SlideShare a Scribd company logo
1inSync FAQ
What business challenge does Druva inSync solve?
Druva inSync solves business challenges related to endpoint data protection and governance, including
data backup and restore, governance (visibility, control, and eDiscovery enablement), DLP, and file sync
and share.
How does Druva inSync protect corporate data against breach after
device theft or loss?
Druva inSync provides complete data loss prevention including data encryption on endpoint devices, geo
tracking of devices, remote wipe on laptops and mobile devices, and restore of user data, preferences, and
system settings.
How does Druva inSync address eDiscovery?
Druva inSync enables eDiscovery for data stored on endpoint devices. inSync offers a complete governance
solution for endpoint data including a legal hold workflow that provides identification tools with federated
search and audit trails, collection and preserve-in-place capability, and eDiscovery enablement with direct
access to Druva from an eDiscovery platform.
How does Druva inSync address bandwidth costs when an entire
organization backs up data?
Druva inSync is architected for data storage efficiency. inSync’s global, app-aware deduplication delivers
up to 90% in storage and bandwidth savings, which has the added benefit of providing a better end-user
experience with up to 6x faster incremental backups than any competitor. Druva accomplishes this by
deduplicating blocks of data across all users in an enterprise, each subsequent user transfers and stores
less data until maximum efficiency is achieved.
What if our organization needs backup in remote locations where
bandwidth is a challenge?
Druva inSync offers accelerated backups and restores with CloudCache, an on-premise software appliance
that delivers LAN-like speeds to local users, and helps optimize WAN usage by syncing to the inSync Cloud
during off-peak hours. CloudCache provides the same global deduplication benefits as inSync Cloud,
locally, by only storing deduplicated data, while storing meta-data in the Cloud. This also enables users to
seamlessly move from on-premise to the WAN without disrupting backups or restores.
How does inSync manage device refreshes for all users?
Druva inSync provides a complete set of tools to accomplish large-scale device refreshes and OS migrations
across endpoint devices. Features include mass deployment support for SCCM and Casper, data and persona
backup for capturing and restoring of user preferences and system settings, and wizard-based workflows
to enable both user- and IT-initiated device refreshes with minimal overhead and manual involvement.
Frequently Asked Questions
about Druva inSync
2inSync FAQ
What other implementation costs do I need to be aware of?
With inSync’s unique Integrated Mass Deployment (IMD), delegated administration, and deep directory
integration for AD save up to 75% in deployment time.
How can users be ensured of high data privacy, even from
administrators?
Druva inSync offers a complete set of privacy settings required by any global enterprise. inSync enables
IT to set group policies that allow users to prevent administrator access to their data, for example officers
of the company. In the case of litigation, provisions can be made to enable legal department access only.
How can Druva secure against data loss?
Druva inSync Cloud has a guaranteed SLA of 99.999999999% data durability, which includes up to 3-way
data redundancy across data centers. Send your data only once; redundancy is automatic and transparent
at no additional cost.
How secure and private is corporate data in the cloud?
Druva inSync offers a unique and highly secure 2-factor encryption scheme. By utilizing this model, no
one except the customer can access their data, not even Druva. This enables companies to have complete
data security and privacy: data cannot be handed over if subpoenaed or a government request is made
to Druva. In addition, we feature a published vulnerability assessment, pen tests, data scrambling, and
compartmentalization to ensure the greatest levels of data security and privacy for our customers.
What certifications does your cloud service comply with?
The Druva inSync cloud is up to date with the latest in infrastructure and application security and compliance,
currently complying with SOC 1 (SSAE 16, ISAE 3402, formerly SAS 70), SOC 2, SOC 3, ISO 27001, PCI DSS
Level 1, ITAR, HIPAA, FedRAMP, FIPS, FISMA, and others. To learn more, please contact us directly.
What is the published SLA (Service Level Agreement) for uptime?
Druva inSync is built on Amazon Web Services (AWS), which provides an SLA of 99.95% uptime across it’s
10 regions and availability zones.
How about global deployment? What about regulatory implications?
Druva inSync has a global footprint across Americas, APAC, EMEA with 10 regions and 50+ edge locations
across the globe and complies with EU safe harbor regulations. For regional data protection requirements,
Druva inSync enables administrators to map users via profiles to regions, ensuring your data resides in the
location required.
How is inSync innovating with its cloud service?
inSync was built for the cloud and delivers unique innovations with it’s patented global deduplication
engine, 2-factor encryption, and cloud-based storage architecture. We also provide this same approach for
our on-premise customers, including support for object storage to deliver cloud-like elasticity on-premise.
Furthermore in the cloud, AWS provides innovations such as Cloudfront, Glacier, redundant data center
architecture, and S3 object storage, providing customers not only cost efficiencies, but more effective ways
to manage data over time.
3inSync FAQ
Why is global deduplication so important? Storage continues
to get cheaper by the day.
Global deduplication delivers not only substantial storage savings, but also tremendous bandwidth savings:
as high as 90% with significantly faster incremental backups (up to 6x faster). These bandwidth savings,
coupled with resource throttling on the client lowers the impact to network bandwidth and minimizes client
resource consumption, creating a better overall user experience.
How often does Druva inSync backup files?
Druva is fully configurable via administrative profiles that map to groups of users. These profiles provide
advanced settings, such as backup frequency, which can be set to happen as often as every few minutes,
to provide continuous data protection. If authorized by IT, end users can modify their backup schedules as
needed to best fit their requirements.
How safe is my organization’s encryption key?
Utilizing our 2-factor encryption scheme, Druva’s approach to encryption key management ensures data
cannot be lost or corrupted, as only an encrypted token is stored per user. This model prevents others
outside your organization from having access to your data, a known problem when both the key and data
are stored in the cloud. With AWS’s 99.999999999% data durability, the encrypted key data is safely stored,
and as an added precaution, admin/user credentials can also be reset if required. If needed, Druva can
provide an on-premise key server for customers who feel this provides a greater level of safety.
Learn more about Druva’s security.
Will my data remain in its country of origin?
For customers requiring their data to stay in the country of origin, in order to be in compliance with regional
data regulations, Druva provides full customer control over regional data storage assignments per user via
profile settings. Customer data stays where it’s intended and doesn’t move out of that region without the
customer explicitly doing so.
What type of cloud does Druva support: public, private, or hybrid?
Druva offers public, private, and hybrid cloud options.
What type of reporting features does inSync provide?
Druva provides advanced out-of-the box reporting capabilities, including a comprehensive, rich set of in-
system reporting with exporting functionality.
How many concurrent backups does Druva support?
Druva has no limitations on concurrency and provides enterprise-level scale into the 100’s of 1000’s of
users, both on-premise and in the cloud.
Druva, Inc.
Americas: +1 888-248-4976
Europe: +44.(0)20.3150.1722
APJ: +919886120215
sales@druva.com
www.druva.com
About Druva
Druva provides integrated data protection and governance solutions for enterprise laptops, PCs,
smartphones and tablets. Its flagship product, inSync, empowers an enterprise's mobile workforce and
IT teams with backup, IT-managed file sharing, data loss prevention, and rich analytics. Deployed in public
or private cloud scenarios or on-premise, inSync is the only solution built with both IT needs and end-user
experiencesinmind.WithofficesintheU.S.,IndiaandUnitedKingdom,Druvaisprivatelyheldandisbackedby
Nexus Venture Partners, Sequoia Capital andTenaya Capital. For more information, visit www.Druva.com.

