END POINT DATA PROTECTION FOR THE FUTURE By Jaspreet Singh, CEO, Druva Inc.

END POINT DATA PROTECTION FOR THE FUTURE

Jaspreet Singh, CEO, Druva Inc. | Tuesday, 02 June 2015, 10:26 IST

  •  No Image

Druva offers a full suite of endpoint data management solutions for enterprise laptops, PCs, smartphones, and tablets. Headquartered in Sunnyvale, CA, and founded in 2008, the firm has received a total funding of $42 million from Sequoia Capital, Nexus Venture Partners, Tenaya Capital and Indian Angel Network.

Centralized data storage represents just a portion of corporate data.

Where is the rest located?

Everywhere, in remote offices, in laptops, in tablets, in smartphones, in the cloud. Can you account for the corporate data existing in these endpoints? If you cannot then you are fighting a rising tide. As the workforce becomes increasingly mobile so does its data, with vast amounts already stored on endpoints and more moving all the time. Just as you manage centralized data for governance and value, endpoint data requires the same sophisticated management.
New product developments are keeping pace with this important trend.
These scalable tools enable you to:
- Govern remote data for compliance and risk management
- Increase the value of this data to your business.

1: Manage for Governance

Endpoint data requires strong governance for compliance and risk management. The right management tools will help IT manage data retention, information rights, policies for classified data, and monitoring.
- Meet Data Retention Requirements. Governance requires enterprises to retain long-term copies of data wherever it is located, and provide chain of custody documentation when required. Endpoint management enables retention oversight for remote data.
- Use Case: Audit. A team of auditors requests reports on patient health data retention. You quickly hand over retention reports from corporate and regional data centers, which they expect. You also hand over clear aggregated reports of data retention from remote offices, laptops and mobile devices thousands of them.
- Manage Information Rights. Greater mobility leads to exploding amounts of data on endpoints. Organizations need to embed endpoint security at the document and volume levels.
- Use case: Secure the endpoints. An employee loses their tablet in an airport. Another traveler picks it up and later tries to access data on the device. Because of information rights management, the data cannot be accessed due to restrictions such as IP address or time of day.
- Apply Policies by Data Classification. Data on endpoints may be subject to restrictions around IP, financial data, personal privacy protection, and more. IT needs to monitor and control data according to these unique requirements.
- Use Case: IT struggles to manage data classifications on distributed endpoints. Endpoint management enables them to automatically apply unique security and retention settings as needed.

2: Manage for Value

Now we turn to the second broad benefit of endpoint management tools: gleaning value from widely distributed data. Proactively monitoring data and leveraging metadata create the foundation of managing for value.
- Monitor Data Proactively. IT departments need to backup endpoint data and administer remote locking and erasure. Internal events can also do serious damage such as destructive employees or ex-employees taking sensitive data to new jobs.
- Use Case: An employee has taken a new job. He signed a noncompete agreement but believes that no one will notice if he downloads data as a head start in his new position. Unfortunately for him, endpoint management tools immediately alert IT to the user's unusually large number of downloads.
- Leverage Metadata. As the volume of data across numerous devices grows, leveraging metadata becomes crucial to managing for value. Building logic around the metadata allows the same data to be used in multiple ways such file sharing and collaboration, data restore, and global searches across all endpoints.
- Use Case: The Legal department needs to locate a file, all of its copies, and its custodians. Without endpoint management this would be a nightmare scenario; but with the right tool, IT easily searches and locates all copies for legal hold.

What to Look for in Endpoint Technology

Given strong mobile trends and massive data growth rates, enterprises need a full-featured endpoint data protection product that will seamlessly scale with them. Basic features should include backup and recovery as well as data loss prevention (DLP) features such as encryption, remote data wiping and geo-location. Additional features should include deduplication and WAN optimization. Other high value options are related technologies such as secure corporate file sharing across endpoint devices, and the ability to monitor and report on real-time data usage and trends.
Endpoint management is an important tool today for managing the vast amounts of endpoint data and it is quickly becoming crucial. Choose a platform that not only meets your needs today but also meets the governance and value needs of tomorrow.

CIO Viewpoint

Machine Learning In Cybersecurity: The Risks &...

By Neelesh Kripalani, Chief Technology Officer, Clover Infotech

5 Major Saas Trends To Check-Out In 2021

By Vikas Bhonsle, CEO, Crayon Software Experts India

Artificial Intelligence & The Disruptive Chatbot

By Vishal Sinha, President & CIO, Tranzlease Holdings

CXO Insights

Incorporating Blockchain Capabilities into...

By Tamal Chowdhury, SVP, Artificial Intelligence, Course5i

Cybersecurity In BFSI

By Sumed Marwaha, Regional Services VP & MD and Seshadri PS, Senior Director Governance, Risk and Compliance, Office of the CISO, Unisys India

Facebook