dcsimg

Top Five Epic Fails of Enterprise Endpoint Backup

  • Top Five Epic Fails of Enterprise Endpoint Backup-

    Tape-based backup

    Some companies attempt to back up endpoint devices to tape, but this approach has many shortcomings. Tapes are a fragile medium, subject to damage from both heat and light exposure. Doing a full restore may require multiple tapes and it could take days simply waiting for the right tapes to arrive.

    After a failure, the backup is now the only copy of the data. If an organization only writes backups to tape, and for whatever reason the organization can't restore from that tape, it will have lost all of its data.

1 | 2 | 3 | 4 | 5 | 6 | 7

Top Five Epic Fails of Enterprise Endpoint Backup

  • 1 | 2 | 3 | 4 | 5 | 6 | 7
  • Top Five Epic Fails of Enterprise Endpoint Backup-4

    Tape-based backup

    Some companies attempt to back up endpoint devices to tape, but this approach has many shortcomings. Tapes are a fragile medium, subject to damage from both heat and light exposure. Doing a full restore may require multiple tapes and it could take days simply waiting for the right tapes to arrive.

    After a failure, the backup is now the only copy of the data. If an organization only writes backups to tape, and for whatever reason the organization can't restore from that tape, it will have lost all of its data.

Traditionally, "backup" referred to protecting and storing information on a server in an onsite data center. It was a predictable task, and business data lived in a controlled environment that underwent regularly scheduled updates by IT.

Fast forward to today: Enterprises have experienced a major shift in where data lives. Driven by bring your own device (BYOD), the consumerization of IT and a highly mobile workforce, critical enterprise data has moved from the data center to end-user endpoints (and seemingly beyond the reach of IT). The reality is that IT administrators are facing an unpredictable, de-centralized environment in which they have far less control and visibility into what's happening with enterprise data.

Some have made the shift to the edge successfully, while others have not. In this slideshow, endpoint data protection and management provider Code42 outlines five of the most common mistakes and outdated methods associated with protecting endpoint data.