< ? php //If there is analytic campaign data, attempt to get the campaign_guid from that cookie if ( 1 === preg_match( '/pk10mkto-([0-9]+)/', $_COOKIE[ '__utmz' ], $match ) ) { $campaign_guid = $match[ 1 ]; } ?>

Back Me Up, Scottie! Protect Mobile Users’ Data

photo-back-me-up-scottie-protect-mobile-users-data
November 21, 2014
Shares

Whether your mobile workforces’ travels take them to the ends of the Earth or Encino, your organization’s sensitive information travels with them on tablets, laptops and phones, as well as between their devices and to and from your business offices. With any luck, their smartphones aren’t among the 113 lost or stolen every minute of the day in the U.S.

Thirty-nine percent of information workers today regularly clock in from multiple locations, and 58 percent use more than one mobile device for work according to Forrester Research, Inc.(1) They need to be productive at any location and on any device, which causes an extreme distribution of data.

This new reality puts a great deal at risk from a data loss or theft perspective. Ruling against data access, however, would be met with much derision, sap productivity, punish creativity and incite mobile workers to seek unauthorized alternatives, which would place your company’s data at even greater risk.

Most organizations have abandoned the idea of protecting the device. Today’s solutions focus on safeguarding the data on mobile devices, or network endpoints as they’ve come to be known. Companies have been more successful supplying sanctioned corporate alternatives, giving rise to a complementary increase in corporate backup solutions, both on-premise and in the cloud.

Cloud-based models are seeing the sharpest increase, however, again according to Forrester.(2)  In 2010, only eight percent of enterprises were using cloud-based endpoint backup. That number grew to 26 percent is just three years.

In reality, many organizations are using both on-premise and cloud solutions … a sort of hybrid solution segmenting users by role or location and selectively protecting data by whichever method can be used to the best advantage. Forrester advises that a cloud solution is more suitable for road warriors and geographically remote offices. This allows users to leverage a provider’s near cloud instance for quicker, non-disruptive backup.

Don’t let security — or a lack of it — hurt your business. This eBook tells you how.

In addition to back-up, leading vendors also integrate file synchronization and sharing into their solutions. Backup protects the mobile user while sync-and-share enable mobile users to be more productive on multiple devices outside the firewall, and safely share with colleagues, partners and customers.

Peak 10’s technology partner for file backup and restore, CommVault, stands out among its competitors by offering a robust, multi-platform solution called Edge. CommVault is one of the very few in the industry to offer backup, synchronization and access capabilities in a solution, and across six platforms, including iOS, Android and Windows Mobile.

Not having endpoint backup is risky business, much like installing a home alarm system after you’ve been robbed. If you already have endpoint backup, consider the age of the solution. Over the past two to three years the world of the mobile worker and the range and sophistication of devices have seen upheaval. Be sure the assumptions you made in choosing an earlier back-up solution are still valid, that it truly meets current day requirements, and that it can continue to adapt to rapid changes that will most certainly come.

 

Fine tune your content search

About Peak 10

"Our values are the foundation for everything we do at Peak 10, and are ultimately what enable us to earn our customers' business and their trust."
David H. Jones,
Board Member, Peak 10 + ViaWest