Endpoint Backup is not Enough!
You Need an End-user Data Strategy
Learn the six components of an
End User Data Strategy
How to Develop an End User Data Strategy
For audio playback and Q&A go to:
http://bit.ly/EndpointBackup
Our Speakers
George Crump is the founder of Storage Switzerland, the leading storage analyst focused on the
subjects of big data, solid state storage, virtualization, cloud computing and data protection. He is
widely recognized for his articles, white papers, and videos on such current approaches as all-flash
arrays, deduplication, SSDs, software-defined storage, backup appliances, and storage networking.
He has over 25 years of experience designing storage solutions for data centers across the US.
Sarah Beaudoin is a Product Marketing Manager at Druva. She has over 15 years of experience in IT
communications, training, and systems management, leading initiatives in disaster recovery and
sensitive data management. At Druva, Sarah is responsible for product marketing of inSync, Druva’s
flagship end-user data protection and governance platform, as well as analyst engagement. Prior to
joining Druva, she led IT communications at Michigan State University.
What is an End-User Data Strategy
Evolution from endpoint backup to holistic end-user data management
Why?
● Most organizations don’t even protect endpoints (even though 60% or more of
data is no longer in the data center)
● Most organizations have a significant amount of data tied up in SaaS
applications (Salesforce, Microsoft 365, G-Suite)
● End-User data is accountable to the same compliance and regulation laws as
data center data but almost NO effort is spent organizing it
Ransomware makes this even more critical, with 4,000 attacks per day
The Three
Pillars of an
End-User
Data
Strategy
Data Protection
Laptops/mobile devices
SaaS Applications
File Sharing
End Shadow IT
Data Management
Regulation / Compliance
Data Protection -
Endpoint Data
Protection
Needs to be as easy to use as a consumer
application
Great interface
Leverage the Cloud
But have the process controlled by IT
Endpoint Security
Remote wipe
Rapid laptop rebuild
Data Protection -
SaaS Application
Protection
SaaS providers protect data to
protect themselves, not you!
Need protection against accidental
deletion or “account hijack”
File Sharing - Is it IT’s
Problem?
Users want the ability to share data
between devices and colleagues or
partners
If IT doesn’t provide FS users WILL
get it on their own
Which exposes the organization to
data leakage and unprotected cloud
only data
File Sharing -
Implementation
Methods
Enterprise File Sync and Share
Provides IT control but…
Creates another storage area,
outside of backup for IT to worry
about
Often invites users to copy data
from original stores to new
storage area, breaking security
protocols
Often creates a new relationship
with yet another cloud provider
(cloud sprawl)
File Sharing -
Implementation Methods
Integrated with Endpoint Protection
Provides IT Control
Users don’t need to move files
But IT needs to make sure it is
“seamless” enough that users will use it
Pillar III - Data Management
Data Management
Search
● Federated search across
endpoints and cloud applications
Archive
● Remove old data from laptops
● Eases space requirements from
user laptops
● Minimizes exposure to hack or
malware
● Comply with data retention
requirements
Regulation and Compliance
Sensitive Data Identification
● Credit Cards
● Social Security Numbers
● Data Hold
● Justified Deletion
Summary
● The Time is NOW - Too much sensitive data exposed in the most
dangerous of environments (outside of the data center)
● More than just laptop backup - End-to-End End User Data
Strategy
● Three Pillars
● Protection (Laptops and SaaS)
● Sharing (Eliminate Shadow IT and Data Leakage)
● Data Management (Regulation, Compliance, eDiscovery)
The Acceleration of Data Risks
Endpoints
Remote sites
Data centers
SaaS/PaaS/IaaS
50%
of data exists outside
the corporate firewall
600%
YoY increase
in ransomware
Threat of Ransomware and Data Loss
Risk to Business Continuity
Blind Spots and Lack of Governance
Lack of Legal Compliance 70%
of cloud apps are not
protected or backed up
250%
Increase in Data
Regulations
- Gartner, IDC, and EMC Studies, 2016-2017
Enterprise
Customers
4,000+
Data Under
Management
25PB+
Amazon Storage
Partner
Top 5
In Cloud Data
Protection
Gartner #1
We now efficiently manage the
full lifecycle of data across
time, device and geography.
Druva makes this possible.
