SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
EXECUTIVE SUMMARY

Cloud Backup for
Endpoint Devices

Icomm  
37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk
According to Gartner, by 2015 more than
60% of enterprises will have suffered
material loss of sensitive corporate data
via mobile devices.

Armed with their own mobile devices and faster
wireless speeds, your employees are looking to
access corporate data on the move. They are creating,
consuming and storing mission-critical business
information on laptops, smartphones and tablets.
Sometimes those devices are corporate-issued,
but often they are using their own personal devices.

Imagine if an employee’s laptop or tablet containing
critical business data was lost or stolen: you could
remotely wipe the device to prevent anyone else from
having access to the information, but what if you’ve
never backed up the data? You too would lose access
to it. And how do you ensure your data and corporate
intellectual property (IP) is protected in this scenario?

As noted by Forrester Research1, in order to avoid
employees operating in an IT underground, you may
be one of many organizations that are developing a
Bring-Your-Own-Device (BYOD)2 policy to address
security concerns. Letting your employees use their
own mobile devices may boost employee morale, but
it also moves sensitive data outside the boundaries of
an enterprise’s data center onto devices that are out
of your control.

If you do not have a policy for backing up the data on
these endpoint devices, there’s a good chance your
employees have been backing up data themselves.
Some might backup data to USB devices, including
external hard drives, and some to unsecure public
cloud services such as iCloud. Others may use
sync and share software. In all cases, you face the
possibility of data being leaked outside your firewall.
Your corporate IP may be residing unprotected on
USBs which can be lost or stolen or might be getting
shared indiscriminately across multiple devices with
people who shouldn’t have access to it.

Even if your organization has implemented policies
to govern applications employees are permitted to
use on mobile devices to access corporate data and
configuring them so their memory can be wiped clean
when required, you still run the risk of losing access
to this data unless it is safely backed up to your
authorized data center.

Not having a policy for backing up endpoint devices
puts your corporate data at risk. To protect yourself
from threats to your competitive advantage, loss of
reputation and regulatory non-compliance, you need a
secure end-to-end data backup and recovery solution
that protects all of your data, including the data
residing on endpoint devices.

¹	 Your workforce is already using their personal computers to boost efficiency. Instead of forcing them to operate in an IT underground, it’s time to develop
a bring-your-own-device (BYOD) program that addresses security concerns while building a solid base for future innovation. – Forrester Research
²	 Bring-your-own-device (BYOD) is an alternative strategy allowing employees, business partners and other users to use a personally selected and
purchased client device to execute enterprise applications and access data. – Gartner Research

Icomm  
37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk
According to MSP Mentor, 52% of
companies offering BYOD placed a
mobile usage policy in place that their
employees must agree to and sign.

Introduction
Thanks to the rampant popularity of tablets and
smartphones, the BYOD phenomenon is not going away.
As employees bring their personal devices to the office
your corporate IP now resides alongside family photos
and personal text messages. Have you ever wondered
what happens to your data when an employee leaves
your organization? What if the device is lost and gets
into the hands of someone who should not have access
to this information?
To protect unauthorized access and loss of corporate
data, you can obtain the consent of employees to wipe
the device of all data in the event of device loss or theft.
This is something your service provider can enable on any
devices employees use to access corporate data. However,
once you wipe the data, no one has access to it anymore –
including you.
Most organizations do not have a policy for backing up
data sitting on endpoint devices. So many employees
have been using their own methods to makes copies of
corporate data they consume and create, including USB
devices and sync and share software, but these methods
are not secure. They also move corporate data out of your
control, potentially putting corporate IP into the hands
of people who should not have access to this confidential
data. Imagine if your competition gets its hands on
sensitive information or if it reaches the media. Think of
instances where highly sensitive corporate information in
heavily regulated sectors such as healthcare and financial
services is leaked. Your business may just come to an end
and you may be left facing legal consequences.

