IT Brief New Zealand logo
Technology news for New Zealand's largest enterprises
Story image

Going mobile: How to have secure file-sharing, backup recovery and access

Tue 1 Mar 2016
FYI, this story is more than a year old

To learn about Commvault Endpoint Data Protection and Commvault File Sync and Share, click here.

How do you maintain the security and confidentiality of your organisation’s data in a world in which your employees, contractors and partners are now working, file-sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardised equipment.

The dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more diffcult problem to solve. One thing we know for certain: extending the traditional strategies used in a data center to the edge of the enterprise is not an economical choice or particularly effective. Traditional strategies require additional software products and hardware that is expensive to purchase and maintain.


Your employees and partners are using laptops, tablets and smartphones to be more productive. They are accustomed to sending data to the cloud from their private lives and expect to be able to do it on the job. This is creating the challenge of securely backing up, recovering and retrieving this data with the same level of effectiveness and confidence you experienced in pre-BYOD days. As more data is created at the edge of the enterprise, Commvault offers a dependable, secure and easy to use solution for efficiently sharing, protecting and accessing that data according to the same standards as your data center, helping ensure business continuity and workforce productivity and reducing risk.

Commvault Endpoint Data Protection and Commvault File Sync and Share software are the answer to IT’s need for an enterprise-class, endpoint data protection and secure file-sharing solution specifically geared toward the personal cloud and BYOD activity. It enables you to easily and transparently back up and recover all desktop and laptop data and provides unparalleled access to protected content for users to search, sync and share without compromising security.

Building on the success, standards and functionality set by Commvault software, Commvault Endpoint Data Protection and Commvault File Sync and Share gives you efficient data protection, web and mobile secure access, automated file sync between devices, secure file-sharing, optimised deduplication and scheduling and integrated eDiscovery and legal hold.

“With Commvault Endpoint Data Protection, our employees’ data is kept safe. The best part is that, Commvault has enabled us to meet our corporate security requirements and the data is backed up and available so that we can have users up and running quickly after a hardware or software incident occurs.” - Lisa Romine, Acxiom senior manager of enterprise solutions


ONE: Easy Remote Backup

Mindful of the remote worker environment, Commvault Endpoint software enables you to perform backup for users over HTTPs without impacting their day to day activities. It also expedites recovery, centralises protection, retention and recovery operations and improves operational efficiency - thus reducing business risks associated with lost information. And if your workers are creating or editing files on tablets and smart phones, you can also protect this data due to the ability to upload key files to their laptop and the backup pool. A key point: this functionality is built on the Commvault enterprise backup and recovery infrastructure with the same reporting, scheduling, administration, ease of use and ability to use any storage tier, from disk to tape to cloud.

TWO: Better Collaboration with Commvault File Sync and Share

BYOD workers thrive on the 24 x 7 capability of mobile – being able to share information and collaborate without geo-physical boundaries. Security, though, remains a factor in management of enterprise data that is owing back and forth on a variety of devices. Commvault File Sync and Share provides complete endpoint data protection so that users can search, sync, and share without compromise to security. Secure file sharing is now possible, with colleagues, partners and customers collaborating in a private cloud as an alternative to e-mail. You can share a link or simply create a shared file or folder from the Commvault ContentStore with an individual or group to allow them to view, download, and upload new files and versions from their web browser or by dragging and dropping content into their EDGE Drive folder. Users can also access their shared content and Edge Drive folder when using the Commvault Edge mobile applications for iOS,Android and Windows smartphones and tablets. Content owners can manage access by adding or removing users from the share or by deleting the share. Commvault File Sync and Share software brings corporate data back into IT control, where it can be managed within corporate guidelines and away from unsecure, consumer cloud file sharing services.

THREE: Quick, Self-Service Recovery

Administrators can easily recover an employee’s files (in or out of place) using backup data located centrally. End-users can find and restore files from any backup on any client they are authorised to access, without requiring administrator intervention, through a web console, mobile apps, or natively in Windows Explorer.

FOUR: Advanced Mobile Synchronisation

Commvault Endpoint Data Protection enables users to synchronise a set of files and folders with up to three computers at once. Synchronisation can be bi-directional or one-directional. When you make a change or add files on one of the computers, the files on the other participating computers are synchronised automatically. Your mobile workforce will also be able to retrieve a file created on their desktop back at the office campus and securely share that information with a colleague without ever having to activate their desktop. They will have their own personal ‘data cloud’ from which they can retrieve data on demand. It’s the best of both worlds: IT managers reduce risk and deliver secure data portability, at the same time, workers have self- service access to data when they need it, to review, or share, increasing productivity.

