SlideShare a Scribd company logo
EXECUTIVE SUMMARY

Cloud Backup for
Endpoint Devices

Icomm  
37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk
According to Gartner, by 2015 more than
60% of enterprises will have suffered
material loss of sensitive corporate data
via mobile devices.

Armed with their own mobile devices and faster
wireless speeds, your employees are looking to
access corporate data on the move. They are creating,
consuming and storing mission-critical business
information on laptops, smartphones and tablets.
Sometimes those devices are corporate-issued,
but often they are using their own personal devices.

Imagine if an employee’s laptop or tablet containing
critical business data was lost or stolen: you could
remotely wipe the device to prevent anyone else from
having access to the information, but what if you’ve
never backed up the data? You too would lose access
to it. And how do you ensure your data and corporate
intellectual property (IP) is protected in this scenario?

As noted by Forrester Research1, in order to avoid
employees operating in an IT underground, you may
be one of many organizations that are developing a
Bring-Your-Own-Device (BYOD)2 policy to address
security concerns. Letting your employees use their
own mobile devices may boost employee morale, but
it also moves sensitive data outside the boundaries of
an enterprise’s data center onto devices that are out
of your control.

If you do not have a policy for backing up the data on
these endpoint devices, there’s a good chance your
employees have been backing up data themselves.
Some might backup data to USB devices, including
external hard drives, and some to unsecure public
cloud services such as iCloud. Others may use
sync and share software. In all cases, you face the
possibility of data being leaked outside your firewall.
Your corporate IP may be residing unprotected on
USBs which can be lost or stolen or might be getting
shared indiscriminately across multiple devices with
people who shouldn’t have access to it.

Even if your organization has implemented policies
to govern applications employees are permitted to
use on mobile devices to access corporate data and
configuring them so their memory can be wiped clean
when required, you still run the risk of losing access
to this data unless it is safely backed up to your
authorized data center.

Not having a policy for backing up endpoint devices
puts your corporate data at risk. To protect yourself
from threats to your competitive advantage, loss of
reputation and regulatory non-compliance, you need a
secure end-to-end data backup and recovery solution
that protects all of your data, including the data
residing on endpoint devices.

¹	 Your workforce is already using their personal computers to boost efficiency. Instead of forcing them to operate in an IT underground, it’s time to develop
a bring-your-own-device (BYOD) program that addresses security concerns while building a solid base for future innovation. – Forrester Research
²	 Bring-your-own-device (BYOD) is an alternative strategy allowing employees, business partners and other users to use a personally selected and
purchased client device to execute enterprise applications and access data. – Gartner Research

Icomm  
37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk
According to MSP Mentor, 52% of
companies offering BYOD placed a
mobile usage policy in place that their
employees must agree to and sign.

Introduction
Thanks to the rampant popularity of tablets and
smartphones, the BYOD phenomenon is not going away.
As employees bring their personal devices to the office
your corporate IP now resides alongside family photos
and personal text messages. Have you ever wondered
what happens to your data when an employee leaves
your organization? What if the device is lost and gets
into the hands of someone who should not have access
to this information?
To protect unauthorized access and loss of corporate
data, you can obtain the consent of employees to wipe
the device of all data in the event of device loss or theft.
This is something your service provider can enable on any
devices employees use to access corporate data. However,
once you wipe the data, no one has access to it anymore –
including you.
Most organizations do not have a policy for backing up
data sitting on endpoint devices. So many employees
have been using their own methods to makes copies of
corporate data they consume and create, including USB
devices and sync and share software, but these methods
are not secure. They also move corporate data out of your
control, potentially putting corporate IP into the hands
of people who should not have access to this confidential
data. Imagine if your competition gets its hands on
sensitive information or if it reaches the media. Think of
instances where highly sensitive corporate information in
heavily regulated sectors such as healthcare and financial
services is leaked. Your business may just come to an end
and you may be left facing legal consequences.