Icomm  
37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk

The Risk of Leaving Endpoint
Data Unprotected
Business decision makers understand the need for
safeguarding data on these devices in the same way they
protect all on-premise data that resides on your LAN,
but you may be holding off enabling this much needed
protection because of resistance from your employees.
For example, mobile workers who connect infrequently to
your enterprise network may oppose the installation of any
backup software on their laptops because they worry that
time-consuming backup jobs will impact the performance
of their machines. When it comes to personal devices,
including smartphones, end users are wary of installing
any applications provided by corporate IT. After all, they
contend, it is their device and so they have the right
to refuse to install any software that may harm their
smartphone.
IT managers may be tempted to look the other way when
it comes to backing up endpoint devices because it might
increase bandwidth use and lead to clogged networks
when mobile devices hop back on to corporate networks
after a long time and time-consuming backup jobs kick in.
They may also be concerned that managing the backup
of these devices will need special tools and strategies to
support the wide array of devices employees are bringing
into the corporate environment, leading to additional costs
and the need for completely new service providers and
investments in new infrastructure.
Whatever your reasons, not implementing a policy for
backing up the data on these devices can leave you
exposed to the threat of losing confidential information
and the consequences of data loss.
Figure 1: Asigra supports the backup and restore on a wide
range of endpoint devices and operating systems

Complete Endpoint Device Backup
Powered by Asigra
Our cloud backup solution powered by Asigra provides
organizations with a single solution to protect all data
in the enterprise, no matter where it resides, including
mobile endpoints. We can backup data and applications
from any device that holds your organization’s confidential
information. From enterprise servers to physical
and virtual machines to desktops, laptops, tablets,
smartphones and cloud-based applications, our cloud
backup service can backup all data seamlessly to your
own authorized, secure offsite data center.

Comprehensive OS support
The BYOD world is full of aficionados who swear by
particular operating systems and device brands, so we
understand that any solution to protect data on these
endpoints must be broad-based and include support for
multiple operating systems and platforms. Our cloud
backup service is hardware and software independent
and supports all major operating systems. Whether your
desktop or laptop users run Windows, Linux, or Mac
OS, our solution can protect the data on their PCs. It can

Icomm  
37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk

also protect Apple iOS and Android devices, thereby
supporting the majority of tablets and smartphones
found in corporate environments today, whether they
are personal devices brought into the organization by
employees or issued by the company.

Bandwidth and storage optimized backups
Our cloud backup service uses incremental forever
functionality to make sure only changed files are sent over
the network to the backup repository. In addition, all data
is deduplicated and compressed before it is transmitted,
thereby ensuring efficient use of your bandwidth. Our
cloud backup solution also performs deduplication at the
target to efficiently store your data in our secure offsite
data center.

Secure backups
Our cloud backup service powered by Asigra encrypts
your data at the source and during transmission to the
backup repository using secure AES encryption to encode
the information to prevent unauthorized access during
the backup and restore processes and when it is stored in
backup repositories.
Intuitive and easy to use
We can configure your backups to run according to your
preferences to ensure your data is backed up at regular
intervals and that it is always protected. Our cloud backup
application lets employees run backup and restore jobs on
their devices if necessary, using a simple and user-friendly
interface.

Certified Endpoint Backup Apps available
for download
The Asigra Cloud Backup application for tablets and
smartphones that powers our cloud backup service is
available for download from the Apple App Store and
from Google Play, so your employees can download it for
free. This helps you overcome their objections about not
wanting to install a suspect custom application on their
personal devices.

For more information on our cloud backup services for endpoint devices or
to schedule a complimentary Recoverability Assessment contact us today.
About Asigra Cloud Backup
Award-winning Asigra Cloud Backup is an agentless hardware-and-software platform agnostic
cloud backup, recovery and restore software solution that supports servers, virtual machines,
desktops, laptops, tablets, smartphones, cloud-based applications, enterprise applications and
databases enabling organizations to resume business operations quickly while reducing costs
and achieving peace of mind.

Icomm  
37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk
© 2012 Asigra, the Asigra logo and Asigra Cloud Backup are trademarks of Asigra Inc. All other product and company names are trademarks or registered trademarks of their respective owners.

