system (e.g. iOS). Self-service. Empower users to conduct their own file or system restores instead of relying solely on
A BUYER’S CHECKLIST FOR ENDPOINT DATA PROTECTION: 10 KEY DIFFERENTIATORS Today, endpoint devices have expanded beyond desktops and laptops to include other mobile devices (e.g. tablets, smartphones, etc.), and these devices now store 80 percent of company data.1 This change, in combination with BYOD policies, the consumerization of IT, and the increasing number of enterprise data breaches, has triggered a renewed emphasis on endpoint data protection. Beyond baseline requirements like centralized management, user transparency, scheduled backups and the ability to restore to different devices, buyers must evaluate against endpoint data protection differentiators to ensure they purchase the most secure and scalable solution for their organization. HERE ARE THE TOP 10 DIFFERENTIATORS FOR AN ENDPOINT DATA PROTECTION SOLUTION: Cross-platform support. When it comes to endpoint protection, support for any and all devices and operating systems that your organization uses should be non-negotiable. To promote uninterrupted support, consider the interface presentation as well. Some vendors offer a uniform, common interface across all device types while others tailor the interface to a particular device or system (e.g. iOS). Self-service. solely on IT’s assistance. Self-service is particularly important for remote or highly mobile workers who aren’t often at corporate headquarters. Mobile data access and backup. Implement an endpoint protection solution that will back up mobile devices and deliver backed up data to those devices. Ironclad security. For endpoint backup and recovery, choose a solution that offers endto-end encryption and provides your organization with sole control of the encryption keys. For even better company security, make sure integrations are available for AD/LDAP, SSO and multi-factor authentication. Scalability. Regardless of your organization’s size be sure you’re equipped to properly back up important data. Flexibility in cloud deployment choice and the ability to manage thousands of devices from a single, centralized console will save you and your team time and money. 1
“Tech Spotlight: Endpoint Backup In The Enterprise,” Forrester Research, Inc., September 4, 2013.
enterpriseappleization.com | @appleization Brought to you by Code42.
A BUYER’S CHECKLIST FOR ENDPOINT DATA PROTECTION: 10 KEY DIFFERENTIATORS File sync and share. sync and share solution should also be considered. Using the same vendor for both solutions is ideal, particularly if built on the same platform; it provides a sole, recognizable interface that uses less bandwidth than two separate solutions and includes the potential to bundle costs. Providing both options to employees promotes both data protection (endpoint backup and recovery) and
Data loss prevention and data de-duplication + compression. Data loss prevention (DLP) is a key feature to have if devices with shared corporate data are lost or stolen because IT can conduct remote data wipes. Make sure you also have a solution that provides device to save on capacity and bandwidth. Legal hold and compliance. Though a newer offering in the endpoint backup arena, support for legal hold and compliance regulations is crucial to your data protection plan. No matter which regulations you may be under—whether HIPAA or other compliance standards— using an enterprise-class, endpoint data protection platform gives you a centralized repository for search and discovery. No performance degradation during backup operations. With some legacy solutions, endpoint backup led to degradation in device performance and numerous user complaints. Closely review this feature as you search for a solution; performance degradation is the last thing users want on their endpoint devices—and can cause users to disable the backup. Ease of use for end users and IT. It’s critical to have a user-friendly interface that reduces IT tickets, rather than adds to them. But the ease-of-use must extend to IT pros as well. The right solution should be a utility you don’t need to babysit—particularly if thousands of devices are involved. Use these 10 differentiators to guide your search for endpoint protection solutions and vendors. Because what you implement today impacts the security and scalability of your enterprise tomorrow.
enterpriseappleization.com | @appleization Brought to you by Code42.