“
“
Shah Nawaz
Director of IT,
Shire
Data Management-as-a-Service (DMaaS)
Core Components of Data Protection and Management
Data Governance
• Archiving
• Legal Preservation
• Auditing & Compliance
• Sovereignty
• Privacy
Data Intelligence
• Analytics
• Data Forensics
• Anomaly Detection
• Predictive Tuning
• Early Data Assessment
Data Protection
• Backup & Recovery
• Disaster Recovery
• Availability
• Durability & Integrity
• Workload Mobility
End-user Data Protection and Governance
Simplify: Data Protection
Endpoint Backup,
Recovery and Archival
Cloud Application Data
Protection
Data Loss Prevention for
Endpoints
• Ensure data is safe from loss or
breach
• View and manage all end-user
data through a single pane of
glass
• Minimize downtime during
device refreshes or malware
recovery
• Immediate access to data from
anywhere
Secure File Sharing and
Mobile Access
Streamline: Data Governance
• Collect custodian data distributed
across many locations and
preserve as long as necessary
• Comply with regional, industry and
corporate data privacy regulations
• Investigative search across all
users, devices, and storage
locations
eDiscovery Enablement
and Legal Hold
Enterprise Search
Defensible Deletion
Transform: Data Intelligence
• Identify and remediate risks
to sensitive data throughout
the organization
• Gain visibility into data
movement and footprint
• Minimize the business
impact of malware or
insider threat
Proactive Compliance
Unusual Data Activity
Data Insights
Shire Protects Pharmaceutical Data
“We manage the full lifecycle of data across
time, device and geography. Druva is a key
capability to make this possible.”
Challenges:
• Constant worries about data security and
compliance requirements across the organization
• Concerns of mishandling IP and research
information
• Rising costs to collect/preserve data for litigation
purposes
Results with Druva:
• Central data access and visibility for 6,000
endpoints for compliance and recovery
• Over 90% of calls for backup support have gone
away
• eDiscovery processes that once took five days
have been reduced to minutes
Thank you!
Storage Switzerland
http://www.storageswiss.com
georgeacrump@storageswiss.com
StorageSwiss on Twitter:
http://twitter.com/storageswiss
StorageSwiss on YouTube:
http://www.youtube.com/user/storageswiss
Druva
https://www.druva.com
Druva on Twitter:
https://twitter.com/druvainc
Druva on Facebook:
https://www.facebook.com/DruvaInc/
How to Develop an End User Data Strategy
For complete Audio and Q&A please register for the On Demand Version at:
http://bit.ly/EndpointBackup

Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy

  • 1.
    Endpoint Backup isnot Enough! You Need an End-user Data Strategy Learn the six components of an End User Data Strategy How to Develop an End User Data Strategy For audio playback and Q&A go to: http://bit.ly/EndpointBackup
  • 2.
    Our Speakers George Crumpis the founder of Storage Switzerland, the leading storage analyst focused on the subjects of big data, solid state storage, virtualization, cloud computing and data protection. He is widely recognized for his articles, white papers, and videos on such current approaches as all-flash arrays, deduplication, SSDs, software-defined storage, backup appliances, and storage networking. He has over 25 years of experience designing storage solutions for data centers across the US. Sarah Beaudoin is a Product Marketing Manager at Druva. She has over 15 years of experience in IT communications, training, and systems management, leading initiatives in disaster recovery and sensitive data management. At Druva, Sarah is responsible for product marketing of inSync, Druva’s flagship end-user data protection and governance platform, as well as analyst engagement. Prior to joining Druva, she led IT communications at Michigan State University.
  • 3.
    What is anEnd-User Data Strategy Evolution from endpoint backup to holistic end-user data management Why? ● Most organizations don’t even protect endpoints (even though 60% or more of data is no longer in the data center) ● Most organizations have a significant amount of data tied up in SaaS applications (Salesforce, Microsoft 365, G-Suite) ● End-User data is accountable to the same compliance and regulation laws as data center data but almost NO effort is spent organizing it Ransomware makes this even more critical, with 4,000 attacks per day
  • 4.
    The Three Pillars ofan End-User Data Strategy Data Protection Laptops/mobile devices SaaS Applications File Sharing End Shadow IT Data Management Regulation / Compliance
  • 5.
    Data Protection - EndpointData Protection Needs to be as easy to use as a consumer application Great interface Leverage the Cloud But have the process controlled by IT Endpoint Security Remote wipe Rapid laptop rebuild
  • 6.
    Data Protection - SaaSApplication Protection SaaS providers protect data to protect themselves, not you! Need protection against accidental deletion or “account hijack”
  • 7.