Contenu connexe

Tendances

The Industrialist: Sparks
The Industrialist: SparksThe Industrialist: Sparks
The Industrialist: Sparksaccenture
 
Harnessing potential of artificial intelligence in energy & oil and gas
Harnessing potential of artificial intelligence in energy & oil and gasHarnessing potential of artificial intelligence in energy & oil and gas
Harnessing potential of artificial intelligence in energy & oil and gasCANOPY ONE SOLUTIONS
 
IoT in aircraft manufacturing-tech m
IoT in aircraft manufacturing-tech mIoT in aircraft manufacturing-tech m
IoT in aircraft manufacturing-tech mAshutosh Pandey
 
Internet of Industrial Things Presentation - Sophie Peachey - IoT Midlands Me...
Internet of Industrial Things Presentation - Sophie Peachey - IoT Midlands Me...Internet of Industrial Things Presentation - Sophie Peachey - IoT Midlands Me...
Internet of Industrial Things Presentation - Sophie Peachey - IoT Midlands Me...WMG, University of Warwick
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 publishedDSCI_Connect
 
Digital Transformation in the Lab
Digital Transformation in the LabDigital Transformation in the Lab
Digital Transformation in the Labaccenture
 
Emerging industry trends
Emerging industry trendsEmerging industry trends
Emerging industry trendsBob Prieto
 
Ibm cloud and IOT industry
Ibm cloud and IOT industryIbm cloud and IOT industry
Ibm cloud and IOT industryMike Chang
 
Artificial Intelligence In Automotive Industry: Surprisingly Slow Uptake And ...
Artificial Intelligence In Automotive Industry: Surprisingly Slow Uptake And ...Artificial Intelligence In Automotive Industry: Surprisingly Slow Uptake And ...
Artificial Intelligence In Automotive Industry: Surprisingly Slow Uptake And ...Bernard Marr
 
The Internet of Flying Things - Part 2
The Internet of Flying Things - Part 2The Internet of Flying Things - Part 2
The Internet of Flying Things - Part 2Michael Denis
 
Data Science at Roche: From Exploration to Productionization - Frank Block
Data Science at Roche: From Exploration to Productionization - Frank BlockData Science at Roche: From Exploration to Productionization - Frank Block
Data Science at Roche: From Exploration to Productionization - Frank BlockRising Media Ltd.
 
mAutomotive - Every Car Connected
mAutomotive - Every Car ConnectedmAutomotive - Every Car Connected
mAutomotive - Every Car ConnectedDao Phuong Nam
 
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Rahul Neel Mani
 
Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017Ian Beckett
 
Mobile Convention Amsterdam 2014 - GE - Peter van der Fluit
Mobile Convention Amsterdam 2014 - GE - Peter van der FluitMobile Convention Amsterdam 2014 - GE - Peter van der Fluit
Mobile Convention Amsterdam 2014 - GE - Peter van der FluitMobile Convention Amsterdam 2015
 
Digital Transformation in the Manufacturing sector
Digital Transformation in the Manufacturing sectorDigital Transformation in the Manufacturing sector
Digital Transformation in the Manufacturing sectorArun Natarajan
 
IoT customer centric smart applications offered by utility companies
IoT customer centric smart applications offered by utility companiesIoT customer centric smart applications offered by utility companies
IoT customer centric smart applications offered by utility companiesRaj Anand
 
Digital Twin Market by Type, Application, Technology and Region: Global Indus...
Digital Twin Market by Type, Application, Technology and Region: Global Indus...Digital Twin Market by Type, Application, Technology and Region: Global Indus...
Digital Twin Market by Type, Application, Technology and Region: Global Indus...ReportCruxMarketRese
 

Tendances (20)

The Industrialist: Sparks
The Industrialist: SparksThe Industrialist: Sparks
The Industrialist: Sparks
 
Harnessing potential of artificial intelligence in energy & oil and gas
Harnessing potential of artificial intelligence in energy & oil and gasHarnessing potential of artificial intelligence in energy & oil and gas
Harnessing potential of artificial intelligence in energy & oil and gas
 
IoT in aircraft manufacturing-tech m
IoT in aircraft manufacturing-tech mIoT in aircraft manufacturing-tech m
IoT in aircraft manufacturing-tech m
 
Internet of Industrial Things Presentation - Sophie Peachey - IoT Midlands Me...
Internet of Industrial Things Presentation - Sophie Peachey - IoT Midlands Me...Internet of Industrial Things Presentation - Sophie Peachey - IoT Midlands Me...
Internet of Industrial Things Presentation - Sophie Peachey - IoT Midlands Me...
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 published
 
Digital Transformation in the Lab
Digital Transformation in the LabDigital Transformation in the Lab
Digital Transformation in the Lab
 
Emerging industry trends
Emerging industry trendsEmerging industry trends
Emerging industry trends
 
