Select Page
  • The amount of corporate data is doubling every 18 months
  • 25% of IT professionals are not aware if their BYOD policy is compliant with data and privary protection act
  • 51% find that their current back solution is intrusive
  • On an average it takes 9 days for a user to be fully operational after loosing a laptop – IDC
  • Do it Yourself (DIY) backup which is usually on cloud, flash drives or CDs/DVDs is decentralized and exposed to vagaries to being lost or stolen
  • Proliferation of BYOD is bringing in requirement for backup or good number of mobile devices with heterogeneous environment and keeping the data secure outside corporate firewal
  • Only 8% of the laptop data is backed on to the server – Gartner

6 Points for end point backup

With 28% of your data residing on laptops and endpoint devices at any given point in time coupled with ever increasing influx of mobile devices, data backup, monitoring and managing the increasing number of users is becoming a herculean day to day task for IT administrators. However, before you acquire any product its important one understands endpoint landscape and ensures a complete fitment of the solution with organisations requirement.

  1. Know what is your existing infrastructure and what will it be in future: Having a list of endpoints devices with their operating systems, amount of data and how mobile is the device is the best way to start. This will let us know if we need a simple solution for standard windows backup or should we go for a slightly high end solution which can cater our heterogeneous and highly mobile endpoint landscape
  2. Optimize backup on the basis of bandwidth available: As devices are constantly on move, the backup solution should be equipped to handle the problems due to varying bandwidth and should not hinder the core work of employees
  3. Easy manageability & deployment: A simple gui based management console not only ensures easy one time server installation but also easy and one time push through AD for silent installation of agents on the device. In case you do not have AD then take support to prepare the policies for the fist time and then install it through user base
  4. Focus on less usage of storage: Focus on deduplication. Dedupe methodologies are many but focus on source side dedupe and compression with backend dedupe at servers will save lots of space.
  5. Data visibility & maintain control: When any incidence of loss, theft  or termination is reported, the administrator should have clear knowledge about what is stored on the mobile device/endpoint device and she/he should be able to remotely wipe the data from the device. Its always better to be prepared rather than knowing by embarrassing public announcement
  6. DLP – Data Loss Prevention: For highly sensitive mobile user profiles additional features of geo-tagging, encryption of data, port blocking etc should be provisioned for. These may be additional cost for the first time but it will ensure long time easy manageability.

Subscribe To Our Newsletter

You have Successfully Subscribed!