Icomm  
37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk

The Risk of Leaving Endpoint
Data Unprotected
Business decision makers understand the need for
safeguarding data on these devices in the same way they
protect all on-premise data that resides on your LAN,
but you may be holding off enabling this much needed
protection because of resistance from your employees.
For example, mobile workers who connect infrequently to
your enterprise network may oppose the installation of any
backup software on their laptops because they worry that
time-consuming backup jobs will impact the performance
of their machines. When it comes to personal devices,
including smartphones, end users are wary of installing
any applications provided by corporate IT. After all, they
contend, it is their device and so they have the right
to refuse to install any software that may harm their
smartphone.
IT managers may be tempted to look the other way when
it comes to backing up endpoint devices because it might
increase bandwidth use and lead to clogged networks
when mobile devices hop back on to corporate networks
after a long time and time-consuming backup jobs kick in.
They may also be concerned that managing the backup
of these devices will need special tools and strategies to
support the wide array of devices employees are bringing
into the corporate environment, leading to additional costs
and the need for completely new service providers and
investments in new infrastructure.
Whatever your reasons, not implementing a policy for
backing up the data on these devices can leave you
exposed to the threat of losing confidential information
and the consequences of data loss.
Figure 1: Asigra supports the backup and restore on a wide
range of endpoint devices and operating systems

Complete Endpoint Device Backup
Powered by Asigra
Our cloud backup solution powered by Asigra provides
organizations with a single solution to protect all data
in the enterprise, no matter where it resides, including
mobile endpoints. We can backup data and applications
from any device that holds your organization’s confidential
information. From enterprise servers to physical
and virtual machines to desktops, laptops, tablets,
smartphones and cloud-based applications, our cloud
backup service can backup all data seamlessly to your
own authorized, secure offsite data center.

Comprehensive OS support
The BYOD world is full of aficionados who swear by
particular operating systems and device brands, so we
understand that any solution to protect data on these
endpoints must be broad-based and include support for
multiple operating systems and platforms. Our cloud
backup service is hardware and software independent
and supports all major operating systems. Whether your
desktop or laptop users run Windows, Linux, or Mac
OS, our solution can protect the data on their PCs. It can

Icomm  
37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk

also protect Apple iOS and Android devices, thereby
supporting the majority of tablets and smartphones
found in corporate environments today, whether they
are personal devices brought into the organization by
employees or issued by the company.

Bandwidth and storage optimized backups
Our cloud backup service uses incremental forever
functionality to make sure only changed files are sent over
the network to the backup repository. In addition, all data
is deduplicated and compressed before it is transmitted,
thereby ensuring efficient use of your bandwidth. Our
cloud backup solution also performs deduplication at the
target to efficiently store your data in our secure offsite
data center.

Secure backups
Our cloud backup service powered by Asigra encrypts
your data at the source and during transmission to the
backup repository using secure AES encryption to encode
the information to prevent unauthorized access during
the backup and restore processes and when it is stored in
backup repositories.
Intuitive and easy to use
We can configure your backups to run according to your
preferences to ensure your data is backed up at regular
intervals and that it is always protected. Our cloud backup
application lets employees run backup and restore jobs on
their devices if necessary, using a simple and user-friendly
interface.

Certified Endpoint Backup Apps available
for download
The Asigra Cloud Backup application for tablets and
smartphones that powers our cloud backup service is
available for download from the Apple App Store and
from Google Play, so your employees can download it for
free. This helps you overcome their objections about not
wanting to install a suspect custom application on their
personal devices.

For more information on our cloud backup services for endpoint devices or
to schedule a complimentary Recoverability Assessment contact us today.
About Asigra Cloud Backup
Award-winning Asigra Cloud Backup is an agentless hardware-and-software platform agnostic
cloud backup, recovery and restore software solution that supports servers, virtual machines,
desktops, laptops, tablets, smartphones, cloud-based applications, enterprise applications and
databases enabling organizations to resume business operations quickly while reducing costs
and achieving peace of mind.