IoT Aerospace
IoT AerospaceIoT Aerospace
IoT Aerospace
 
Ibm cloud and IOT industry
Ibm cloud and IOT industryIbm cloud and IOT industry
Ibm cloud and IOT industry
 
Wind Riverpost - Company Profile
Wind Riverpost - Company ProfileWind Riverpost - Company Profile
Wind Riverpost - Company Profile
 
Artificial Intelligence In Automotive Industry: Surprisingly Slow Uptake And ...
Artificial Intelligence In Automotive Industry: Surprisingly Slow Uptake And ...Artificial Intelligence In Automotive Industry: Surprisingly Slow Uptake And ...
Artificial Intelligence In Automotive Industry: Surprisingly Slow Uptake And ...
 
The Internet of Flying Things - Part 2
The Internet of Flying Things - Part 2The Internet of Flying Things - Part 2
The Internet of Flying Things - Part 2
 
Data Science at Roche: From Exploration to Productionization - Frank Block
Data Science at Roche: From Exploration to Productionization - Frank BlockData Science at Roche: From Exploration to Productionization - Frank Block
Data Science at Roche: From Exploration to Productionization - Frank Block
 
mAutomotive - Every Car Connected
mAutomotive - Every Car ConnectedmAutomotive - Every Car Connected
mAutomotive - Every Car Connected
 
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
 
Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017
 
Mobile Convention Amsterdam 2014 - GE - Peter van der Fluit
Mobile Convention Amsterdam 2014 - GE - Peter van der FluitMobile Convention Amsterdam 2014 - GE - Peter van der Fluit
Mobile Convention Amsterdam 2014 - GE - Peter van der Fluit
 
Digital Transformation in the Manufacturing sector
Digital Transformation in the Manufacturing sectorDigital Transformation in the Manufacturing sector
Digital Transformation in the Manufacturing sector
 
IoT customer centric smart applications offered by utility companies
IoT customer centric smart applications offered by utility companiesIoT customer centric smart applications offered by utility companies
IoT customer centric smart applications offered by utility companies
 
Digital Twin Market by Type, Application, Technology and Region: Global Indus...
Digital Twin Market by Type, Application, Technology and Region: Global Indus...Digital Twin Market by Type, Application, Technology and Region: Global Indus...
Digital Twin Market by Type, Application, Technology and Region: Global Indus...
 

Similaire à Cloud backup-for-endpoint-devices

Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Securitynexxtep
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19Dharmendra Rama
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutionsFuji Xerox Singapore
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's GuideReece Gaumont
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfTuring.com
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What? Array Networks
 

Similaire à Cloud backup-for-endpoint-devices (20)

Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's Guide
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What?
 

Plus de Icomm Technologies

The truth behind cyber attacks
The truth behind cyber attacks The truth behind cyber attacks
The truth behind cyber attacks Icomm Technologies
 
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost StuctureIcomm Technologies
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceIcomm Technologies
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.Icomm Technologies
 
Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365Icomm Technologies
 
Top 10 Trends in Telecommuting
Top 10 Trends in TelecommutingTop 10 Trends in Telecommuting
Top 10 Trends in TelecommutingIcomm Technologies
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksIcomm Technologies
 
Tackling consumerization of it
Tackling consumerization of it Tackling consumerization of it
Tackling consumerization of it Icomm Technologies
 
Office 365-technical-overview-deck
Office 365-technical-overview-deckOffice 365-technical-overview-deck
Office 365-technical-overview-deckIcomm Technologies
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm Technologies
 
Efficiently protect-virtual-machines
Efficiently protect-virtual-machinesEfficiently protect-virtual-machines
Efficiently protect-virtual-machinesIcomm Technologies
 

Plus de Icomm Technologies (20)

The truth behind cyber attacks
The truth behind cyber attacks The truth behind cyber attacks
The truth behind cyber attacks
 
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
 
Anatomy of a cyber-attack
Anatomy of a cyber-attackAnatomy of a cyber-attack
Anatomy of a cyber-attack
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
 
Swivel Secure and Office 365
Swivel Secure and Office 365Swivel Secure and Office 365
Swivel Secure and Office 365
 
Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Top 10 Trends in Telecommuting
Top 10 Trends in TelecommutingTop 10 Trends in Telecommuting
Top 10 Trends in Telecommuting
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Tackling consumerization of it
Tackling consumerization of it Tackling consumerization of it
Tackling consumerization of it
 