More Related Content

What's hot

A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
 
Solution Brief - Cloud Backup Services
Solution Brief - Cloud Backup ServicesSolution Brief - Cloud Backup Services
Solution Brief - Cloud Backup ServicesCaitlin Brittingham
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)ClubHack
 
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud IRJET Journal
 
Making secret sharing based cloud storage usable
Making secret sharing based  cloud storage usableMaking secret sharing based  cloud storage usable
Making secret sharing based cloud storage usableYing wei (Joe) Chou
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
 
Big data security and privacy issues in the
Big data security and privacy issues in theBig data security and privacy issues in the
Big data security and privacy issues in theIJNSA Journal
 
Decision Forward Cloud Backup-guide
Decision Forward Cloud Backup-guideDecision Forward Cloud Backup-guide
Decision Forward Cloud Backup-guideDavid Soden
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsBrooke Bordelon
 
Cloud Storage: Focusing On Back End Storage Architecture
Cloud Storage: Focusing On Back End Storage ArchitectureCloud Storage: Focusing On Back End Storage Architecture
Cloud Storage: Focusing On Back End Storage ArchitectureIOSR Journals
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloudijtsrd
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Bill Annibell
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
Data Integrity proofs in cloud storage
Data Integrity proofs in cloud storageData Integrity proofs in cloud storage
Data Integrity proofs in cloud storageSameer Mohd
 

