Regardless of whether your company allows employees to bring their own device or not, chances are you still have devices to manage. The amount of information that flows across devices can be staggering. It’s estimated that corporate endpoint data doubles in size every 14 months. How are you securing your company’s data?

We spoke with the folks at Druva, a company that offers an integrated platform for endpoint backup, secure file sharing, data loss prevention and real-time analytics, to help us better understand how endpoint back up should work. Using their own enterprise mobility product, inSync, as a guide here’s what we learned.

Unify the User Experience

You might not think that endpoint backup and usability design go hand in hand, but you’d be surprised how complicated it can be. Additionally, since the data you’re trying to back up comes directly from the users using it -- endpoint back up is all about the user. If you make it easy for users to back up and sync data, it will get done. With inSync, for example, users can instantly self-deploy the inSync mobile app on any of their devices using just their user ID and password, without requiring IT involvement.

User Experience: What a user sees when they activate inSync on a new or refreshed device.

Backing up data is just part of the solution, however. Accessing the same information needs to be seamless as well. By making it so users can access their data on any device they own (laptops, tablets, etc.) from any mobile device anywhere, anytime, helps to ensure they reap the benefits.

Think about what the end user needs to be productive. That could be automatic back ups, remote deactivation in the event devices are lost or stolen, and data encryption that disables anyone from viewing local device files in clear text without a valid authentication. By incorporating these features into your endpoint back up solution, you can let employees work without worry. 

Empower IT

It can be hard to unify all departments in support of data security. If you design for the end-user, you may not make it easy for IT to deploy or manage it. However, if you design for IT, the end user experience may not be ideal. What can you do? Build from the ground up, says Druva. Designed to be automated, secure and scalable, inSync can be installed and configured in less than 20 minutes, and provides easy definition and management of endpoint policies, saving time and effort for IT.

Empower IT: what the administrator sees in the data loss prevention (dip) add-on console.

Just as you considered how to make the end user more productive, think about what IT needs to be in control. If they’re overseeing a company of hundreds or thousands of employees, make it easy for them to create policies for backup and restore and to apply those policies to groups of users. inSync provides a default user profile out of the box, and administrators can create new user profiles in minutes.

Just because IT is in control, doesn’t mean they have the time to oversee each and every step of the endpoint back up process. With the ability to schedule backups, restore backups automatically, as well as deploy clients to multiple devices (using Active Directory or otherwise) can allow IT teams to be more effective.

Analyze the Data

Sure, backing up your endpoint data is important. But what does it mean? You can learn a lot by analyzing the composition of files across all endpoints to understand current and future trends. For example, by analyzing a company’s activity streams you can discover interesting sharing patterns within the enterprise and gain visibility into the location of sensitive corporate data. Such information can come in handy when implementing social business strategies or executing an eDiscovery search. Having this type of information at your fingertips can save time, money and a lot of wasted energy.

Analytics isn’t just about identifying interesting trends, it’s about maintaining a meaningful experience. Backup for the sake of backup doesn’t make much sense if you’re not trying to make it better so users and management teams feel empowered and more productive. Knowing that they can trust that their information is secure, but also available when they need it is imperative.