Icomm  
37­55 Camden Street, Birmingham,  B1 3BP United Kingdom
T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk
© 2012 Asigra, the Asigra logo and Asigra Cloud Backup are trademarks of Asigra Inc. All other product and company names are trademarks or registered trademarks of their respective owners.

More Related Content

PDF
Energy industry challenges
PDF
The Industrialist: Sparks
PDF
TRENDS: What You Need To Know From NAIAS 2012
PDF
The Industrialist: Trends & innovations - Nov 2021
PDF
The Industrialist: Sparks
PDF
An electric future is a resilient one
PDF
Sparks: Innovation in Action
PDF
2015 Company Profile
Energy industry challenges
The Industrialist: Sparks
TRENDS: What You Need To Know From NAIAS 2012
The Industrialist: Trends & innovations - Nov 2021
The Industrialist: Sparks
An electric future is a resilient one
Sparks: Innovation in Action
2015 Company Profile

What's hot (20)

PDF
The Industrialist: Sparks
PDF
Harnessing potential of artificial intelligence in energy & oil and gas
PDF
IoT in aircraft manufacturing-tech m
PDF
Internet of Industrial Things Presentation - Sophie Peachey - IoT Midlands Me...
PDF
Event report 2014 published
PDF
Digital Transformation in the Lab
PDF
Emerging industry trends
PDF
IoT Aerospace
PDF
Ibm cloud and IOT industry
PDF
Wind Riverpost - Company Profile
PPTX
Artificial Intelligence In Automotive Industry: Surprisingly Slow Uptake And ...
PDF
The Internet of Flying Things - Part 2
PDF
Data Science at Roche: From Exploration to Productionization - Frank Block
PDF
mAutomotive - Every Car Connected
PPTX
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
PDF
Industrial internet of things (IIOT) - special report-2017
PPTX
Mobile Convention Amsterdam 2014 - GE - Peter van der Fluit
PDF
Digital Transformation in the Manufacturing sector
PPTX
IoT customer centric smart applications offered by utility companies
PPTX
Digital Twin Market by Type, Application, Technology and Region: Global Indus...
The Industrialist: Sparks
Harnessing potential of artificial intelligence in energy & oil and gas
IoT in aircraft manufacturing-tech m
Internet of Industrial Things Presentation - Sophie Peachey - IoT Midlands Me...
Event report 2014 published
Digital Transformation in the Lab
Emerging industry trends
IoT Aerospace
Ibm cloud and IOT industry
Wind Riverpost - Company Profile
Artificial Intelligence In Automotive Industry: Surprisingly Slow Uptake And ...
The Internet of Flying Things - Part 2
Data Science at Roche: From Exploration to Productionization - Frank Block
mAutomotive - Every Car Connected
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Industrial internet of things (IIOT) - special report-2017
Mobile Convention Amsterdam 2014 - GE - Peter van der Fluit
Digital Transformation in the Manufacturing sector
IoT customer centric smart applications offered by utility companies
Digital Twin Market by Type, Application, Technology and Region: Global Indus...
Ad

Similar to Cloud backup-for-endpoint-devices (20)