What's hot (20)

A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
Solution Brief - Cloud Backup Services
Solution Brief - Cloud Backup ServicesSolution Brief - Cloud Backup Services
Solution Brief - Cloud Backup Services
 
Features of cloud
Features of cloudFeatures of cloud
Features of cloud
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 
Making secret sharing based cloud storage usable
Making secret sharing based  cloud storage usableMaking secret sharing based  cloud storage usable
Making secret sharing based cloud storage usable
 
50120130405007
5012013040500750120130405007
50120130405007
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
Big data security and privacy issues in the
Big data security and privacy issues in theBig data security and privacy issues in the
Big data security and privacy issues in the
 
Decision Forward Cloud Backup-guide
Decision Forward Cloud Backup-guideDecision Forward Cloud Backup-guide
Decision Forward Cloud Backup-guide
 
Cloud Computing - Introduction
Cloud Computing - IntroductionCloud Computing - Introduction
Cloud Computing - Introduction
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business Problems
 
G044053337
G044053337G044053337
G044053337
 
Cloud Storage: Focusing On Back End Storage Architecture
Cloud Storage: Focusing On Back End Storage ArchitectureCloud Storage: Focusing On Back End Storage Architecture
Cloud Storage: Focusing On Back End Storage Architecture
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloud
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
Data Integrity proofs in cloud storage
Data Integrity proofs in cloud storageData Integrity proofs in cloud storage
Data Integrity proofs in cloud storage
 

Similar to inSync FAQ

Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Khiro Mishra
 
Infrascale-Overview-Flipbook-Dec-2014
Infrascale-Overview-Flipbook-Dec-2014Infrascale-Overview-Flipbook-Dec-2014
Infrascale-Overview-Flipbook-Dec-2014Angela Vengel
 
A Complete Guide to Cloud Computing, Everything You Need To Know.pdf
A Complete Guide to Cloud Computing, Everything You Need To Know.pdfA Complete Guide to Cloud Computing, Everything You Need To Know.pdf
A Complete Guide to Cloud Computing, Everything You Need To Know.pdfVenpep2
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxssuserea0dfe
 
Tools of noc
Tools of nocTools of noc
Tools of nocmunawarul
 
Cloud Service Brief - dinCloud Hosted Virtual Desktop
Cloud Service Brief - dinCloud Hosted Virtual DesktopCloud Service Brief - dinCloud Hosted Virtual Desktop
Cloud Service Brief - dinCloud Hosted Virtual DesktopdinCloud Inc.
 
dinCloud Hosted Virtual Desktop
dinCloud Hosted Virtual DesktopdinCloud Hosted Virtual Desktop
dinCloud Hosted Virtual DesktopdinCloud Inc.
 
Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxedgar6wallace88877
 
Datanow datasheet
Datanow datasheetDatanow datasheet
Datanow datasheetNuno Alves
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentationParveen Yadav
 
Paper id 21201458
Paper id 21201458Paper id 21201458
Paper id 21201458IJRAT
 

Similar to inSync FAQ (20)

druva-solution-brochure
druva-solution-brochuredruva-solution-brochure
druva-solution-brochure
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
 
Infrascale-Overview-Flipbook-Dec-2014
Infrascale-Overview-Flipbook-Dec-2014Infrascale-Overview-Flipbook-Dec-2014
Infrascale-Overview-Flipbook-Dec-2014
 
A Complete Guide to Cloud Computing, Everything You Need To Know.pdf
A Complete Guide to Cloud Computing, Everything You Need To Know.pdfA Complete Guide to Cloud Computing, Everything You Need To Know.pdf
A Complete Guide to Cloud Computing, Everything You Need To Know.pdf
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
Tools of noc
Tools of nocTools of noc
Tools of noc
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Service Brief - dinCloud Hosted Virtual Desktop
Cloud Service Brief - dinCloud Hosted Virtual DesktopCloud Service Brief - dinCloud Hosted Virtual Desktop
Cloud Service Brief - dinCloud Hosted Virtual Desktop
 
dinCloud Hosted Virtual Desktop
dinCloud Hosted Virtual DesktopdinCloud Hosted Virtual Desktop
dinCloud Hosted Virtual Desktop
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 
Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docx
 
Datanow datasheet
Datanow datasheetDatanow datasheet
Datanow datasheet
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
 
