hot

Veeam Availability Suite version 10
Veeam Availability Suite version 10Veeam Availability Suite version 10
Veeam Availability Suite version 10
Tanawit Chansuchai
 
Veeam: Ochrana a zálohovanie virtuálneho prostredia VMware vSphere - Veeam Ba...
Veeam: Ochrana a zálohovanie virtuálneho prostredia VMware vSphere - Veeam Ba...Veeam: Ochrana a zálohovanie virtuálneho prostredia VMware vSphere - Veeam Ba...
Veeam: Ochrana a zálohovanie virtuálneho prostredia VMware vSphere - Veeam Ba...
ASBIS SK
 
TSM 6.4 Technical updates
TSM 6.4 Technical updates TSM 6.4 Technical updates
TSM 6.4 Technical updates
Solv AS
 
IBM Storage and VMware – A Winning Combination
IBM Storage and VMware – A Winning CombinationIBM Storage and VMware – A Winning Combination
IBM Storage and VMware – A Winning Combination
Paula Koziol
 
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
Symantec
 
Evento Veeam & Assyrus - 6 Pianificare lato sorgente
Evento Veeam & Assyrus - 6 Pianificare lato sorgenteEvento Veeam & Assyrus - 6 Pianificare lato sorgente
Evento Veeam & Assyrus - 6 Pianificare lato sorgente
Andrea Mauro
 
Better Backup For All - February 2012
Better Backup For All - February 2012Better Backup For All - February 2012
Better Backup For All - February 2012
Symantec
 
VBR v8 Overview-handout
VBR v8 Overview-handoutVBR v8 Overview-handout
VBR v8 Overview-handout
Bastian Nurcahya
 
SQL Backup trough Veeam *AND* SQL
SQL Backup trough Veeam *AND* SQLSQL Backup trough Veeam *AND* SQL
SQL Backup trough Veeam *AND* SQL
Tanawit Chansuchai
 
How to achieve better backup with Symantec
How to achieve better backup with SymantecHow to achieve better backup with Symantec
How to achieve better backup with Symantec
Arrow ECS UK
 
Introducing Colama: virtual lab infrastructure for Enterprise
Introducing Colama: virtual lab infrastructure for EnterpriseIntroducing Colama: virtual lab infrastructure for Enterprise
Introducing Colama: virtual lab infrastructure for Enterprise
Coriolis Technologies
 
Novinky v NetBackup 7.7
Novinky v NetBackup 7.7Novinky v NetBackup 7.7
Novinky v NetBackup 7.7
MarketingArrowECS_CZ
 
IBM Software, Tivoli Storage Manager
IBM Software, Tivoli Storage ManagerIBM Software, Tivoli Storage Manager
IBM Software, Tivoli Storage Manager
Zainal Abidin
 
Presentation v center site recovery manager
Presentation   v center site recovery managerPresentation   v center site recovery manager
Presentation v center site recovery manager
solarisyourep
 
EV9 & NBU5000
EV9 & NBU5000EV9 & NBU5000
EV9 & NBU5000
Symantec
 
VMworld Europe 2014: Take Virtualization to the Next Level - vSphere with Ope...
VMworld Europe 2014: Take Virtualization to the Next Level - vSphere with Ope...VMworld Europe 2014: Take Virtualization to the Next Level - vSphere with Ope...
VMworld Europe 2014: Take Virtualization to the Next Level - vSphere with Ope...
VMworld
 
VMworld Europe 2014: Top 10 Do’s / Don’ts of Data Protection For VMware vSphere
VMworld Europe 2014: Top 10 Do’s / Don’ts of Data Protection For VMware vSphereVMworld Europe 2014: Top 10 Do’s / Don’ts of Data Protection For VMware vSphere
VMworld Europe 2014: Top 10 Do’s / Don’ts of Data Protection For VMware vSphere
VMworld
 
VMworld 2013: Part 2: How to Build a Self-Healing Data Center with vCenter Or...
VMworld 2013: Part 2: How to Build a Self-Healing Data Center with vCenter Or...VMworld 2013: Part 2: How to Build a Self-Healing Data Center with vCenter Or...
VMworld 2013: Part 2: How to Build a Self-Healing Data Center with vCenter Or...
VMworld
 
