Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Storage

    10 Most Common Endpoint Backup Mistakes: How to Avoid Them

    By
    Chris Preimesberger
    -
    April 17, 2013
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      110 Most Common Endpoint Backup Mistakes: How to Avoid Them

      1

      by Chris Preimesberger

      2Backing Up Only Desktops and Servers

      2

      According to recent studies, an impressive 28 percent of all corporate data is stored exclusively on laptops, smartphones and tablets. The modern workforce is increasingly mobile, so companies that rely solely on desktop backup put more than a quarter of their enterprise data at risk. Only about 35 percent of laptops are backed up, which means a large majority of corporate laptops are vulnerable to data loss.

      3Using Legacy Server Backup Software Repurposed for Devices

      3

      Software such as this only works in highly predictive environments where devices are backed up on a schedule and over a secure high-bandwidth connection. When these legacy server backup systems are repurposed for endpoint backup, they lose effectiveness. Faster, nonintrusive backups, the ability to work over networks without a VPN and flexible, opportunistic scheduling are absolutely critical features for endpoint backup.

      4Believing All Deduplication Products Are Created Equal

      4

      Device-created data is growing exponentially, and bandwidth speeds are not increasing enough to deal with the influx of data. In order to deal with this large gap, companies should look for packages with deduplication technology. These packages eliminate data duplication across all users within the enterprise—duplications that can account for up to 80 percent of an organization’s data.

      5Forgetting About the User Experience

      5

      When the backup process is intrusive, employees tend to skip necessary backup sessions. An effective backup package must include bandwidth and CPU throttling capabilities and WAN optimization to provide end users with a nonintrusive user experience. Backup packages that are unobtrusive ensure that users will not meddle with or disengage the software as it backs up all of their valuable data.

      6Underestimating the Important of Security

      6

      Mobile devices are extremely vulnerable to hackers. The average cost of a data breach on a lost laptop has been calculated to be more than $39,000. The best packages will encrypt data on the device, in transit and at rest on the server, as well as provide remote wipe and geo-locate capabilities as an additional layer of security. The leading endpoint backup packages use sophisticated two-factor encryption mechanisms that prevent even the solution providers themselves from accessing the very data they are backing up.

      7Thinking Short Term and Limited Scalability

      7

      Companies should find a solution that provides scalable storage and the ability to support a geographically distributed organization. Growth is never easy to predict perfectly, and a company that does not use a scalable package risks stagnation or huge costs to upgrade their backup service plan. When a plan is fully scalable and geographically flexible, companies can rest easy knowing that they have predictable budgets and no surprise costs.

      8Not Selecting the Right Deployment Model

      8

      The decision to go with a cloud or on-premises deployment should be based on business factors such as budget, timeline, corporate policies and external compliance regulations. Companies that do not consider these factors risk getting pigeon-holed into a package that does not align with the organization’s IT strategy. Cloud-based solutions offer on-demand scalability and allow shifting of capital expenses to operating expenses. On-premises packages may provide higher performance along with cost advantages from hosting infrastructure behind a corporate firewall.

      9Not Understanding the Total Cost of Ownership

      9

      There are more than merely upfront costs to consider when finding an endpoint data backup package. There is also the opportunity cost of the initial setup time, hardware costs, deployment time and cost of resources to manage the package into the future. If a product boasts of low upfront costs to entice business, it may require weeks of initial setup time and effort. Also, packages that do not support mass client deployment impact both IT and end-user productivity severely, again increasing the total cost of ownership.

      10Not Preparing for Bring Your Own Device (BYOD)

      10

      BYOD allows employees to maximize their productivity and must be taken into consideration despite the numerous challenges it poses in keeping corporate data secure. A worthwhile solution will provide users with mobile apps to access their data while still limiting access to corporate data on BYOD devices.

      11Not Looking Beyond Backup

      11

      Additional integration with data loss prevention tools that enable remote wipe and geo-location for lost or stolen devices can assist IT teams in mitigating risk. With a third-party package, IT can even ensure regulatory compliance by using features such as e-discovery enablement, legal hold and federated search, which are integrated into some efficient endpoint backup products.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×