Premium Content

Access "Dealing with today's endpoint data protection challenges"

Jason Buffington - Senior Analyst
This chapter is included in the "Overcome today's disaster recovery challenges" E-Book.

Sponsored by

The decentralization of data among endpoint devices has been a game-changer for IT professionals. After decades of delivering consolidated infrastructure platforms, i.e., servers, there has been an increased distribution of data as end users demand enhanced flexibility in the devices they are using in the workplace. Don't confuse endpoint and BYOD -- today's endpoint devices include self-purchased, bring-your-own-device units, but also an immeasurable number of corporate-issued devices.

This e-book will look at the challenges of legacy endpoint mechanisms, why endpoint data protection is more important than protecting the device itself, and the two mandates to ensure successful endpoint data protection: lightweight delivery and management that is highly visible. It will also examine why the endpoint data protection mechanism must give the employee and employer access to needed data.  Access >>>

About the Author

Jason Buffington - Senior Analyst

Jason Buffington, a senior analyst for the Enterprise Strategy ... Read More

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Access Other Available Chapters

More Premium Content Accessible For Free

  • How disaster recovery in the cloud impacts IT modernization

    When discussing the modernization of IT, the conversation usually begins with the cloud. Even when it doesn't start with the cloud, the dialogue ...

  • Modernizing data center protection

    Today's workforce is increasingly mobile and BYOD has taken hold in many organizations. The use of devices not connected to a local network is a ...

  • Overcome today's disaster recovery challenges

    The use of devices not connected to a local network is a challenge for IT staffs tasked with protecting data on those devices. Completing backups ...