5 Simple Steps to Migrate to AWS – Zerto
  5 Simple Steps to Migrate to AWS – Zerto  5 Simple Steps to Migrate to AWS – Zerto
5 Simple Steps to Migrate to AWS – Zerto
Amazon Web Services
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization
1CloudRoad.com
 

What's hot (20)

Veeam Availability Suite version 10
Veeam Availability Suite version 10Veeam Availability Suite version 10
Veeam Availability Suite version 10
 
Veeam: Ochrana a zálohovanie virtuálneho prostredia VMware vSphere - Veeam Ba...
Veeam: Ochrana a zálohovanie virtuálneho prostredia VMware vSphere - Veeam Ba...Veeam: Ochrana a zálohovanie virtuálneho prostredia VMware vSphere - Veeam Ba...
Veeam: Ochrana a zálohovanie virtuálneho prostredia VMware vSphere - Veeam Ba...
 
TSM 6.4 Technical updates
TSM 6.4 Technical updates TSM 6.4 Technical updates
TSM 6.4 Technical updates
 
IBM Storage and VMware – A Winning Combination
IBM Storage and VMware – A Winning CombinationIBM Storage and VMware – A Winning Combination
IBM Storage and VMware – A Winning Combination
 
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - OST Powered Appl...
 
Evento Veeam & Assyrus - 6 Pianificare lato sorgente
Evento Veeam & Assyrus - 6 Pianificare lato sorgenteEvento Veeam & Assyrus - 6 Pianificare lato sorgente
Evento Veeam & Assyrus - 6 Pianificare lato sorgente
 
Better Backup For All - February 2012
Better Backup For All - February 2012Better Backup For All - February 2012
Better Backup For All - February 2012
 
VBR v8 Overview-handout
VBR v8 Overview-handoutVBR v8 Overview-handout
VBR v8 Overview-handout
 
SQL Backup trough Veeam *AND* SQL
SQL Backup trough Veeam *AND* SQLSQL Backup trough Veeam *AND* SQL
SQL Backup trough Veeam *AND* SQL
 
How to achieve better backup with Symantec
How to achieve better backup with SymantecHow to achieve better backup with Symantec
How to achieve better backup with Symantec
 
Introducing Colama: virtual lab infrastructure for Enterprise
Introducing Colama: virtual lab infrastructure for EnterpriseIntroducing Colama: virtual lab infrastructure for Enterprise
Introducing Colama: virtual lab infrastructure for Enterprise
 
Novinky v NetBackup 7.7
Novinky v NetBackup 7.7Novinky v NetBackup 7.7
Novinky v NetBackup 7.7
 
IBM Software, Tivoli Storage Manager
IBM Software, Tivoli Storage ManagerIBM Software, Tivoli Storage Manager
IBM Software, Tivoli Storage Manager
 
Presentation v center site recovery manager
Presentation   v center site recovery managerPresentation   v center site recovery manager
Presentation v center site recovery manager
 
EV9 & NBU5000
EV9 & NBU5000EV9 & NBU5000
EV9 & NBU5000
 
VMworld Europe 2014: Take Virtualization to the Next Level - vSphere with Ope...
VMworld Europe 2014: Take Virtualization to the Next Level - vSphere with Ope...VMworld Europe 2014: Take Virtualization to the Next Level - vSphere with Ope...
VMworld Europe 2014: Take Virtualization to the Next Level - vSphere with Ope...
 
VMworld Europe 2014: Top 10 Do’s / Don’ts of Data Protection For VMware vSphere
VMworld Europe 2014: Top 10 Do’s / Don’ts of Data Protection For VMware vSphereVMworld Europe 2014: Top 10 Do’s / Don’ts of Data Protection For VMware vSphere
VMworld Europe 2014: Top 10 Do’s / Don’ts of Data Protection For VMware vSphere
 
VMworld 2013: Part 2: How to Build a Self-Healing Data Center with vCenter Or...
VMworld 2013: Part 2: How to Build a Self-Healing Data Center with vCenter Or...VMworld 2013: Part 2: How to Build a Self-Healing Data Center with vCenter Or...
VMworld 2013: Part 2: How to Build a Self-Healing Data Center with vCenter Or...
 
