Protecting Data on Endpoints

EVault Endpoint Protection
Turnkey backup and recovery for enterprises concerned about
data availability and data loss on laptops

www.evault.com
Protecting Data on Endpoints

• Understand the unique requirements
• How it fits with key corporate initiatives today
• Increase your strategic value to your customers

www.evault.com
EVault, A Seagate Company
Seagate Subsidiary
Global Presence to partner/demo/solve customer needs:
HQ in California
EMEA HQ in the Netherlands
APAC HQ in Singapore
LATAM HQ in Ft. Lauderdale

 EVault offers 24/7/365 support.
 Support staff is located in the US

>43,000 customers worldwide
>15,000 data recoveries a month
>98% customer satisfaction
www.evault.com

2
Trends Driving Endpoint Opportunities

• Changing work policies
and work environments
• Increased data on
laptops: IP, content, 24/7
information
• Productivity is
competitive advantage
• Remote offices
• Endpoint vulnerability

www.evault.com
Protecting Data on Endpoints

EVault’s turnkey backup

and

recovery solution
for enterprises
concerned about data availability and

data loss on laptops

www.evault.com
EVault Solves Every Day Use Cases

d Data
s
Keeping IT and On-the-Go Employees Productive
-

d

No employee or device impact
Self-service; reduces help desk calls
24/7 • no connectivity required
Network aware backup
Automated, synchronized

red
dwidth
d policies

Average
value of a
lost laptop
is
$49,246

ions

ork

Source:
Ponemon
cache
Institute

Mitigating Risks of Data Loss
-

2012
employee
turnover rate
37.1%
Source: BLS.gov

www.evault.com

Laptop loss, breakage
Identify data at risk
Wipe data, track device
No connectivity required

Timely Data Availability
in Case of Employee Turnover
-

No wait time
Device suspension
Remote wipe
Designed for Cloud Deployment
Overcoming Limited Bandwidth:
Network Caching, Deduplication
Agent:
>90% bandwidth
savings; global
dedup at source;
shortened backup

Secure Key Management
Complete Data Separation

Per Device Keys

•
•

Keeps data separated
Does not risk global access

No Decryption During De-duplication

Optional Onsite
Network Cache
-

LAN speed
performance

Key Escrow

-

Scheduled and
controlled uploads

-

www.evault.com

Optional Onsite Key Server

Minimized network
impact and costs

•

Stores keys inside network

6
Market Positioning
Traditional Server
Based Backup

Positioning Strength
= excellent

= poor

Designed for end user productivity
Dedup at source, self-recovery
Silent, flexible backup, no connectivity
requirements

Cloud-connected efficiency
Increased reliability, upload control
Secure, global dedup

Complete visibility and control
Timely recovery, data wipe, device tracing,
key management

www.evault.com

Designed for
Endpoint Backup
Who Benefits? How to Qualify?

•

Desktop Administrator Lead

•

Security Officers

•

Small to midsize enterprises, enterprises

•

Budget/Influence:

Organizations with remote offices

•

Organization looking for cloud migration

•

Highly mobile workforces

•

Compliance, IP driven organizations

Questions to ask:
How do you handle employee turnovers?
Do you have any problems getting the equipment back and making data available in a timely
manner?
Have employees lost laptops in the past?
How did you determine what data was at risk?
How did you minimize the risk? What compliance actions did you have to take?
How did you restore the laptop’s data?
How do you enable end users recover lost or overwritten files?
It is a burden to IT?
Have you found that employees are starting to implement ad-hoc solutions to backup their laptops
and desktops?
Are you in control of where your data resides with these ad-hoc solution?
www.evault.com
Enterprise Grade Deployments

www.evault.com
Available to all
customers
Ideal for customers with
< 1000 devices



MRR and referral fees





Simplest to deploy and
manage
No deployment costs
No Vault infrastructure costs or
maintenance requirements
EVault manages Vault uptime








www.evault.com





CC-Reseller
CC-SP
Special Offers
available in FY14

250 devices min order
+ deployment fees
Ideal for enterprises w/
> 1000 devices
Increases consumption Azure
through MS
Software revenue EVault
Service installations
Azure committed dollars
Greater data separation and
customization
EVault manages Vault uptime

