Need for an Endpoint Data Protection Solution
According to many recent studies, around 30-40 percent of a company’s data is stored on endpoints such as laptops and other devices. This data is nowhere stored or backed up in the data center. Therefore, it goes beyond an organization’s control. If those laptops fail or get stolen, the organization loses that data forever. Regardless the losses of critical data, most of the organizations do not incorporate data protection strategies for their endpoints.
The traditional endpoint protection strategy involves asking users to copy their data to file server storages or enterprise Network Attached Storage (NAS). The “just copy” was more than just an unsuccessful data management practice, as it did not address the remote office or other tablet use cases. The first problem with data protection for endpoints is its mobility. In most cases, the endpoints are not connected to the corporate network. Therefore, the solutions for endpoint data protection should be capable of protecting endpoints across the very limited bandwidth.
The lack of a quality solution has created a second class of solutions aiming directly at endpoint backup. Similar to other environment-specific data protection solutions, an endpoint-centric solution may have the advantage of focusing on a specific problem, though at the cost of further complexity. In particular, the data protection solutions for endpoints are problematic since they often compel organizations to use the cloud for backup storage but do not provide the options to choose the cloud provider.
Businesses are looking for a solution that can integrate the entire enterprise data protection process to consolidate the storage and management of data that goes beyond the ‘just copy’ method. Employing an enterprise data protection solution should also allow the customers to make informed decisions on sending their critical data to the cloud. Customers should be given the authority to choose the cloud provider rather than being forced by organizations. The key is to look for a solution that meets both the organizations' as well as the customers' needs while integrating the overall endpoint protection of an enterprise. While several companies providing enterprise data protection solutions have given up on endpoint protection, a few continue to advance their offerings and provide solutions that are both user- and enterprise-friendly.
By Phil Jarvis, VP, IT, Thirty-One Gifts
By Dr.Chris Ewell, CISO, Seattle Children
By Eloise Young, CIO, Philadelphia Gas Works
By Phil Stevens, CIO, The Exchange
By Herman Nell, SVP & CIO, Rent-A-Center
By John Honeycutt, CTO, Discovery Communications
By Mark Wead, Chief Enterprise Architect– North America...
By Federico Flórez, Chief Information & Innovation Officer,...
By David Berry, CIO, Daymon Worldwide
By Douglas Turk, Chief Marketing Officer, JLT Speciality
By Tekin Gulsen, CIO, Global IT & Corporate Planning...
By John Sprague, Deputy CTO, IT and the End User Architect,...
By Craig C Shrader, CIO Engagement Partner, Tatum, a...
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Tom Bressie, Vice President, Oracle Cloud
By Jeff Katz, CTO, Energy & Utilities, IBM [NYSE:IBM]
By Dr Dirk E Mahling, VP, Technology, Alliant Energy
By Steven John, CIO, AmeriPride Services
By Leon Ravenna, CISO, KAR Auction Services, Inc.