5 Simple Steps to Migrate to AWS – Zerto
  5 Simple Steps to Migrate to AWS – Zerto  5 Simple Steps to Migrate to AWS – Zerto
5 Simple Steps to Migrate to AWS – Zerto
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization
 

Similar to EVault Endpoint Protection

Endpoint Data Protection and Data Loss Prevention by EVault - Introduction fo...
Endpoint Data Protection and Data Loss Prevention by EVault - Introduction fo...Endpoint Data Protection and Data Loss Prevention by EVault - Introduction fo...
Endpoint Data Protection and Data Loss Prevention by EVault - Introduction fo...
EVault
 
Cloud-based ERP System for SME to Grow Business Faster
Cloud-based ERP System for SME to Grow Business FasterCloud-based ERP System for SME to Grow Business Faster
Cloud-based ERP System for SME to Grow Business Faster
BatchMaster Software Pvt. Ltd.
 
jindal-saw-partner-mini-case-study.pptx
jindal-saw-partner-mini-case-study.pptxjindal-saw-partner-mini-case-study.pptx
jindal-saw-partner-mini-case-study.pptx
shubham332764
 
Webinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A RealityWebinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A Reality
Storage Switzerland
 
Your path to the cloud local event presentation
Your path to the cloud   local event presentationYour path to the cloud   local event presentation
Your path to the cloud local event presentation
awrightKMBS
 
Financial and Operational Results by moving to the Cloud!
Financial and Operational Results by moving to the Cloud! Financial and Operational Results by moving to the Cloud!
Financial and Operational Results by moving to the Cloud!
awrightKMBS
 
Confisio Datacenter
Confisio DatacenterConfisio Datacenter
Confisio Datacenter
Confisio Group
 
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
Proact Netherlands B.V.
 
Next Generation Data Centre - IDC Infravision
Next Generation Data Centre - IDC InfravisionNext Generation Data Centre - IDC Infravision
Next Generation Data Centre - IDC Infravision
Damian Hamilton
 
Leveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your BusinessLeveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your Business
Joel Katz
 
DataFort_Opt_V7
DataFort_Opt_V7DataFort_Opt_V7
DataFort_Opt_V7
Suhail Suleman
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
Erik Von Schlehenried
 
Presentation riverbed steelhead appliance main 2010
Presentation   riverbed steelhead appliance main 2010Presentation   riverbed steelhead appliance main 2010
Presentation riverbed steelhead appliance main 2010
chanwitcs
 
Are your systems and Asset or a Liability
Are your systems and Asset or a LiabilityAre your systems and Asset or a Liability
Are your systems and Asset or a Liability
Stat Health
 
IT Resilience Use Case
IT Resilience Use CaseIT Resilience Use Case
IT Resilience Use Case
PT Datacomm Diangraha
 
Modernizing Edge IT with Riverbed SteelFusion
Modernizing Edge IT with Riverbed SteelFusionModernizing Edge IT with Riverbed SteelFusion
Modernizing Edge IT with Riverbed SteelFusion
Riverbed Technology
 
CT Business Solutions Catalogue
CT Business Solutions CatalogueCT Business Solutions Catalogue
CT Business Solutions Catalogue
Enda Folan
 
Cloud Business Overview : Seminar Protecting Mission-Critical Application Aga...
Cloud Business Overview : Seminar Protecting Mission-Critical Application Aga...Cloud Business Overview : Seminar Protecting Mission-Critical Application Aga...
Cloud Business Overview : Seminar Protecting Mission-Critical Application Aga...
PT Datacomm Diangraha
 
Earth linkit servicesoverview
Earth linkit servicesoverviewEarth linkit servicesoverview
Earth linkit servicesoverview
scomoore
 
EarthLink IT Services Overview
EarthLink IT Services OverviewEarthLink IT Services Overview
EarthLink IT Services Overview
scomoore
 

Similar to EVault Endpoint Protection (20)

Endpoint Data Protection and Data Loss Prevention by EVault - Introduction fo...
Endpoint Data Protection and Data Loss Prevention by EVault - Introduction fo...Endpoint Data Protection and Data Loss Prevention by EVault - Introduction fo...
Endpoint Data Protection and Data Loss Prevention by EVault - Introduction fo...
 
