More data outside of the data center is staying on endpoints and in the cloud than ever before. That means the risks to that data are also at an all time high. Plus regulations encompassing end-user data are also increasing, challenging IT to manage data when they have less control than ever. IT needs more than an endpoint protection plan, it needs an end-user data strategy.
In this webinar, learn how to evolve from an endpoint data protection plan to a comprehensive end-user data strategy.
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
1. Endpoint Backup is not Enough!
You Need an End-user Data Strategy
Learn the six components of an
End User Data Strategy
How to Develop an End User Data Strategy
For audio playback and Q&A go to:
http://bit.ly/EndpointBackup
2. Our Speakers
George Crump is the founder of Storage Switzerland, the leading storage analyst focused on the
subjects of big data, solid state storage, virtualization, cloud computing and data protection. He is
widely recognized for his articles, white papers, and videos on such current approaches as all-flash
arrays, deduplication, SSDs, software-defined storage, backup appliances, and storage networking.
He has over 25 years of experience designing storage solutions for data centers across the US.
Sarah Beaudoin is a Product Marketing Manager at Druva. She has over 15 years of experience in IT
communications, training, and systems management, leading initiatives in disaster recovery and
sensitive data management. At Druva, Sarah is responsible for product marketing of inSync, Druva’s
flagship end-user data protection and governance platform, as well as analyst engagement. Prior to
joining Druva, she led IT communications at Michigan State University.
3. What is an End-User Data Strategy
Evolution from endpoint backup to holistic end-user data management
Why?
● Most organizations don’t even protect endpoints (even though 60% or more of
data is no longer in the data center)
● Most organizations have a significant amount of data tied up in SaaS
applications (Salesforce, Microsoft 365, G-Suite)
● End-User data is accountable to the same compliance and regulation laws as
data center data but almost NO effort is spent organizing it
Ransomware makes this even more critical, with 4,000 attacks per day
4. The Three
Pillars of an
End-User
Data
Strategy
Data Protection
Laptops/mobile devices
SaaS Applications
File Sharing
End Shadow IT
Data Management
Regulation / Compliance
5. Data Protection -
Endpoint Data
Protection
Needs to be as easy to use as a consumer
application
Great interface
Leverage the Cloud
But have the process controlled by IT
Endpoint Security
Remote wipe
Rapid laptop rebuild
6. Data Protection -
SaaS Application
Protection
SaaS providers protect data to
protect themselves, not you!
Need protection against accidental
deletion or “account hijack”
7. File Sharing - Is it IT’s
Problem?
Users want the ability to share data
between devices and colleagues or
partners
If IT doesn’t provide FS users WILL
get it on their own
Which exposes the organization to
data leakage and unprotected cloud
only data
8. File Sharing -
Implementation
Methods
Enterprise File Sync and Share
Provides IT control but…
Creates another storage area,
outside of backup for IT to worry
about
Often invites users to copy data
from original stores to new
storage area, breaking security
protocols
Often creates a new relationship
with yet another cloud provider
(cloud sprawl)
9. File Sharing -
Implementation Methods
Integrated with Endpoint Protection
Provides IT Control
Users don’t need to move files
But IT needs to make sure it is
“seamless” enough that users will use it
11. Data Management
Search
● Federated search across
endpoints and cloud applications
Archive
● Remove old data from laptops
● Eases space requirements from
user laptops
● Minimizes exposure to hack or
malware
● Comply with data retention
requirements
Regulation and Compliance
Sensitive Data Identification
● Credit Cards
● Social Security Numbers
● Data Hold
● Justified Deletion
12. Summary
● The Time is NOW - Too much sensitive data exposed in the most
dangerous of environments (outside of the data center)
● More than just laptop backup - End-to-End End User Data
Strategy
● Three Pillars
● Protection (Laptops and SaaS)
● Sharing (Eliminate Shadow IT and Data Leakage)
● Data Management (Regulation, Compliance, eDiscovery)
13. The Acceleration of Data Risks
Endpoints
Remote sites
Data centers
SaaS/PaaS/IaaS
50%
of data exists outside
the corporate firewall
600%
YoY increase
in ransomware
Threat of Ransomware and Data Loss
Risk to Business Continuity
Blind Spots and Lack of Governance
Lack of Legal Compliance 70%
of cloud apps are not
protected or backed up
250%
Increase in Data
Regulations
- Gartner, IDC, and EMC Studies, 2016-2017
17. Simplify: Data Protection
Endpoint Backup,
Recovery and Archival
Cloud Application Data
Protection
Data Loss Prevention for
Endpoints
• Ensure data is safe from loss or
breach
• View and manage all end-user
data through a single pane of
glass
• Minimize downtime during
device refreshes or malware
recovery
• Immediate access to data from
anywhere
Secure File Sharing and
Mobile Access
18. Streamline: Data Governance
• Collect custodian data distributed
across many locations and
preserve as long as necessary
• Comply with regional, industry and
corporate data privacy regulations
• Investigative search across all
users, devices, and storage
locations
eDiscovery Enablement
and Legal Hold
Enterprise Search
Defensible Deletion
19. Transform: Data Intelligence
• Identify and remediate risks
to sensitive data throughout
the organization
• Gain visibility into data
movement and footprint
• Minimize the business
impact of malware or
insider threat
Proactive Compliance
Unusual Data Activity
Data Insights
20. Shire Protects Pharmaceutical Data
“We manage the full lifecycle of data across
time, device and geography. Druva is a key
capability to make this possible.”
Challenges:
• Constant worries about data security and
compliance requirements across the organization
• Concerns of mishandling IP and research
information
• Rising costs to collect/preserve data for litigation
purposes
Results with Druva:
• Central data access and visibility for 6,000
endpoints for compliance and recovery
• Over 90% of calls for backup support have gone
away
• eDiscovery processes that once took five days
have been reduced to minutes