Office 365-technical-overview-deck
Office 365-technical-overview-deckOffice 365-technical-overview-deck
Office 365-technical-overview-deck
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paper
 
Icomm cloud-backup-overview
Icomm cloud-backup-overviewIcomm cloud-backup-overview
Icomm cloud-backup-overview
 
Icomm agentless-architecture
Icomm agentless-architectureIcomm agentless-architecture
Icomm agentless-architecture
 
Efficiently protect-virtual-machines
Efficiently protect-virtual-machinesEfficiently protect-virtual-machines
Efficiently protect-virtual-machines
 

Dernier

Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingNauman Safdar
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...pujan9679
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateCannaBusinessPlans
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Availablepr788182
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 

Dernier (20)

Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 

Cloud backup-for-endpoint-devices

  • 1. EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices Icomm   37­55 Camden Street, Birmingham,  B1 3BP United Kingdom T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk
  • 2. According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with their own mobile devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating, consuming and storing mission-critical business information on laptops, smartphones and tablets. Sometimes those devices are corporate-issued, but often they are using their own personal devices. Imagine if an employee’s laptop or tablet containing critical business data was lost or stolen: you could remotely wipe the device to prevent anyone else from having access to the information, but what if you’ve never backed up the data? You too would lose access to it. And how do you ensure your data and corporate intellectual property (IP) is protected in this scenario? As noted by Forrester Research1, in order to avoid employees operating in an IT underground, you may be one of many organizations that are developing a Bring-Your-Own-Device (BYOD)2 policy to address security concerns. Letting your employees use their own mobile devices may boost employee morale, but it also moves sensitive data outside the boundaries of an enterprise’s data center onto devices that are out of your control. If you do not have a policy for backing up the data on these endpoint devices, there’s a good chance your employees have been backing up data themselves. Some might backup data to USB devices, including external hard drives, and some to unsecure public cloud services such as iCloud. Others may use sync and share software. In all cases, you face the possibility of data being leaked outside your firewall. Your corporate IP may be residing unprotected on USBs which can be lost or stolen or might be getting shared indiscriminately across multiple devices with people who shouldn’t have access to it. Even if your organization has implemented policies to govern applications employees are permitted to use on mobile devices to access corporate data and configuring them so their memory can be wiped clean when required, you still run the risk of losing access to this data unless it is safely backed up to your authorized data center. Not having a policy for backing up endpoint devices puts your corporate data at risk. To protect yourself from threats to your competitive advantage, loss of reputation and regulatory non-compliance, you need a secure end-to-end data backup and recovery solution that protects all of your data, including the data residing on endpoint devices. ¹ Your workforce is already using their personal computers to boost efficiency. Instead of forcing them to operate in an IT underground, it’s time to develop a bring-your-own-device (BYOD) program that addresses security concerns while building a solid base for future innovation. – Forrester Research ² Bring-your-own-device (BYOD) is an alternative strategy allowing employees, business partners and other users to use a personally selected and purchased client device to execute enterprise applications and access data. – Gartner Research Icomm   37­55 Camden Street, Birmingham,  B1 3BP United Kingdom T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk
  • 3. According to MSP Mentor, 52% of companies offering BYOD placed a mobile usage policy in place that their employees must agree to and sign. Introduction Thanks to the rampant popularity of tablets and smartphones, the BYOD phenomenon is not going away. As employees bring their personal devices to the office your corporate IP now resides alongside family photos and personal text messages. Have you ever wondered what happens to your data when an employee leaves your organization? What if the device is lost and gets into the hands of someone who should not have access to this information? To protect unauthorized access and loss of corporate data, you can obtain the consent of employees to wipe the device of all data in the event of device loss or theft. This is something your service provider can enable on any devices employees use to access corporate data. However, once you wipe the data, no one has access to it anymore – including you. Most organizations do not have a policy for backing up data sitting on endpoint devices. So many employees have been using their own methods to makes copies of corporate data they consume and create, including USB devices and sync and share software, but these methods are not secure. They also move corporate data out of your control, potentially putting corporate IP into the hands of people who should not have access to this confidential data. Imagine if your competition gets its hands on sensitive information or if it reaches the media. Think of instances where highly sensitive corporate