PDF
PDF
6 Ways to Fight the Data Loss Gremlins
PDF
Backing up Android and iOs devices
PDF
Icomm cloud-backup-overview
PPTX
Make the Upgrade: Data protection in the cloud
PDF
DLP and MDM Datasheet
PDF
Safeguard Your Business
PDF
5 Enterprise Mobility Management nightmares
PDF
Why You Need Enterprise Backup
PPTX
Webinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection
PDF
How to secure your enterprise data during Covid-19
PDF
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
PDF
Is Your Network Ready for BYOD?
PDF
Mobile device management-Desktop Central
PDF
Soonr IT Buyer's Guide
PDF
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
PDF
Security that works
PDF
Closing the gaps in enterprise data security: A model for 360 degrees protection
PDF
Mobile device management key components
PDF
Ajax World West I Phone Summit
6 Ways to Fight the Data Loss Gremlins
Backing up Android and iOs devices
Icomm cloud-backup-overview
Make the Upgrade: Data protection in the cloud
DLP and MDM Datasheet
Safeguard Your Business
5 Enterprise Mobility Management nightmares
Why You Need Enterprise Backup
Webinar: Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection
How to secure your enterprise data during Covid-19
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
Is Your Network Ready for BYOD?
Mobile device management-Desktop Central
Soonr IT Buyer's Guide
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Security that works
Closing the gaps in enterprise data security: A model for 360 degrees protection
Mobile device management key components
Ajax World West I Phone Summit
Ad

More from Icomm Technologies (20)

PDF
The truth behind cyber attacks
PDF
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
PDF
Anatomy of a cyber-attack
PDF
Disaster Recovery
PPSX
Disaster Recovery
PDF
The sonic wall clean vpn approach for the mobile work force
PDF
Mobility, Security and the Enterprise: The Equation to Solve
PDF
The only authentication platform you’ll ever need.
PDF
Swivel Secure and Office 365
PDF
Swivel Secure, ADFS and Office 365
PPS
Securing the Cloud
PDF
Top 10 Trends in Telecommuting
PDF
Controlling Laptop and Smartphone Access to Corporate Networks
PDF
IT Security Trends in 2012
PDF
Tackling consumerization of it
PPSX
Office 365-technical-overview-deck
PDF
Icomm virtualisation-support-white-paper
PDF
Icomm agentless-architecture
PDF
Efficiently protect-virtual-machines
PDF
Beakbane safeguards future with ERP - ready infrastructure upgrade.
The truth behind cyber attacks
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
Anatomy of a cyber-attack
Disaster Recovery
Disaster Recovery
The sonic wall clean vpn approach for the mobile work force
Mobility, Security and the Enterprise: The Equation to Solve
The only authentication platform you’ll ever need.
Swivel Secure and Office 365
Swivel Secure, ADFS and Office 365
Securing the Cloud
Top 10 Trends in Telecommuting
Controlling Laptop and Smartphone Access to Corporate Networks
IT Security Trends in 2012
Tackling consumerization of it
Office 365-technical-overview-deck
Icomm virtualisation-support-white-paper
Icomm agentless-architecture
Efficiently protect-virtual-machines
Beakbane safeguards future with ERP - ready infrastructure upgrade.

Recently uploaded (20)

PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PDF
IFRS Notes in your pocket for study all the time
PDF
Daniels 2024 Inclusive, Sustainable Development
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
How to Get Business Funding for Small Business Fast
PDF
Cours de Système d'information about ERP.pdf
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
PDF
Deliverable file - Regulatory guideline analysis.pdf
PDF
Digital Marketing & E-commerce Certificate Glossary.pdf.................
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PPTX
3. HISTORICAL PERSPECTIVE UNIIT 3^..pptx
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
IFRS Notes in your pocket for study all the time
Daniels 2024 Inclusive, Sustainable Development
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
340036916-American-Literature-Literary-Period-Overview.ppt
ICG2025_ICG 6th steering committee 30-8-24.pptx
Roadmap Map-digital Banking feature MB,IB,AB
Nidhal Samdaie CV - International Business Consultant
How to Get Business Funding for Small Business Fast
Cours de Système d'information about ERP.pdf
Ôn tập tiếng anh trong kinh doanh nâng cao
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Lecture (1)-Introduction.pptx business communication
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
Deliverable file - Regulatory guideline analysis.pdf
Digital Marketing & E-commerce Certificate Glossary.pdf.................
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
3. HISTORICAL PERSPECTIVE UNIIT 3^..pptx