CC-Reseller
CC-SP
On Premise

EVault Cloud

CC-Resellers

Partner/Customer
Azure Cloud

Deployment Options

250 devices min order
+ deployment fees
Ideal for partners w/
> 1000 devices



Installations, software



Deploy on customer/partner’s
hardware
Data stored in
customer/partner’s datacenter
Customer/partner manages
Vault uptime




11/19/2013 | © 2013 EVault, Inc. All Rights Reserved |

10
24x7x365 Global Support
North America Region

Europe Region

Canada
- Mississauga
- Toronto

N and Central
- Europe
- Netherlands
- UK
- Germany

East
- New York

West
- San
Francisco
Mountain
- Salt Lake

N. Central
- Chicago

Asia Pacific Region

W. Europe
- France

Asia
- Singapore
- Hong Kong
- India

S. East
- Ft.
Lauderdale

LATAM
- Mexico
- Chile
- Colombia
- Argentina

EVault Office

Australia

Sales
Leadership
www.evault.com

11
Global Language Support
Based on the local
OS:
 English
 Spanish
 French
 Portuguese
 German
 Polish
 Japanese
 Simplified
Chinese
 Korean

Endpoint user interface now available in 9 languages
www.evault.com

12
Guidance to Sell

1
3

Get the Skills
Sales & Technical
Training
Video, Whitepapers
Datasheets
Use Cases

Engage
Field Marketing
Utilize Campaign Tools
& Collateral
Joint Presos
NFR licenses

2
4

Start
Account Planning
with your
Partner Manager

Close & Deploy
Demo
Proposal
PoC
Close
Deploy

Get started, improve your
www.evault.com

Skills today
We got you covered!