Cloud-based ERP System for SME to Grow Business Faster
Cloud-based ERP System for SME to Grow Business FasterCloud-based ERP System for SME to Grow Business Faster
Cloud-based ERP System for SME to Grow Business Faster
 
jindal-saw-partner-mini-case-study.pptx
jindal-saw-partner-mini-case-study.pptxjindal-saw-partner-mini-case-study.pptx
jindal-saw-partner-mini-case-study.pptx
 
Webinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A RealityWebinar: Making The Always-On Data Center A Reality
Webinar: Making The Always-On Data Center A Reality
 
Your path to the cloud local event presentation
Your path to the cloud   local event presentationYour path to the cloud   local event presentation
Your path to the cloud local event presentation
 
Financial and Operational Results by moving to the Cloud!
Financial and Operational Results by moving to the Cloud! Financial and Operational Results by moving to the Cloud!
Financial and Operational Results by moving to the Cloud!
 
Confisio Datacenter
Confisio DatacenterConfisio Datacenter
Confisio Datacenter
 
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
 
Next Generation Data Centre - IDC Infravision
Next Generation Data Centre - IDC InfravisionNext Generation Data Centre - IDC Infravision
Next Generation Data Centre - IDC Infravision
 
Leveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your BusinessLeveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your Business
 
DataFort_Opt_V7
DataFort_Opt_V7DataFort_Opt_V7
DataFort_Opt_V7
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
Presentation riverbed steelhead appliance main 2010
Presentation   riverbed steelhead appliance main 2010Presentation   riverbed steelhead appliance main 2010
Presentation riverbed steelhead appliance main 2010
 
Are your systems and Asset or a Liability
Are your systems and Asset or a LiabilityAre your systems and Asset or a Liability
Are your systems and Asset or a Liability
 
IT Resilience Use Case
IT Resilience Use CaseIT Resilience Use Case
IT Resilience Use Case
 
Modernizing Edge IT with Riverbed SteelFusion
Modernizing Edge IT with Riverbed SteelFusionModernizing Edge IT with Riverbed SteelFusion
Modernizing Edge IT with Riverbed SteelFusion
 
CT Business Solutions Catalogue
CT Business Solutions CatalogueCT Business Solutions Catalogue
CT Business Solutions Catalogue
 
Cloud Business Overview : Seminar Protecting Mission-Critical Application Aga...
Cloud Business Overview : Seminar Protecting Mission-Critical Application Aga...Cloud Business Overview : Seminar Protecting Mission-Critical Application Aga...
Cloud Business Overview : Seminar Protecting Mission-Critical Application Aga...
 
Earth linkit servicesoverview
Earth linkit servicesoverviewEarth linkit servicesoverview
Earth linkit servicesoverview
 
EarthLink IT Services Overview
EarthLink IT Services OverviewEarthLink IT Services Overview
EarthLink IT Services Overview
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 