Cloud backup-for-endpoint-devices

  • 1. EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices Icomm   37­55 Camden Street, Birmingham,  B1 3BP United Kingdom T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk
  • 2. According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with their own mobile devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating, consuming and storing mission-critical business information on laptops, smartphones and tablets. Sometimes those devices are corporate-issued, but often they are using their own personal devices. Imagine if an employee’s laptop or tablet containing critical business data was lost or stolen: you could remotely wipe the device to prevent anyone else from having access to the information, but what if you’ve never backed up the data? You too would lose access to it. And how do you ensure your data and corporate intellectual property (IP) is protected in this scenario? As noted by Forrester Research1, in order to avoid employees operating in an IT underground, you may be one of many organizations that are developing a Bring-Your-Own-Device (BYOD)2 policy to address security concerns. Letting your employees use their own mobile devices may boost employee morale, but it also moves sensitive data outside the boundaries of an enterprise’s data center onto devices that are out of your control. If you do not have a policy for backing up the data on these endpoint devices, there’s a good chance your employees have been backing up data themselves. Some might backup data to USB devices, including external hard drives, and some to unsecure public cloud services such as iCloud. Others may use sync and share software. In all cases, you face the possibility of data being leaked outside your firewall. Your corporate IP may be residing unprotected on USBs which can be lost or stolen or might be getting shared indiscriminately across multiple devices with people who shouldn’t have access to it. Even if your organization has implemented policies to govern applications employees are permitted to use on mobile devices to access corporate data and configuring them so their memory can be wiped clean when required, you still run the risk of losing access to this data unless it is safely backed up to your authorized data center. Not having a policy for backing up endpoint devices puts your corporate data at risk. To protect yourself from threats to your competitive advantage, loss of reputation and regulatory non-compliance, you need a secure end-to-end data backup and recovery solution that protects all of your data, including the data residing on endpoint devices. ¹ Your workforce is already using their personal computers to boost efficiency. Instead of forcing them to operate in an IT underground, it’s time to develop a bring-your-own-device (BYOD) program that addresses security concerns while building a solid base for future innovation. – Forrester Research ² Bring-your-own-device (BYOD) is an alternative strategy allowing employees, business partners and other users to use a personally selected and purchased client device to execute enterprise applications and access data. – Gartner Research Icomm   37­55 Camden Street, Birmingham,  B1 3BP United Kingdom T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk
  • 3. According to MSP Mentor, 52% of companies offering BYOD placed a mobile usage policy in place that their employees must agree to and sign. Introduction Thanks to the rampant popularity of tablets and smartphones, the BYOD phenomenon is not going away. As employees bring their personal devices to the office your corporate IP now resides alongside family photos and personal text messages. Have you ever wondered what happens to your data when an employee leaves your organization? What if the device is lost and gets into the hands of someone who should not have access to this information? To protect unauthorized access and loss of corporate data, you can obtain the consent of employees to wipe the device of all data in the event of device loss or theft. This is something your service provider can enable on any devices employees use to access corporate data. However, once you wipe the data, no one has access to it anymore – including you. Most organizations do not have a policy for backing up data sitting on endpoint devices. So many employees have been using their own methods to makes copies of corporate data they consume and create, including USB devices and sync and share software, but these methods are not secure. They also move corporate data out of your control, potentially putting corporate IP into the hands of people who should not have access to this confidential data. Imagine if your competition gets its hands on sensitive information or if it reaches the media. Think of instances where highly sensitive corporate information in heavily regulated sectors such as healthcare and financial services is leaked. Your business may just come to an end and you may be left facing legal consequences. Icomm   37­55 Camden Street, Birmingham,  B1 3BP United Kingdom T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk The Risk of Leaving Endpoint Data Unprotected Business decision makers understand the need for safeguarding data on these devices in the same way they protect all on-premise data that resides on your