Paper id 21201458
Paper id 21201458Paper id 21201458
Paper id 21201458
 
Group 4
Group 4Group 4
Group 4
 
Group 4
Group 4Group 4
Group 4
 

More from Druva

Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesDruva
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionDruva
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druvaDruva
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudDruva
 
Rethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlRethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlDruva
 
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Druva
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsDruva
 
Interested in working at Druva?
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?Druva
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incDruva
 
Black Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlBlack Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlDruva
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
Soundbytes from the Frontlines
Soundbytes from the FrontlinesSoundbytes from the Frontlines
Soundbytes from the FrontlinesDruva
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research Druva
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy QuizDruva
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness TestDruva
 
AWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSAWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSDruva
 
Why You Need Enterprise Backup
Why You Need Enterprise BackupWhy You Need Enterprise Backup
Why You Need Enterprise BackupDruva
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security ChecklistDruva
 

More from Druva (20)

Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data Protection
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
 
Rethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlRethink Server Backup and Regain Control
Rethink Server Backup and Regain Control
 
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
 
Interested in working at Druva?
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
 
Black Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlBlack Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data Sprawl
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Soundbytes from the Frontlines
Soundbytes from the FrontlinesSoundbytes from the Frontlines
Soundbytes from the Frontlines
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy Quiz
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
AWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSAWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWS
 
Why You Need Enterprise Backup
Why You Need Enterprise BackupWhy You Need Enterprise Backup
Why You Need Enterprise Backup
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security Checklist
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