EVault Endpoint Protection

  • 1. Protecting Data on Endpoints EVault Endpoint Protection Turnkey backup and recovery for enterprises concerned about data availability and data loss on laptops www.evault.com
  • 2. Protecting Data on Endpoints • Understand the unique requirements • How it fits with key corporate initiatives today • Increase your strategic value to your customers www.evault.com
  • 3. EVault, A Seagate Company Seagate Subsidiary Global Presence to partner/demo/solve customer needs: HQ in California EMEA HQ in the Netherlands APAC HQ in Singapore LATAM HQ in Ft. Lauderdale  EVault offers 24/7/365 support.  Support staff is located in the US >43,000 customers worldwide >15,000 data recoveries a month >98% customer satisfaction www.evault.com 2
  • 4. Trends Driving Endpoint Opportunities • Changing work policies and work environments • Increased data on laptops: IP, content, 24/7 information • Productivity is competitive advantage • Remote offices • Endpoint vulnerability www.evault.com
  • 5. Protecting Data on Endpoints EVault’s turnkey backup and recovery solution for enterprises concerned about data availability and data loss on laptops www.evault.com
  • 6. EVault Solves Every Day Use Cases d Data s Keeping IT and On-the-Go Employees Productive - d No employee or device impact Self-service; reduces help desk calls 24/7 • no connectivity required Network aware backup Automated, synchronized red dwidth d policies Average value of a lost laptop is $49,246 ions ork Source: Ponemon cache Institute Mitigating Risks of Data Loss - 2012 employee turnover rate 37.1% Source: BLS.gov www.evault.com Laptop loss, breakage Identify data at risk Wipe data, track device No connectivity required Timely Data Availability in Case of Employee Turnover - No wait time Device suspension Remote wipe
  • 7. Designed for Cloud Deployment Overcoming Limited Bandwidth: Network Caching, Deduplication Agent: >90% bandwidth savings; global dedup at source; shortened backup Secure Key Management Complete Data Separation Per Device Keys • • Keeps data separated Does not risk global access No Decryption During De-duplication Optional Onsite Network Cache - LAN speed performance Key Escrow - Scheduled and controlled uploads - www.evault.com Optional Onsite Key Server Minimized network impact and costs • Stores keys inside network 6
  • 8. Market Positioning Traditional Server Based Backup Positioning Strength = excellent = poor Designed for end user productivity Dedup at source, self-recovery Silent, flexible backup, no connectivity requirements Cloud-connected efficiency Increased reliability, upload control Secure, global dedup Complete visibility and control Timely recovery, data wipe, device tracing, key management www.evault.com Designed for Endpoint Backup
  • 9. Who Benefits? How to Qualify? • Desktop Administrator Lead • Security Officers • Small to midsize enterprises, enterprises • Budget/Influence: Organizations with remote offices • Organization looking for cloud migration • Highly mobile workforces • Compliance, IP driven organizations Questions to ask: How do you handle employee turnovers? Do you have any problems getting the equipment back and making data available in a timely manner? Have employees lost laptops in the past? How did you determine what data was at risk? How did you minimize the risk? What compliance actions did you have to take? How did you restore the laptop’s data? How do you enable end users recover lost or overwritten files? It is a burden to IT? Have you found that employees are starting to implement ad-hoc solutions to backup their laptops and desktops? Are you in control of where your data resides with these ad-hoc solution? www.evault.com
  • 11. Available to all customers Ideal for customers with < 1000 devices  MRR and referral fees   Simplest to deploy and manage No deployment costs No Vault infrastructure costs or maintenance requirements EVault manages Vault uptime      www.evault.com    CC-Reseller CC-SP Special Offers available in FY14 250 devices min order + deployment fees Ideal for enterprises w/ > 1000 devices Increases consumption Azure through MS Software revenue EVault Service installations Azure committed dollars Greater data separation and customization EVault manages Vault uptime CC-Reseller CC-SP On Premise EVault Cloud CC-Resellers Partner/Customer Azure Cloud Deployment Options 250 devices min order + deployment fees Ideal for partners w/ > 1000 devices  Installations, software  Deploy on customer/partner’s hardware Data stored in customer/partner’s datacenter Customer/partner manages Vault uptime   11/19/2013 | © 2013 EVault, Inc. All Rights Reserved | 10
  • 12. 24x7x365 Global Support North America Region Europe Region Canada - Mississauga - Toronto N and Central - Europe - Netherlands - UK - Germany East - New York West - San Francisco Mountain - Salt Lake N. Central - Chicago Asia Pacific Region W. Europe - France Asia - Singapore - Hong Kong - India S. East - Ft. Lauderdale LATAM - Mexico - Chile - Colombia - Argentina EVault Office Australia Sales Leadership www.evault.com 11
  • 13. Global Language Support Based on the local OS:  English  Spanish  French  Portuguese  German  Polish  Japanese  Simplified Chinese  Korean Endpoint user interface now available in 9 languages www.evault.com 12
  • 14. Guidance to Sell 1 3 Get the Skills Sales & Technical Training Video, Whitepapers Datasheets Use Cases Engage Field Marketing Utilize Campaign Tools & Collateral Joint Presos NFR licenses 2 4 Start Account Planning with your Partner Manager Close & Deploy Demo Proposal PoC Close Deploy Get started, improve your www.evault.com Skills today
  • 15. We got you covered! Cloud Connected™ Data Protection Over 17,000 recoveries monthly www.evault.com Over 43,000 customers world wide 11/19/2013 Cloud Connected Backup & Recovery since 1997 | © 2013 EVault, Inc. All Rights Reserved | 14