Cloud Connected™
Data Protection

Over 17,000 recoveries monthly

www.evault.com

Over 43,000 customers world wide

11/19/2013

Cloud Connected Backup & Recovery
since 1997

| © 2013 EVault, Inc. All Rights Reserved |

14

EVault Endpoint Protection

  • 1.
    Protecting Data onEndpoints EVault Endpoint Protection Turnkey backup and recovery for enterprises concerned about data availability and data loss on laptops www.evault.com
  • 2.
    Protecting Data onEndpoints • Understand the unique requirements • How it fits with key corporate initiatives today • Increase your strategic value to your customers www.evault.com
  • 3.
    EVault, A SeagateCompany Seagate Subsidiary Global Presence to partner/demo/solve customer needs: HQ in California EMEA HQ in the Netherlands APAC HQ in Singapore LATAM HQ in Ft. Lauderdale  EVault offers 24/7/365 support.  Support staff is located in the US >43,000 customers worldwide >15,000 data recoveries a month >98% customer satisfaction www.evault.com 2
  • 4.
    Trends Driving EndpointOpportunities • Changing work policies and work environments • Increased data on laptops: IP, content, 24/7 information • Productivity is competitive advantage • Remote offices • Endpoint vulnerability www.evault.com
  • 5.
    Protecting Data onEndpoints EVault’s turnkey backup and recovery solution for enterprises concerned about data availability and data loss on laptops www.evault.com
  • 6.
    EVault Solves EveryDay Use Cases d Data s Keeping IT and On-the-Go Employees Productive - d No employee or device impact Self-service; reduces help desk calls 24/7 • no connectivity required Network aware backup Automated, synchronized red dwidth d policies Average value of a lost laptop is $49,246 ions ork Source: Ponemon cache Institute Mitigating Risks of Data Loss - 2012 employee turnover rate 37.1% Source: BLS.gov www.evault.com Laptop loss, breakage Identify data at risk Wipe data, track device No connectivity required Timely Data Availability in Case of Employee Turnover - No wait time Device suspension Remote wipe
  • 7.
    Designed for CloudDeployment Overcoming Limited Bandwidth: Network Caching, Deduplication Agent: >90% bandwidth savings; global dedup at source; shortened backup Secure Key Management Complete Data Separation Per Device Keys • • Keeps data separated Does not risk global access No Decryption During De-duplication Optional Onsite Network Cache - LAN speed performance Key Escrow - Scheduled and controlled uploads - www.evault.com Optional Onsite Key Server Minimized network impact and costs • Stores keys inside network 6
  • 8.
    Market Positioning Traditional Server BasedBackup Positioning Strength = excellent = poor Designed for end user productivity Dedup at source, self-recovery Silent, flexible backup, no connectivity requirements Cloud-connected efficiency Increased reliability, upload control Secure, global dedup Complete visibility and control Timely recovery, data wipe, device tracing, key management www.evault.com Designed for Endpoint Backup
  • 9.
    Who Benefits? Howto Qualify? • Desktop Administrator Lead • Security Officers • Small to midsize enterprises, enterprises • Budget/Influence: Organizations with remote offices • Organization looking for cloud migration • Highly mobile workforces • Compliance, IP driven organizations Questions to ask: How do you handle employee turnovers? Do you have any problems getting the equipment back and making data available in a timely manner? Have employees lost laptops in the past? How did you determine what data was at risk? How did you minimize the risk? What compliance actions did you have to take? How did you restore the laptop’s data? How do you enable end users recover lost or overwritten files? It is a burden to IT? Have you found that employees are starting to implement ad-hoc solutions to backup their laptops and desktops? Are you in control of where your data resides with these ad-hoc solution? www.evault.com
  • 10.
  • 11.
    Available to all customers Idealfor customers with < 1000 devices  MRR and referral fees   Simplest to deploy and manage No deployment costs No Vault infrastructure costs or maintenance requirements EVault manages Vault uptime      www.evault.com    CC-Reseller CC-SP Special Offers available in FY14 250 devices min order + deployment fees Ideal for enterprises w/ > 1000 devices Increases consumption Azure through MS Software revenue EVault Service installations Azure committed dollars Greater data separation and customization EVault manages Vault uptime CC-Reseller CC-SP On Premise EVault Cloud CC-Resellers Partner/Customer Azure Cloud Deployment Options 250 devices min order + deployment fees Ideal for partners w/ > 1000 devices  Installations, software  Deploy on customer/partner’s hardware Data stored in customer/partner’s datacenter Customer/partner manages Vault uptime   11/19/2013 | © 2013 EVault, Inc. All Rights Reserved | 10
  • 12.
    24x7x365 Global Support NorthAmerica Region Europe Region Canada - Mississauga - Toronto N and Central - Europe - Netherlands - UK - Germany East - New York West - San Francisco Mountain - Salt Lake N. Central - Chicago Asia Pacific Region W. Europe - France Asia - Singapore - Hong Kong - India S. East - Ft. Lauderdale LATAM - Mexico - Chile - Colombia - Argentina EVault Office Australia Sales Leadership www.evault.com 11
  • 13.
    Global Language Support Basedon the local OS:  English  Spanish  French  Portuguese  German  Polish  Japanese  Simplified Chinese  Korean Endpoint user interface now available in 9 languages www.evault.com 12
  • 14.
    Guidance to Sell 1 3 Getthe Skills Sales & Technical Training Video, Whitepapers Datasheets Use Cases Engage Field Marketing Utilize Campaign Tools & Collateral Joint Presos NFR licenses 2 4 Start Account Planning with your Partner Manager Close & Deploy Demo Proposal PoC Close Deploy Get started, improve your www.evault.com Skills today
  • 15.
    We got youcovered! Cloud Connected™ Data Protection Over 17,000 recoveries monthly www.evault.com Over 43,000 customers world wide 11/19/2013 Cloud Connected Backup & Recovery since 1997 | © 2013 EVault, Inc. All Rights Reserved | 14