FIVE: Mobile Data Loss Prevention

Data breach and data leakage caused by lost or stolen laptops is a significant security concern. With Commvault Endpoint Data Protection, files and folders can be encrypted to prevent unauthorised access in the event of a loss or breach. The software also provides remote wipe capabilities so that data can be erased if a client has, for example, not contacted the server in a defined period of time. Geo-location is another feature of Commvault Endpoint Data Protection. You can track and record the location history of a laptop at the time of the last connection with the server, to further confirm it is lost or stolen.

SIX: Tighter Access Monitoring

Giving employees the tools they need for secure mobile file usage also necessitates monitoring of activity to further mitigate risk. Commvault Endpoint Data Protection software provides administrative control to manage policies and permissions for all users and also enables auditing and reporting of access to data and any significant changes.

SEVEN: More Efficient Data Management

Managing large scale distributed data environments is made easier than ever by Commvault’s technology which provides advanced backup capability and a back-end repository that eliminates inefficient data silos. All backup and archive data – regardless of origin – is stored in Commvault’s ContentStore, enabling you to consolidate protection and archive data without the hurdle of data silos that waste resources and infrastructure.

Automating tasks is another way in which Commvault is helping IT professionals efficiently manage ever increasing data flow. Commvault’s technology helps you deploy, setup and manage over 25,000 systems on one CommCell. It enables you to leverage installation policies that can automate silent deployment and installation, recognise new clients and add them without human intervention and enable the automatic application of unique backup parameters based on predetermined user groups.


The BYOD environment can be scary. Add to that a distributed workforce and you could be in trouble. Your employees and partners are creating valuable business information outside the data center at hyper speed, and security isn’t always top of mind when deadlines are to be met and decisions are waiting to be made. Commvault has taken into account the way people want to work today and, building on the foundation of Commvault’s single-platform data management software, created an endpoint answer that will enable you to secure your data, recover files at optimal speed, and improve collaboration and productivity while still mitigating risk. You will also be able to efficiently conduct comprehensive file eDiscovery to meet legal and compliance requirements.

To learn more about Commvault Endpoint Data Protection and Commvault File Sync and Share, click here.

