Endpoint backup and securing data properly is one of today’s basic elements of modern business. Digitization of processes has naturally increased the importance of electronic data. Since it’s value distinctively grow, adequate data protection became undeniably related to a company’s development strategy – especially since GDPR (General Data Protection Regulation) entered into force.
On the other side, the growing number of remote employees speeds up key data migration from a server room to an end user’s device ( e.g. laptops). Traditional data protection solutions, which aim at server protection as part of the company’s firewall, weren’t created for infrastructures, where a number of data is stored on [unsecured] endpoints. Many companies still haven’t worked out a holistic approach to data protection. What is more, they don’t know the extent to which data loss will undermine the continuity of their business processes.
Why protecting end-user devices is so important?
While answering this question, it is important to realize, what information is stored on those devices. This is the fastest way to estimate what is the actual value of the data which is made and stored on endpoints. Truthfully, most of them – business documents, financial documents, presentations, e-mails, apps (or data which was collected on them) – is either difficult or even impossible to be recreated (starting from scratch).
Earlier, we raised the issue of traditional approach to data protection and mentioned that it is not the best solution for endpoint backup. „Legacy backups” were created for the predictable physical environment (servers backup, databases, etc.), and that is why, with the environment which is so changing like the infrastructure with end user’s equipment (where we also deal with remote employee’s devices), they simply don’t work out. Modern solutions easily manage to secure additional locations, are much more efficient, ensure high scalability, and are not overloading terminal devices.
Elements of good endpoint backup solution
Security
While we process a lot of data – mostly it is sensitive data – every modern endpoint protection solution must guarantee the highest level of security. Files should be encrypted on the user’s end, and only in such form sent further to the storage – which is done using a secure connection.
This is the exact method which is used by banks for financial transactions. Xopero guarantees the same high quality of protection. The data consistency mechanism, which is part of Xopero solutions, ensures that the data is backed up properly. Once the backup is made, Xopero also checks if all the data was sent correctly. Furthermore, our software automatically checks all data, including data consistency at any time selected by the user (e.g. at night time).
Comprehensiveness
Xopero protects all key data saved on endpoints: files, folders, mails, or even the whole disc with the system.
Agile
It is very important for managing users and devices to be as easy and elastic as possible. A endpoint backup solution should enable creating many users with different administrator privileges and accesses, as well as devices that are assigned to them.
If we take a close look at Xopero, we can see that these solutions also allows creating different encryption keys for every user. That makes a significant increase in the security level. It is much more difficult to break many encryption keys than just one. Xopero administrators can also decide if the user will use the app for customers, with the graphic design of the interface, or pure CLI app. In the first scenario, customers have the ability to set their own rules for making a backup and restoring data. The second scenario gives full control over backup polity to the administrator, who can restore the data remotely and define how backup will be made. Thanks to backup templates, the administrator is just a few clicks away from defining backup for many devices – which considerably speeds up backup management
Simple management
Whenever we are wondering what else should guarantee backup policy management, we should remember about user management. The administrator must be certain that the user can use only those options, which he was permitted to use, e.g. that user is not able to make any changes in the backup templates. The administrator who is working with Xopero tools can easily grant or revoke permissions to a single user or group, as well as:
- Manage rules for making backups,
- Restore data
- Manage encryption keys
- Manage the degree of application performance
ROBO
As we mentioned in the introduction, end-users’ devices can also be located outside the company. That doesn’t change the fact that the security level must be the same as for computers located in the company. What is the ideal way to protect the devices in the company’s headquarters and its branches? As a way to maximally facilitate this process, Xopero endpoint backup allows to create ports within the frameworks of firewall or use an existent VPN connection.
Dependable data restore
Agent’s actions cannot in any way influence employees’ productivity or any of their devices. Processes that take place on the end user’s device must be unnoticeable for the user – even on the equipment of average performance. The administrator can use Xopero central management to define such options as:
- Use of bandwidth, both for backups and data recovery,
- Number of cores in a processor which are used by the app
- And even reduce hard drive use by monitoring read/write queue
Backup is worthless if you won’t be able to restore the data. A good backup solution must work every time, be dependable, and guarantee that the data can be restored quickly and from every moment in time. How can you verify it? The only good method is to regularly test backups. Our central management mode noticeably simplifies this process: Management Center enables remote access, ensures advanced reporting, monitoring, quick view of the logs, etc.
Let’s step back for a moment, to discuss the matter of restoring data. Xopero allows both the administrator and the user to restore data. The administrator can easily recover selected files and folders from any version onto his computer or directly to a user’s device. Moreover, Xopero app for customers is so easy to use, that even untrained users will be able to restore data within a short period of time.
To sum up, the best endpoint backup solution should ensure high quality of data security, enable easy user and device management, as well as be easy to use. That is exactly what Xopero is like.