Editor's Notes

  • #3 global presence we’ve been doing this for awhile now. one of the earliest in this field and coined the term “cloud-connected” which refers to cloud backup that has an onsite component to it. cloud-connected technology is designed to leverage Azure in a world of limited bandwidth and increasing data privacy concerns.DPE: Developer and Platform Evangelism Division
  • #4 Bill Munck, an executive at MarriottInternational, suggests that “…relatively small changesin productivity can have a major impact on shareholderreturns.” Harvard Business Review 2Flexible work policies and travel requirements result in employees being out of the office more than everKnowledge workers creating more IP on their laptopsEmployee productivity is a competitive advantageData breaches are expensive and damage reputationsBenefits of a Comprehensive Data Protection Strategy Research from IDC indicates that while most SMBs have some form of backup in place, the majority of them do not have a comprehensive data protection strategy. SMBs without a comprehensive data protection strategy in place do not have an adequate overall protection plan to resume operations in the case of an operational failure or a catastrophic event. In almost every situation, IDC has found that SMBs use a multitude of storage software and hardware solutions with no forethought to managing data growth, shrinking backup windows, and enabling rapid recovery. Specifically, IDC sees the advantages of small organizations having a comprehensive set of data protection solutions to address the following needs: n Manage data growth cost-effectively n Ensure rapid recovery n Mitigate risks of data loss n Reduce time or know-how needed to manage recovery n Control costs of managing information Data protection at the edge. We expect that firms will continue to make investments to utilize standardized processes for remote and branch office data protection. This will take form as part of broader IT consolidation and centralization efforts. Installations in standalone backup and recovery are increasingly being replaced with WAN-based data protection, replication, and deduplication for remote and branch office data. n Control of the endpoint. Increasingly, laptop/desktop protection and recovery are starting to come under centralized IT control. Historically, the burden of backing up and safeguarding data was the responsibility of users. Now firms are investing in technology to centrally manage laptop and desktop backup. In the past, users had to copy local files to a network share to back up their data. This shift in protection priorities is a result of the value of user data as well as the value of IT staff time and expense needed to recover data. In addition, theft and associated risk of data loss………………………………………………….Vertical opportunities:Pharma – patient trial data, outsourcing, consulting, vast data volumes (image or data), Finance - Internal and external data has to meet public and corporate Governance, Risk Management &amp; Compliance (GRC)Data Privacy: information and credit card payment information Federal law Gramm Leach Bliley Act for financial communities requires to protect clients’ nonpublic personal information in the “safeguard” roleData Privacy: SB1386, CA AB 1950 requiring notification of customers in case of data breach Safe Harbor Act: US &amp; EU Regulatory Compliance SOX, PCI, NISTRequires data privacy schemes, secure key management, retention holds, attestations and certifications Safe Harbor Act streamlined process for US companies to comply with the EUDirective 95/46/EC on the protection of personal dataIntended for organizations within the EU or US that store customer data, the Safe Harbor Principles are designed to prevent accidental information disclosure or loss. US companies can opt into the program as long as they adhere to the 7 principles outlined in the Directive.that allows govern between US &amp; EU requires minimum protection and privacy safeguards Manage Internal Governance &amp; Compliance Conforming to INFOSEC Policy Ensuring that employees do not utilize unsecured wireless connectionsProviding employees with safe solution so that consumer solutions are not used(75% of workforce mobile according to IDC Worldwide Worker 65% of respondents circumventing security features on system) Consumer applications Regional Compliance: Ability to comply with regional laws in Europe that do not want to US to have access to data. Monetary penalties for violating PCI-DSS can be as high as $500,000 per incident, as well as loss of interchange discounts. Gramm-Leach-Bliley Act noncompliance can lead to severe civil and criminal penalties, including fines of up to $100,000 per violation and even imprisonment