inSync FAQ

  • 1. 1inSync FAQ What business challenge does Druva inSync solve? Druva inSync solves business challenges related to endpoint data protection and governance, including data backup and restore, governance (visibility, control, and eDiscovery enablement), DLP, and file sync and share. How does Druva inSync protect corporate data against breach after device theft or loss? Druva inSync provides complete data loss prevention including data encryption on endpoint devices, geo tracking of devices, remote wipe on laptops and mobile devices, and restore of user data, preferences, and system settings. How does Druva inSync address eDiscovery? Druva inSync enables eDiscovery for data stored on endpoint devices. inSync offers a complete governance solution for endpoint data including a legal hold workflow that provides identification tools with federated search and audit trails, collection and preserve-in-place capability, and eDiscovery enablement with direct access to Druva from an eDiscovery platform. How does Druva inSync address bandwidth costs when an entire organization backs up data? Druva inSync is architected for data storage efficiency. inSync’s global, app-aware deduplication delivers up to 90% in storage and bandwidth savings, which has the added benefit of providing a better end-user experience with up to 6x faster incremental backups than any competitor. Druva accomplishes this by deduplicating blocks of data across all users in an enterprise, each subsequent user transfers and stores less data until maximum efficiency is achieved. What if our organization needs backup in remote locations where bandwidth is a challenge? Druva inSync offers accelerated backups and restores with CloudCache, an on-premise software appliance that delivers LAN-like speeds to local users, and helps optimize WAN usage by syncing to the inSync Cloud during off-peak hours. CloudCache provides the same global deduplication benefits as inSync Cloud, locally, by only storing deduplicated data, while storing meta-data in the Cloud. This also enables users to seamlessly move from on-premise to the WAN without disrupting backups or restores. How does inSync manage device refreshes for all users? Druva inSync provides a complete set of tools to accomplish large-scale device refreshes and OS migrations across endpoint devices. Features include mass deployment support for SCCM and Casper, data and persona backup for capturing and restoring of user preferences and system settings, and wizard-based workflows to enable both user- and IT-initiated device refreshes with minimal overhead and manual involvement. Frequently Asked Questions about Druva inSync
  • 2. 2inSync FAQ What other implementation costs do I need to be aware of? With inSync’s unique Integrated Mass Deployment (IMD), delegated administration, and deep directory integration for AD save up to 75% in deployment time. How can users be ensured of high data privacy, even from administrators? Druva inSync offers a complete set of privacy settings required by any global enterprise. inSync enables IT to set group policies that allow users to prevent administrator access to their data, for example officers of the company. In the case of litigation, provisions can be made to enable legal department access only. How can Druva secure against data loss? Druva inSync Cloud has a guaranteed SLA of 99.999999999% data durability, which includes up to 3-way data redundancy across data centers. Send your data only once; redundancy is automatic and transparent at no additional cost. How secure and private is corporate data in the cloud? Druva inSync offers a unique and highly secure 2-factor encryption scheme. By utilizing this model, no one except the customer can access their data, not even Druva. This enables companies to have complete data security and privacy: data cannot be handed over if subpoenaed or a government request is made to Druva. In addition, we feature a published vulnerability assessment, pen tests, data scrambling, and compartmentalization to ensure the greatest levels of data security and privacy for our customers. What certifications does your cloud service comply with? The Druva inSync cloud is up to date with the latest in infrastructure and application security and compliance, currently complying with SOC 1 (SSAE 16, ISAE 3402, formerly SAS 70), SOC 2, SOC 3, ISO 27001, PCI DSS Level 1, ITAR, HIPAA, FedRAMP, FIPS, FISMA, and others. To learn more, please contact us directly. What is the published SLA (Service Level Agreement) for uptime? Druva inSync is built on Amazon Web Services (AWS), which provides an SLA of 99.95% uptime across it’s 10 regions and availability zones. How about global deployment? What about regulatory implications? Druva inSync has a global footprint across Americas, APAC, EMEA with 10 regions and 50+ edge locations across the globe and complies with EU safe harbor regulations. For regional data protection requirements, Druva inSync enables administrators to map users via profiles to regions, ensuring your data resides in the location required. How is inSync innovating with its cloud service? inSync was built for the cloud and delivers unique innovations with it’s patented global deduplication engine, 2-factor encryption, and cloud-based storage architecture. We also provide this same approach for our on-premise customers, including support for object storage to deliver cloud-like elasticity on-premise. Furthermore in the cloud, AWS provides innovations such as Cloudfront, Glacier, redundant data center architecture, and S3 object storage, providing customers not only cost efficiencies, but more effective ways to manage data over time.
  • 3. 3inSync FAQ Why is global deduplication so important? Storage continues to get cheaper by the day. Global deduplication delivers not only substantial storage savings, but also tremendous bandwidth savings: as high as 90% with significantly faster incremental backups (up to 6x faster). These bandwidth savings, coupled with resource throttling on the client lowers the impact to network bandwidth and minimizes client resource consumption, creating a better overall user experience. How often does Druva inSync backup files? Druva is fully configurable via administrative profiles that map to groups of users. These profiles provide advanced settings, such as backup frequency, which can be set to happen as often as every few minutes, to provide continuous data protection. If authorized by IT, end users can modify their backup schedules as needed to best fit their requirements. How safe is my organization’s encryption key? Utilizing our 2-factor encryption scheme, Druva’s approach to encryption key management ensures data cannot be lost or corrupted, as only an encrypted token is stored per user. This model prevents others outside your organization from having access to your data, a known problem when both the key and data are stored in the cloud. With AWS’s 99.999999999% data durability, the encrypted key data is safely stored, and as an added precaution, admin/user credentials can also be reset if required. If needed, Druva can provide an on-premise key server for customers who feel this provides a greater level of safety. Learn more about Druva’s security. Will my data remain in its country of origin? For customers requiring their data to stay in the country of origin, in order to be in compliance with regional data regulations, Druva provides full customer control over regional data storage assignments per user via profile settings. Customer data stays where it’s intended and doesn’t move out of that region without the customer explicitly doing so. What type of cloud does Druva support: public, private, or hybrid? Druva offers public, private, and hybrid cloud options. What type of reporting features does inSync provide? Druva provides advanced out-of-the box reporting capabilities, including a comprehensive, rich set of in- system reporting with exporting functionality. How many concurrent backups does Druva support? Druva has no limitations on concurrency and provides enterprise-level scale into the 100’s of 1000’s of users, both on-premise and in the cloud.
  • 4. Druva, Inc. Americas: +1 888-248-4976 Europe: +44.(0)20.3150.1722 APJ: +919886120215 sales@druva.com www.druva.com About Druva Druva provides integrated data protection and governance solutions for enterprise laptops, PCs, smartphones and tablets. Its flagship product, inSync, empowers an enterprise's mobile workforce and IT teams with backup, IT-managed file sharing, data loss prevention, and rich analytics. Deployed in public or private cloud scenarios or on-premise, inSync is the only solution built with both IT needs and end-user experiencesinmind.WithofficesintheU.S.,IndiaandUnitedKingdom,Druvaisprivatelyheldandisbackedby Nexus Venture Partners, Sequoia Capital andTenaya Capital. For more information, visit www.Druva.com.