    File Sharing -Is it IT’s Problem? Users want the ability to share data between devices and colleagues or partners If IT doesn’t provide FS users WILL get it on their own Which exposes the organization to data leakage and unprotected cloud only data
  • 8.
    File Sharing - Implementation Methods EnterpriseFile Sync and Share Provides IT control but… Creates another storage area, outside of backup for IT to worry about Often invites users to copy data from original stores to new storage area, breaking security protocols Often creates a new relationship with yet another cloud provider (cloud sprawl)
  • 9.
    File Sharing - ImplementationMethods Integrated with Endpoint Protection Provides IT Control Users don’t need to move files But IT needs to make sure it is “seamless” enough that users will use it
  • 10.
    Pillar III -Data Management
  • 11.
    Data Management Search ● Federatedsearch across endpoints and cloud applications Archive ● Remove old data from laptops ● Eases space requirements from user laptops ● Minimizes exposure to hack or malware ● Comply with data retention requirements Regulation and Compliance Sensitive Data Identification ● Credit Cards ● Social Security Numbers ● Data Hold ● Justified Deletion
  • 12.
    Summary ● The Timeis NOW - Too much sensitive data exposed in the most dangerous of environments (outside of the data center) ● More than just laptop backup - End-to-End End User Data Strategy ● Three Pillars ● Protection (Laptops and SaaS) ● Sharing (Eliminate Shadow IT and Data Leakage) ● Data Management (Regulation, Compliance, eDiscovery)
  • 13.
    The Acceleration ofData Risks Endpoints Remote sites Data centers SaaS/PaaS/IaaS 50% of data exists outside the corporate firewall 600% YoY increase in ransomware Threat of Ransomware and Data Loss Risk to Business Continuity Blind Spots and Lack of Governance Lack of Legal Compliance 70% of cloud apps are not protected or backed up 250% Increase in Data Regulations - Gartner, IDC, and EMC Studies, 2016-2017
  • 14.
    Enterprise Customers 4,000+ Data Under Management 25PB+ Amazon Storage Partner Top5 In Cloud Data Protection Gartner #1 We now efficiently manage the full lifecycle of data across time, device and geography. Druva makes this possible. “ “ Shah Nawaz Director of IT, Shire
  • 15.
    Data Management-as-a-Service (DMaaS) CoreComponents of Data Protection and Management Data Governance • Archiving • Legal Preservation • Auditing & Compliance • Sovereignty • Privacy Data Intelligence • Analytics • Data Forensics • Anomaly Detection • Predictive Tuning • Early Data Assessment Data Protection • Backup & Recovery • Disaster Recovery • Availability • Durability & Integrity • Workload Mobility
  • 16.
  • 17.
    Simplify: Data Protection EndpointBackup, Recovery and Archival Cloud Application Data Protection Data Loss Prevention for Endpoints • Ensure data is safe from loss or breach • View and manage all end-user data through a single pane of glass • Minimize downtime during device refreshes or malware recovery • Immediate access to data from anywhere Secure File Sharing and Mobile Access
  • 18.
    Streamline: Data Governance •Collect custodian data distributed across many locations and preserve as long as necessary • Comply with regional, industry and corporate data privacy regulations • Investigative search across all users, devices, and storage locations eDiscovery Enablement and Legal Hold Enterprise Search Defensible Deletion
  • 19.
    Transform: Data Intelligence •Identify and remediate risks to sensitive data throughout the organization • Gain visibility into data movement and footprint • Minimize the business impact of malware or insider threat Proactive Compliance Unusual Data Activity Data Insights
  • 20.
    Shire Protects PharmaceuticalData “We manage the full lifecycle of data across time, device and geography. Druva is a key capability to make this possible.” Challenges: • Constant worries about data security and compliance requirements across the organization • Concerns of mishandling IP and research information • Rising costs to collect/preserve data for litigation purposes Results with Druva: • Central data access and visibility for 6,000 endpoints for compliance and recovery • Over 90% of calls for backup support have gone away • eDiscovery processes that once took five days have been reduced to minutes
  • 21.
    Thank you! Storage Switzerland http://www.storageswiss.com georgeacrump@storageswiss.com StorageSwisson Twitter: http://twitter.com/storageswiss StorageSwiss on YouTube: http://www.youtube.com/user/storageswiss Druva https://www.druva.com Druva on Twitter: https://twitter.com/druvainc Druva on Facebook: https://www.facebook.com/DruvaInc/
  • 22.
    How to Developan End User Data Strategy For complete Audio and Q&A please register for the On Demand Version at: http://bit.ly/EndpointBackup