information in heavily regulated sectors such as healthcare and financial services is leaked. Your business may just come to an end and you may be left facing legal consequences. Icomm   37­55 Camden Street, Birmingham,  B1 3BP United Kingdom T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk The Risk of Leaving Endpoint Data Unprotected Business decision makers understand the need for safeguarding data on these devices in the same way they protect all on-premise data that resides on your LAN, but you may be holding off enabling this much needed protection because of resistance from your employees. For example, mobile workers who connect infrequently to your enterprise network may oppose the installation of any backup software on their laptops because they worry that time-consuming backup jobs will impact the performance of their machines. When it comes to personal devices, including smartphones, end users are wary of installing any applications provided by corporate IT. After all, they contend, it is their device and so they have the right to refuse to install any software that may harm their smartphone. IT managers may be tempted to look the other way when it comes to backing up endpoint devices because it might increase bandwidth use and lead to clogged networks when mobile devices hop back on to corporate networks after a long time and time-consuming backup jobs kick in. They may also be concerned that managing the backup of these devices will need special tools and strategies to support the wide array of devices employees are bringing into the corporate environment, leading to additional costs and the need for completely new service providers and investments in new infrastructure. Whatever your reasons, not implementing a policy for backing up the data on these devices can leave you exposed to the threat of losing confidential information and the consequences of data loss.
  • 4. Figure 1: Asigra supports the backup and restore on a wide range of endpoint devices and operating systems Complete Endpoint Device Backup Powered by Asigra Our cloud backup solution powered by Asigra provides organizations with a single solution to protect all data in the enterprise, no matter where it resides, including mobile endpoints. We can backup data and applications from any device that holds your organization’s confidential information. From enterprise servers to physical and virtual machines to desktops, laptops, tablets, smartphones and cloud-based applications, our cloud backup service can backup all data seamlessly to your own authorized, secure offsite data center. Comprehensive OS support The BYOD world is full of aficionados who swear by particular operating systems and device brands, so we understand that any solution to protect data on these endpoints must be broad-based and include support for multiple operating systems and platforms. Our cloud backup service is hardware and software independent and supports all major operating systems. Whether your desktop or laptop users run Windows, Linux, or Mac OS, our solution can protect the data on their PCs. It can Icomm   37­55 Camden Street, Birmingham,  B1 3BP United Kingdom T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk also protect Apple iOS and Android devices, thereby supporting the majority of tablets and smartphones found in corporate environments today, whether they are personal devices brought into the organization by employees or issued by the company. Bandwidth and storage optimized backups Our cloud backup service uses incremental forever functionality to make sure only changed files are sent over the network to the backup repository. In addition, all data is deduplicated and compressed before it is transmitted, thereby ensuring efficient use of your bandwidth. Our cloud backup solution also performs deduplication at the target to efficiently store your data in our secure offsite data center. Secure backups Our cloud backup service powered by Asigra encrypts your data at the source and during transmission to the backup repository using secure AES encryption to encode the information to prevent unauthorized access during the backup and restore processes and when it is stored in backup repositories.
  • 5. Intuitive and easy to use We can configure your backups to run according to your preferences to ensure your data is backed up at regular intervals and that it is always protected. Our cloud backup application lets employees run backup and restore jobs on their devices if necessary, using a simple and user-friendly interface. Certified Endpoint Backup Apps available for download The Asigra Cloud Backup application for tablets and smartphones that powers our cloud backup service is available for download from the Apple App Store and from Google Play, so your employees can download it for free. This helps you overcome their objections about not wanting to install a suspect custom application on their personal devices. For more information on our cloud backup services for endpoint devices or to schedule a complimentary Recoverability Assessment contact us today. About Asigra Cloud Backup Award-winning Asigra Cloud Backup is an agentless hardware-and-software platform agnostic cloud backup, recovery and restore software solution that supports servers, virtual machines, desktops, laptops, tablets, smartphones, cloud-based applications, enterprise applications and databases enabling organizations to resume business operations quickly while reducing costs and achieving peace of mind. Icomm   37­55 Camden Street, Birmingham,  B1 3BP United Kingdom T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk © 2012 Asigra, the Asigra logo and Asigra Cloud Backup are trademarks of Asigra Inc. All other product and company names are trademarks or registered trademarks of their respective owners.