  • #6 IT Challenges:Resource heavy solutions impact performance causing high internal non-complianceEmployees use consumer solutions; loss of data controlWith EEP:Employees are not impacted, no installations, no device performance impact - lightweightTypical: 20K Memory, 1% CPURobust - Device with largest protected data set:5.6TB of data, 3.7M filesSolution adjusts to device state and network connectionBackups are incremental, controlled by IT with multiple user group policy controlsBackup and Restore even when disconnectedAdjusts to user activity and network connection54% of IT is looking for solutions that include automated provisioning, hybrid management. IDC Employee Challenges:File deletion, overwriteDevice failure, lossAccess to files without laptopWith EEP:Recover files, turn back clockBackup/restore without relying on connectivityFiles accessible from mobile devicesMitigating risk from lost devices Problems:Laptop is lost or stolenOrganization face finesReputation damageIT is unable to determine what data was lostWith EEP Admins Can:Perform remote wipeIdentify data at riskTrack devicesEmployee turnover rates run 37% for average organization in 2012Equipment is not accessibleData is needed to move business alongEquipment is damaged / does not have dataNot timelyEmployee takes dataWith EEP Admins Can:Recover data immediatelySuspend access to backed up dataPerform remote wipe, so data cannot be removed when employees are terminated or equipment is reassignedEncrypts data before sending to Vault using encryption key unique to deviceDe-duplicates data at source, reducing &gt;90% of bandwidth requirements and shortens backup cycle
  • #7 Gartner&apos;s Top 10 Tech Trends Through 2015…Big Data — Big ProblemsOrganizations have struggled dealing with Big Data on both fronts: I.T. needs to manage it effectively and the business side needs to know how to use it. This tends to leave Big Data static.However, Big Data is a problem that only gets worse the longer you ignore it. Gartner asserts that companies should virtualize storage and de-duplication, evaluate all data inputs to get rid of what isn&apos;t necessary, and then segment and prioritize what&apos;s left.54% of IT is looking for solutions that include automated provisioning, hybrid management. IDC Thecombination of the network cache and lightweight agent ensures we have a high performance solution that does not impact end user productivity and enables efficient data recovery without impacting bandwidth.Problems:Backing up a device over WAN can takes days or weeksConcurrent backups causes network congestionMaintenance windows result in unprotected devicesAgent: Compression and global de-duplication at source, saves &gt;90% bandwidth, shortens backupCache enables protection even when disconnectedOptional Onsite Network CacheEnables LAN speed performanceUploads can be scheduled and controlled to minimize network impact and costsEnable remote location / global data availability in the enterprise An encryption key - unique to that device – is used to encrypt the backup data. We are the only vendor that uses per device encryption key, yet is able to run global de-duplication without ever decrypting the data. Keys are escrowed and encrypted a second time with users’ password. Keys can also be kept on-site.Other solutions were not designed with such robust security in mind.
  • #8 Endpoint Protection is positioned to address and win against traditional server backup and other endpoint backup solutions. Designed for end user productivity positions the solution to win against traditional server solutions by providing the performance and unique requirements of a an endpoint backup solution.Traditional backup solutions are resource intensive, with static backup windows and without the necessary controls to address connectivity issues that are common for endpoints. Cloud Connected efficiency - hybrid deployment differentiates EP from all other competitors. EP offers a way to increase deployment speed and reliability as well as overall backup and recovery speed. Additionally it minimized WAN impact. Visibility and Control. EP allows administrators and CISO’s to have complete visibility over the data in case of data loss, determine data at risk, then determine the best course of action, including the ability to wipe data.Defeat server based solutions on the basis of end user productivityDefeat endpoint designed solutions on the basis of cloud-connectedComplete visibility and control wins vs. traditional solution, but is a core requirement for business solution
  • #9 80% of IT business decisions will involve the LOB (line of business) owner by 2016 . IDC Successful Cloud Partners.Legacy/Productivity We know that employees are increasingly on the go. They are using laptops, moving from meetings to meetings. They are travelling on flights. They are tethering to their mobile phones in order to connect. When the laptop is on – employees are using it – there is no maintenance window.We design EEP to be invisible. There is no noticeable impact even as information is protected. EEP knows when a file exist anywhere else in the customer’s environment and will not even send the file from the end user’s device. EEP knows if you are tethering to your mobile device and as a result, have limited and costly bandwidth – it will then avoid using this precious bandwidth. And even when there is no connectivity at all, we know that end users still need access to their files and still need to be protected.These capabilities eliminate traditional vendors like Symantec, CommVault, or Iron Mountain because they have taken server based backup solutions that are designed with backup windows in mind and expect full connectivity. It’s relevant to ask customers whether they find their current solution to be so burdensome that employees are disabling them. So when it comes time to recover the data, it is not available.These capabilities also eliminate the cloud only vendors as they require connectivity in order to backup or restore data. We often ask:Can employees recover files when they are not connected to the Internet? What happens when user are traveling and using a mobile Internet connection?Cloud ConnectedNow imagine during a deployment and devices are backing up all of the data for the very first time. That’s a