Editor's Notes

  1. global presence we’ve been doing this for awhile now. one of the earliest in this field and coined the term “cloud-connected” which refers to cloud backup that has an onsite component to it. cloud-connected technology is designed to leverage Azure in a world of limited bandwidth and increasing data privacy concerns.DPE: Developer and Platform Evangelism Division
  2. Bill Munck, an executive at MarriottInternational, suggests that “…relatively small changesin productivity can have a major impact on shareholderreturns.” Harvard Business Review 2Flexible work policies and travel requirements result in employees being out of the office more than everKnowledge workers creating more IP on their laptopsEmployee productivity is a competitive advantageData breaches are expensive and damage reputationsBenefits of a Comprehensive Data Protection Strategy Research from IDC indicates that while most SMBs have some form of backup in place, the majority of them do not have a comprehensive data protection strategy. SMBs without a comprehensive data protection strategy in place do not have an adequate overall protection plan to resume operations in the case of an operational failure or a catastrophic event. In almost every situation, IDC has found that SMBs use a multitude of storage software and hardware solutions with no forethought to managing data growth, shrinking backup windows, and enabling rapid recovery. Specifically, IDC sees the advantages of small organizations having a comprehensive set of data protection solutions to address the following needs: n Manage data growth cost-effectively n Ensure rapid recovery n Mitigate risks of data loss n Reduce time or know-how needed to manage recovery n Control costs of managing information Data protection at the edge. We expect that firms will continue to make investments to utilize standardized processes for remote and branch office data protection. This will take form as part of broader IT consolidation and centralization efforts. Installations in standalone backup and recovery are increasingly being replaced with WAN-based data protection, replication, and deduplication for remote and branch office data. n Control of the endpoint. Increasingly, laptop/desktop protection and recovery are starting to come under centralized IT control. Historically, the burden of backing up and safeguarding data was the responsibility of users. Now firms are investing in technology to centrally manage laptop and desktop backup. In the past, users had to copy local files to a network share to back up their data. This shift in protection priorities is a result of the value of user data as well as the value of IT staff time and expense needed to recover data. In addition, theft and associated risk of data loss………………………………………………….Vertical opportunities:Pharma – patient trial data, outsourcing, consulting, vast data volumes (image or data), Finance - Internal and external data has to meet public and corporate Governance, Risk Management &amp; Compliance (GRC)Data Privacy: information and credit card payment information Federal law Gramm Leach Bliley Act for financial communities requires to protect clients’ nonpublic personal information in the “safeguard” roleData Privacy: SB1386, CA AB 1950 requiring notification of customers in case of data breach Safe Harbor Act: US &amp; EU Regulatory Compliance SOX, PCI, NISTRequires data privacy schemes, secure key management, retention holds, attestations and certifications Safe Harbor Act streamlined process for US companies to comply with the EUDirective 95/46/EC on the protection of personal dataIntended for organizations within the EU or US that store customer data, the Safe Harbor Principles are designed to prevent accidental information disclosure or loss. US companies can opt into the program as long as they adhere to the 7 principles outlined in the Directive.that allows govern between US &amp; EU requires minimum protection and privacy safeguards Manage Internal Governance &amp; Compliance Conforming to INFOSEC Policy Ensuring that employees do not utilize unsecured wireless connectionsProviding employees with safe solution so that consumer solutions are not used(75% of workforce mobile according to IDC Worldwide Worker 65% of respondents circumventing security features on system) Consumer applications Regional Compliance: Ability to comply with regional laws in Europe that do not want to US to have access to data. Monetary penalties for violating PCI-DSS can be as high as $500,000 per incident, as well as loss of interchange discounts. Gramm-Leach-Bliley Act noncompliance can lead to severe civil and criminal penalties, including fines of up to $100,000 per violation and even imprisonment