LAN, but you may be holding off enabling this much needed protection because of resistance from your employees. For example, mobile workers who connect infrequently to your enterprise network may oppose the installation of any backup software on their laptops because they worry that time-consuming backup jobs will impact the performance of their machines. When it comes to personal devices, including smartphones, end users are wary of installing any applications provided by corporate IT. After all, they contend, it is their device and so they have the right to refuse to install any software that may harm their smartphone. IT managers may be tempted to look the other way when it comes to backing up endpoint devices because it might increase bandwidth use and lead to clogged networks when mobile devices hop back on to corporate networks after a long time and time-consuming backup jobs kick in. They may also be concerned that managing the backup of these devices will need special tools and strategies to support the wide array of devices employees are bringing into the corporate environment, leading to additional costs and the need for completely new service providers and investments in new infrastructure. Whatever your reasons, not implementing a policy for backing up the data on these devices can leave you exposed to the threat of losing confidential information and the consequences of data loss.
  • 4. Figure 1: Asigra supports the backup and restore on a wide range of endpoint devices and operating systems Complete Endpoint Device Backup Powered by Asigra Our cloud backup solution powered by Asigra provides organizations with a single solution to protect all data in the enterprise, no matter where it resides, including mobile endpoints. We can backup data and applications from any device that holds your organization’s confidential information. From enterprise servers to physical and virtual machines to desktops, laptops, tablets, smartphones and cloud-based applications, our cloud backup service can backup all data seamlessly to your own authorized, secure offsite data center. Comprehensive OS support The BYOD world is full of aficionados who swear by particular operating systems and device brands, so we understand that any solution to protect data on these endpoints must be broad-based and include support for multiple operating systems and platforms. Our cloud backup service is hardware and software independent and supports all major operating systems. Whether your desktop or laptop users run Windows, Linux, or Mac OS, our solution can protect the data on their PCs. It can Icomm   37­55 Camden Street, Birmingham,  B1 3BP United Kingdom T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk also protect Apple iOS and Android devices, thereby supporting the majority of tablets and smartphones found in corporate environments today, whether they are personal devices brought into the organization by employees or issued by the company. Bandwidth and storage optimized backups Our cloud backup service uses incremental forever functionality to make sure only changed files are sent over the network to the backup repository. In addition, all data is deduplicated and compressed before it is transmitted, thereby ensuring efficient use of your bandwidth. Our cloud backup solution also performs deduplication at the target to efficiently store your data in our secure offsite data center. Secure backups Our cloud backup service powered by Asigra encrypts your data at the source and during transmission to the backup repository using secure AES encryption to encode the information to prevent unauthorized access during the backup and restore processes and when it is stored in backup repositories.
  • 5. Intuitive and easy to use We can configure your backups to run according to your preferences to ensure your data is backed up at regular intervals and that it is always protected. Our cloud backup application lets employees run backup and restore jobs on their devices if necessary, using a simple and user-friendly interface. Certified Endpoint Backup Apps available for download The Asigra Cloud Backup application for tablets and smartphones that powers our cloud backup service is available for download from the Apple App Store and from Google Play, so your employees can download it for free. This helps you overcome their objections about not wanting to install a suspect custom application on their personal devices. For more information on our cloud backup services for endpoint devices or to schedule a complimentary Recoverability Assessment contact us today. About Asigra Cloud Backup Award-winning Asigra Cloud Backup is an agentless hardware-and-software platform agnostic cloud backup, recovery and restore software solution that supports servers, virtual machines, desktops, laptops, tablets, smartphones, cloud-based applications, enterprise applications and databases enabling organizations to resume business operations quickly while reducing costs and achieving peace of mind. Icomm   37­55 Camden Street, Birmingham,  B1 3BP United Kingdom T: 0121 248 7931  E: sales@icomm.co.uk  W: www.icomm.co.uk © 2012 Asigra, the Asigra logo and Asigra Cloud Backup are trademarks of Asigra Inc. All other product and company names are trademarks or registered trademarks of their respective owners.