As the use of mobile devices in the workforce increases, so does the need for the protection of that mobile data. A growing quantity of sensitive corporate data exists outside the more secure company servers, on end-user devices. However, corporate endpoint device use is increasing at such a rate that the state of endpoint security is struggling to catch up. Without reliable endpoint backup, endpoint data runs a high risk of being compromised.
Before getting into endpoint backup itself, it’s important to set the scene of the state of endpoint security on the whole. According to the SANS Institute’s study on the subject, “the understanding of what constitutes an endpoint is changing rapidly, as the network perimeter is dissolving. As technology evolves to address changing business needs, a wider variety of devices is being connected to the network.”
This quote paints the picture of an ever-changing endpoint device landscape that endpoint security must attempt to keep up with. The technology for endpoint security is apparently struggling to do this, as the SANS Institute found that 44% of respondents admitted that one or more of their endpoints had been compromised in the past 2 years.
In a space such as this, where endpoints are being compromised, protecting your endpoint data is crucial. Therefore, picking the right endpoint backup solution for your business is an important choice. Laptops and mobile devices can be backed up with custom backup scripts or software specifically designed for those devices. However, the user needs to be connected to the corporate network for the backup to take place. As a result of this, it’s possible that the backup could be incomplete when the user logs off.
Continuous data protection (CDP) tools for laptops are also an option in terms of endpoint backup. CDP products are made to stream data to the backup target when the user is logged on. The software pauses the process when the user logs off, and then resumes when the user has logged back on.
Cloud backup is perhaps the most popular option, as there is no need to buy, install, and sustain internal infrastructure. Backup and recovery expert, W. Curtis Preston said on the subject, “when we talk about the enterprise, the really easy thing to throw at the cloud is mobile and laptop backup for a couple of reasons. One is you do not want to manage it anyways, so pick a managed service provider, and let them manage it. The other is that cloud backups can run whenever the user has an internet connection rather than just in the office.”
To Preston’s point, when looking for a cloud provider to manage your endpoint backup, there are some things you should be looking for. Though endpoint security is in an evolutionary stage right now, an indicator of an endpoint backup solution with better security is one that is certified compliant with international standards. SOC 1 and ISAE 3000 Type II, for example, assess cloud infrastructure, operations, physical security, firewalls, and more.
In addition to this, in terms of encryption, digital envelope encryption is a solution in which an encryption key is encrypted further by using customer admin credentials. A token is the only thing stored in the cloud, making it more difficult for anyone to gain access to the protected data.
Another important component of a good cloud provider is having a Service Level Agreement that offers automatic data redundancy. With this offering, in the event of a power failure or natural disaster, your data will be unaffected at a separate facility.
With endpoint security continuing to adjust to the changes in the corporate use of mobile devices, endpoint backup is a level of insurance that businesses need. When looking for the right endpoint backup solution for you and your business, take into account what each approach offers, and what your business requires.