  3. IT Challenges:Resource heavy solutions impact performance causing high internal non-complianceEmployees use consumer solutions; loss of data controlWith EEP:Employees are not impacted, no installations, no device performance impact - lightweightTypical: 20K Memory, 1% CPURobust - Device with largest protected data set:5.6TB of data, 3.7M filesSolution adjusts to device state and network connectionBackups are incremental, controlled by IT with multiple user group policy controlsBackup and Restore even when disconnectedAdjusts to user activity and network connection54% of IT is looking for solutions that include automated provisioning, hybrid management. IDC Employee Challenges:File deletion, overwriteDevice failure, lossAccess to files without laptopWith EEP:Recover files, turn back clockBackup/restore without relying on connectivityFiles accessible from mobile devicesMitigating risk from lost devices Problems:Laptop is lost or stolenOrganization face finesReputation damageIT is unable to determine what data was lostWith EEP Admins Can:Perform remote wipeIdentify data at riskTrack devicesEmployee turnover rates run 37% for average organization in 2012Equipment is not accessibleData is needed to move business alongEquipment is damaged / does not have dataNot timelyEmployee takes dataWith EEP Admins Can:Recover data immediatelySuspend access to backed up dataPerform remote wipe, so data cannot be removed when employees are terminated or equipment is reassignedEncrypts data before sending to Vault using encryption key unique to deviceDe-duplicates data at source, reducing &gt;90% of bandwidth requirements and shortens backup cycle
  4. Gartner&apos;s Top 10 Tech Trends Through 2015…Big Data — Big ProblemsOrganizations have struggled dealing with Big Data on both fronts: I.T. needs to manage it effectively and the business side needs to know how to use it. This tends to leave Big Data static.However, Big Data is a problem that only gets worse the longer you ignore it. Gartner asserts that companies should virtualize storage and de-duplication, evaluate all data inputs to get rid of what isn&apos;t necessary, and then segment and prioritize what&apos;s left.54% of IT is looking for solutions that include automated provisioning, hybrid management. IDC Thecombination of the network cache and lightweight agent ensures we have a high performance solution that does not impact end user productivity and enables efficient data recovery without impacting bandwidth.Problems:Backing up a device over WAN can takes days or weeksConcurrent backups causes network congestionMaintenance windows result in unprotected devicesAgent: Compression and global de-duplication at source, saves &gt;90% bandwidth, shortens backupCache enables protection even when disconnectedOptional Onsite Network CacheEnables LAN speed performanceUploads can be scheduled and controlled to minimize network impact and costsEnable remote location / global data availability in the enterprise An encryption key - unique to that device – is used to encrypt the backup data. We are the only vendor that uses per device encryption key, yet is able to run global de-duplication without ever decrypting the data. Keys are escrowed and encrypted a second time with users’ password. Keys can also be kept on-site.Other solutions were not designed with such robust security in mind.
  5. Endpoint Protection is positioned to address and win against traditional server backup and other endpoint backup solutions. Designed for end user productivity positions the solution to win against traditional server solutions by providing the performance and unique requirements of a an endpoint backup solution.Traditional backup solutions are resource intensive, with static backup windows and without the necessary controls to address connectivity issues that are common for endpoints. Cloud Connected efficiency - hybrid deployment differentiates EP from all other competitors. EP offers a way to increase deployment speed and reliability as well as overall backup and recovery speed. Additionally it minimized WAN impact. Visibility and Control. EP allows administrators and CISO’s to have complete visibility over the data in case of data loss, determine data at risk, then determine the best course of action, including the ability to wipe data.Defeat server based solutions on the basis of end user productivityDefeat endpoint designed solutions on the basis of cloud-connectedComplete visibility and control wins vs. traditional solution, but is a core requirement for business solution
  6. 80% of IT business decisions will involve the LOB (line of business) owner by 2016 . IDC Successful Cloud Partners.Legacy/Productivity We know that employees are increasingly on the go. They are using laptops, moving from meetings to meetings. They are travelling on flights. They are tethering to their mobile phones in order to connect. When the laptop is on – employees are using it – there is no maintenance window.We design EEP to be invisible. There is no noticeable impact even as information is protected. EEP knows when a file exist anywhere else in the customer’s environment and will not even send the file from the end user’s device. EEP knows if you are tethering to your mobile device and as a result, have limited and costly bandwidth – it will then avoid using this precious bandwidth. And even when there is no connectivity at all, we know that end users still need access to their files and still need to be protected.These capabilities eliminate traditional vendors like Symantec, CommVault, or Iron Mountain because they have taken server based backup solutions that are designed with backup windows in mind and expect full connectivity. It’s relevant to ask customers whether they find their current solution to be so burdensome that employees are disabling them. So when it comes time to recover the data, it is not available.These capabilities also eliminate the cloud only vendors as they require connectivity in order to backup or restore data. We often ask:Can employees recover files when they are not connected to the Internet? What happens when user are traveling and using a mobile Internet connection?Cloud ConnectedNow imagine during a deployment and devices are backing up all of the data for the very first time. That’s