Many data centers unwittingly have a blind spot in their backup strategy, endpoints like laptops and other devices are left exposed. Most organizations have no formal endpoint data protection strategy even though studies indicate that over 60% of data on endpoints is unique to that device. In most cases, there is no centralized data protection strategy for endpoints.
IT is counting on users to protect their data, but the reality is that the organization needs a centralized endpoint data protection strategy that fixes backup's blind spot.
Join Storage Switzerland and Infrascale for this on demand webinar to learn how to create an endpoint data protection strategy that leverages the cloud to fix the backup blind spot. The webinar also includes a demo of the solution, so you can see how efficiently IT can protect endpoints without disrupting end users.
3. Protecting EndPoints is Critical
● The most likely to get lost, left behind or stolen
● 60% of data on endpoints is unique (not in the
data center and not in backups)
● The most likely target of ransomware and viruses
● Protection and management of endpoint data is
now a legal requirement
● But protection of endpoints is a low priority for
most organizations
4. Why is EndPoint a low Priority? -
No One Likes It
● IT Doesn’t Like it - Thousands of
endpoints, and most of them are
mobile = a management nightmare
because of BYOD
● Users Don’t Like It - Disruptive to
their workflow
● CFOs Don’t Like it - Very Expensive
5. Hope is not a
Strategy:
EndPoint
Protection
Today
● Hope that users are doing their
own backups
● Hope that users are copying
docs to a central file server
● Hope that the file sync and
share solution will provide
recovery
8. Step 1: Leverage
The Cloud
● Provides Single Data
Management Point
● Provides Unlimited Scale
● Globally Accessible
● Pay as you Go Pricing
● But the Cloud is just the
Beginning
9. Step 2: Protect
Them!
● Transparent deployment and use
- must stay out of users way
● Rapid backups
○ Granular
○ Multiple times per day
○ Multiple backup storage areas
13. Summary
● EndPoint protection (and recovery) is
a critical part of a complete data
protection solution
● Frequent backups is priority one, too
much unique data on laptops
● Leverage the cloud for centralized
administration
15. INFRASCALE
CLOUD BACKUP
INFRASCALE
DISASTER RECOVERY
• Backup your data directly to the cloud
• Recover your data in seconds
• Optimized for endpoints and branch
office servers
• Ransomware detection &
remediation
• Backup your entire network of
systems to an on-premise appliance
and to the cloud
• Run system replicas in seconds
• Restore in your own time
• Optimized for mission-critical physical
and virtual servers
INFRASCALE
CLOUD APPLICATION BACKUP
• Cloud applications have limited
retention policies, then delete
forever
• Backup Office 365, SharePoint and
OneDrive, G-Suite, Salesforce.com,
Box.com and more
• Recover individual mail items or
mailboxes
COMPREHENSIVE DATA AND SYSTEM RECOVERY
17. THE TYPICAL BUSINESS
Servers
Remote Workers & Offices
Laptops, Desktops, Tablets
Business Apps
Server
Backup &
Fail-over
Exposed
Exposed
Infrascale
Disaster Recovery
Infrascale
Cloud Application Backup
Infrascale
Cloud Backup
18. TOTAL DATA PROTECTION
CLOUD BACKUP
& RECOVERY
Physical & Virtual Servers
INFRASCALE
CLOUD
PRIVATE
CLOUD
THIRD-PARTY
CLOUD
Infrascale
Appliance
OR
SUPPORTED DEVICES
SUPPORTED OS
RECOVERY TARGET
Mobile Devices Desktops & Laptops
19. WE PROTECT ANY HYBRID ENVIRONMENT
18
Source Side Target Side
PHYSICAL
SERVERS
VIRTUAL
SERVERS
APPLICATIONS
DATABASE, EMAIL SERVERS PRIVATE CLOUD
INFRASCALE
CLOUD
APPLIANCE
ENDPOINTS
SMARTPHONES & TABLETS
WORKSTATIONS
DESKTOPS & LAPTOPS
PUBLIC CLOUD
CLOUD WORKLOADS
CLOUD AS A SOURCE
Manage with
one pane of glass
21. Using the Cloud to Fix Backup's Blind Spot -
Endpoint Data Protection
For complete audio and Q&A please register for the On Demand Version:
bit.ly/BackupBlind