lot of data. Same goes for equipment replacement. How many of you have 3 year warranties on your laptops? What that means is that endpoint admins are extremely busy upgrading 33% of your equipment every year. Cloud only solutions do not cut it because the limited internet bandwidth means backups and restorations take days or weeks. We’ve won multiple deals where we’ve simply asked, have you tried doing a full back and restoration?As the cloud-connected vendor, we enable customers to the cloud more effectively by providing caches that sit on the device and network. This enables backups to occur at LAN speed. These caches can schedule when uploads to Azure occur, minimizing impact to the network during the day and reducing bandwidth costs.Detailed Examples:Key Points:Data is available immediately.Files and data are retained based on policy.Data can be wiped to alleviate concerns about data compromise and unauthorized sharing.Secure deduplication and unique Encryption Key Management keeps data safe during transmission.Accessibility of backed up data creates visibility for the organization.Data loss prevention such as data wipe capabilities mitigate risk in case of lost, broken, terminated or stolen devices Use Case: Employee TerminationEmployee termination can be painful when it comes to data recovery. If a disgruntled employee is terminated, it can take weeks to get the equipment back. Data on the equipment is then unavailable to managers until the admin receives the equipment back. When equipment is received, the Admin typically has to archive the data, often including the OS. Time and resource heavy, this process is not efficient. Combined with the possibility that it is out of the organizations’ control if the employee first downloads the data, or he/she may wipe the data to ensure that personal files are not returned and files can not be recovered. With Evault, if an employee is terminated, the IT Admin is notified and suspends the device. The administrator can immediately recover the data, files, emails without heavy lifting. He/she can also select to wipe data on the laptop if necessary to address concerns about data falling into the wrong hands and compromising IP, customer data, etc. Data can be recovered to any other machine before the physical laptop even arrives back in the office. Since only files, emails and directory structure is recovered, footprints are small and recovery time is fast. Data can then be selected and send to the manager immediately. Productivity is never impaired and data is not compromised. Use Case: Lost LaptopAn executive at an overseas financial services firm attends a conference, discovers that her laptop has been stolen when she turned away to take a cell phone call.  She immediately notifies IT at her firm that the laptop may have fallen into hostile hands because there is highly sensitive information about the company’s performance on it.Normally the company has to announce the breach. And unknowing how much data is actually on the device, has to make a broad announcement of the breach to possibly all customers. The high cost of managing this breach is often significant to the organization – it includes PR, credit monitoring for customers, loss in customer acquisition and brand reputation. With EVault, IT suspends the device and using the EP Security Suite, IT is able to remotely delete all protected data on the executive&apos;s stolen laptop by an administrative command that deletes data on the laptop once it connects to the internet or via a poison pill which can be scheduled via a policy. At-rest encryption and secure deduplication and transmission provide added protection: data wipe includes the deleting the encryption keys of protected files in case a hacker tries to access the data by trying to crack the administrative passcode. Because files are never decrypted during deduplication, files are also protected while the user is on an unprotected Wi-Fi networks. Anyone trying to access the laptop will not be able to open protected files.Early-stage companies (less than five years in business) are the most eager buyers of cloud, concerned with start-up capital costs and less likely to build and staff a conventional datacenter, and plan to increase their spend on public cloud by 24% over the next few years.
  • #10 Scale : our vault / 20k users Largest deployment 6000
  • #11 EVault Endpoint Protection can be deployed as SaaS or Software. In our cloud, your cloud or on premise. Our SaaS solution is simple to deploy and manage, available for customers of all sizes. Contract period is one year. Customers can also deploy on their own instance of Azure - EP is available for customers with 1000 + devices. The on-premise solution is primarily for partners - available as multi-tenant solution. For enterprise customers with more than 1000 devices or for multi-tenant partners, software deployment in-house may be the right way to go. On site installation requires substantial Professional Services Fees for deployment.
  • #12 EVault&apos;s 24x7x365 support is included with the EVault offer. Support staff is located in the U.S. EVault also has offices across the globe in the U.S., Canada, Latin America, Europe, and Asia. EVault is backed by Seagate, their parent company, so customers can be confident their data is handled safely and that EVault will be around when needed.
  • #13 Endpoint Protection is available based on the local OS in nine languages:English, Spanish, French, Portuguese, German, Polish, Japanese, Chinese, Korean