a lot of data. Same goes for equipment replacement. How many of you have 3 year warranties on your laptops? What that means is that endpoint admins are extremely busy upgrading 33% of your equipment every year. Cloud only solutions do not cut it because the limited internet bandwidth means backups and restorations take days or weeks. We’ve won multiple deals where we’ve simply asked, have you tried doing a full back and restoration?As the cloud-connected vendor, we enable customers to the cloud more effectively by providing caches that sit on the device and network. This enables backups to occur at LAN speed. These caches can schedule when uploads to Azure occur, minimizing impact to the network during the day and reducing bandwidth costs.Detailed Examples:Key Points:Data is available immediately.Files and data are retained based on policy.Data can be wiped to alleviate concerns about data compromise and unauthorized sharing.Secure deduplication and unique Encryption Key Management keeps data safe during transmission.Accessibility of backed up data creates visibility for the organization.Data loss prevention such as data wipe capabilities mitigate risk in case of lost, broken, terminated or stolen devices Use Case: Employee TerminationEmployee termination can be painful when it comes to data recovery. If a disgruntled employee is terminated, it can take weeks to get the equipment back. Data on the equipment is then unavailable to managers until the admin receives the equipment back. When equipment is received, the Admin typically has to archive the data, often including the OS. Time and resource heavy, this process is not efficient. Combined with the possibility that it is out of the organizations’ control if the employee first downloads the data, or he/she may wipe the data to ensure that personal files are not returned and files can not be recovered. With Evault, if an employee is terminated, the IT Admin is notified and suspends the device. The administrator can immediately recover the data, files, emails without heavy lifting. He/she can also select to wipe data on the laptop if necessary to address concerns about data falling into the wrong hands and compromising IP, customer data, etc. Data can be recovered to any other machine before the physical laptop even arrives back in the office. Since only files, emails and directory structure is recovered, footprints are small and recovery time is fast. Data can then be selected and send to the manager immediately. Productivity is never impaired and data is not compromised. Use Case: Lost LaptopAn executive at an overseas financial services firm attends a conference, discovers that her laptop has been stolen when she turned away to take a cell phone call.  She immediately notifies IT at her firm that the laptop may have fallen into hostile hands because there is highly sensitive information about the company’s performance on it.Normally the company has to announce the breach. And unknowing how much data is actually on the device, has to make a broad announcement of the breach to possibly all customers. The high cost of managing this breach is often significant to the organization – it includes PR, credit monitoring for customers, loss in customer acquisition and brand reputation. With EVault, IT suspends the device and using the EP Security Suite, IT is able to remotely delete all protected data on the executive&apos;s stolen laptop by an administrative command that deletes data on the laptop once it connects to the internet or via a poison pill which can be scheduled via a policy. At-rest encryption and secure deduplication and transmission provide added protection: data wipe includes the deleting the encryption keys of protected files in case a hacker tries to access the data by trying to crack the administrative passcode. Because files are never decrypted during deduplication, files are also protected while the user is on an unprotected Wi-Fi networks. Anyone trying to access the laptop will not be able to open protected files.Early-stage companies (less than five years in business) are the most eager buyers of cloud, concerned with start-up capital costs and less likely to build and staff a conventional datacenter, and plan to increase their spend on public cloud by 24% over the next few years.
  7. Scale : our vault / 20k users Largest deployment 6000
  8. EVault Endpoint Protection can be deployed as SaaS or Software. In our cloud, your cloud or on premise. Our SaaS solution is simple to deploy and manage, available for customers of all sizes. Contract period is one year. Customers can also deploy on their own instance of Azure - EP is available for customers with 1000 + devices. The on-premise solution is primarily for partners - available as multi-tenant solution. For enterprise customers with more than 1000 devices or for multi-tenant partners, software deployment in-house may be the right way to go. On site installation requires substantial Professional Services Fees for deployment.
  9. EVault&apos;s 24x7x365 support is included with the EVault offer. Support staff is located in the U.S. EVault also has offices across the globe in the U.S., Canada, Latin America, Europe, and Asia. EVault is backed by Seagate, their parent company, so customers can be confident their data is handled safely and that EVault will be around when needed.
  10. Endpoint Protection is available based on the local OS in nine languages:English, Spanish, French, Portuguese, German, Polish, Japanese, Chinese, Korean