Related stories
Top stories
Story image
Digital Transformation
SAP partners with New Zealand Rugby for digital transformation
The multi-year partnership will see SAP advance NZR with its organisational operations, team performance, fan experience and sustainability goals.
Story image
Microsoft NZ and TupuToa to boost diversity in cybersecurity sector
Microsoft NZ has teamed up with TupuToa to co-develop a cyber security employment programme specifically aimed at creating more diversity in Aotearoa's cybersecurity sector.
Story image
Customer experience
The importance of service level management to customer experience
Staffing shortages have impacted site reliability engineers in particular since they are under extreme pressure to ensure that digital assets perform at optimum levels 24/7.
Story image
Deloitte expands cloud observability practice with Dynatrace
Deloitte is expanding its cloud observability practice, including DevOps principles, AI/ML, cloud complexity management and software engineering.
Story image
Cyber attacks
Devastating cyber attacks expected to hit energy sector
Energy executives anticipate life, property, and environment-compromising cyber attacks on the sector within the next two years.
Story image
Skills shortages hold orgs back from capitalising on cloud 2.0
Organisations are becoming more comfortable with sophisticated 'cloud 2.0' technologies, even as they confront difficulties in hiring and retaining IT talent.
Story image
Chorus and Nokia launches first trial of 25G PON broadband
Chorus and Nokia have announced the successful demonstration of 25 gigabit per second fibre (Gbps) broadband technology at the Chorus Fibre Lab in Auckland. 
Story image
Elevation of Privilege the top 2021 Microsoft vulnerability
BeyondTrust has released its 2022 Microsoft Vulnerabilities Report, finding that Elevation of Privilege is the top vulnerability category for the second consecutive year.
Story image
Symbio consolidates TNZI business to support APAC expansion
Symbio has recently announced the consolidation of its international business (TNZI) under the Symbio brand to support its Asia Pacific expansion strategy.
Story image
SoftIron named global leader for efficient DC infrastructure solutions
SoftIron has been named a global leader for supplying energy-efficient data infrastructure solutions for core-to-edge data centers after an assessment by Earth Capital Ltd.
Story image
Multi Cloud
Red Hat updates dev tools, empowers use of hybrid and multicloud
Red Hat has unveiled updates across its portfolio of developer tools, designed to help organisations build and deliver applications faster.
Story image
Data Protection
Information management capabilities to meet privacy requirements
Organisations with customers or operations across more than one country face a spate of new and proposed privacy and data protection laws.
Story image
Third-party automotive apps bear significant privacy risks
Mobile applications for connected cars provide various features to make life easier for motorists, but they can also be a source of risk.
Story image
Artificial Intelligence
Gartner reveals top three tech trends for banks this year
Gartner says generative artificial intelligence, autonomic systems and privacy-enhancing computation are gaining traction in banking and investment services.
Story image
Top data and tech challenges for APAC banks - report
InterSystems’ new report finds that 87% of A/NZ banks experience frustrations and concerns in using their data to drive decision-making.
Story image
MEC spending for private cellular networks to reach $5.8b
A new ABI Research report finds the revenue for Multi Access Edge Compute (MEC) deployments for private cellular networks will reach USD$5.8 billion by 2030.
Story image
Check Point
Check Point and CCTV expert join forces to boost protection
The partnership will involve Check Point Quantum IoT Protect Nano Agent being embedded in Provision-ISR’s CCTV cameras for on-device runtime protection.
Story image
Digital Transformation
Digital transformation increasing business complexities
A new survey suggests businesses must re-examine their digital transformation approach to better help employees adapt to change.
Story image
Alteryx releases updates, empowers data insights for enterprise
Alteryx has released new advancements designed to aid enterprises with cloud analytics, democratise insights and ensure data governance.
Story image
CERT NZ releases first Cyber Security Insights for 2022
CERT NZ has released Quarter One: Cyber Security Insights 2022, which offers an overview of reports about cybersecurity incidents affecting New Zealanders.
Story image
TUANZ to address rural connectivity at 2022 symposium
TUANZ is hosting the Rural Connectivity Symposium for the first time in person since 2019, providing a forum to discuss the state of rural connectivity.
Story image
Red Sift
Entrust expands strategic partnership with Red Sift
Entrust has expanded its strategic partnership with Red Sift to make it easier for businesses to adopt Brand Indicators for Message Identification (BIMI) standards for email identification and security.
Story image
NetApp launches Spot PC, a new Desktop-as-a-Service solution
This is a new managed cloud DaaS solution with security, automation, observability and optimisation capabilities, designed for the needs of today.
Story image
Data Center
Preventing downtime costs and damage with Distributed Infrastructure Management
Distributed Infrastructure Management (DIM) can often be a lifeline for many enterprises that work with highly critical ICT infrastructure and power sources.
Story image
Ponemon Institute
Email revealed to be riskiest channel for data loss
More than half (60%) of organisations experienced data loss or exfiltration caused by an employee mistake on email in the last 12 months.
Story image
Microsoft, Cloudian partnership offers data center flexibility
Cloudian’s HyperStore object storage platform is now integrated and validated to work with Microsoft SQ Server 2022, offering more flexible and scalable data centers.
Story image
Consumer relationships with digital services continues to change
Two years of pandemic-induced reliance on technology for work has altered our relationship with digital apps and services, new research has found.
Story image
Infosec unveils role-guided cybersecurity training roadmaps
Infosec Skills Roles maps hands-on training and certifications to the 12 most in-demand cybersecurity roles to maximise training efficiency.
Find out how a behavioural analytics-driven approach can transform security operations with the new Exabeam commissioned Forrester study.
Link image
Story image
Silver Peak
The path to an adaptive, modern network
Managing and securing the network looks different than it did just two years ago—especially given that most of these networks are made up of multi-generations of infrastructure stitched together over time.
Story image
Hybrid Cloud
Barracuda expands cloud-native SASE platform
"The expansion of Barracuda's cloud-native SASE platform for hybrid deployment models and IIoT environments solves a number of challenges."
Story image
Accenture - a collective security approach a driving factor for cyber resilience
With the approaching Davos World Economic Forum upon us, it is even more imperative to discuss the impact of cybersecurity on business operations leading into the future.
Story image
GapMaps Live to improve brand decisions on physical locations
GapMaps has released its latest service GapMaps Live, giving more insights and features to help brands make better decisions about physical locations.
Story image
Microsoft NZ announces initiative for local SaaS businesses
Microsoft has announced a new initiative, bringing together all of its tools to help local SaaS businesses build, sell and grow their companies at scale.
Threat actors are exploiting weaknesses in interconnected IT/OT ecosystems. Darktrace illuminates your entire business and takes targeted action to stop emerging attacks.
Link image
Story image
Managed service provider
Barracuda MSP Day 2022 highlights MSP opportunities
Barracuda Networks has released a report showing global services-related MSP revenue is set to increase by more than a third in 2022 compared to 2021.
Story image
Identity and Access Management
The post-pandemic workforce requires secure IAM capabilities
HID Global discusses what identity and access management means for organisations in today's convoluted digital world.
Story image
The paradox of change, and how to get around it
The business decision to technologically transform should not come from an IT department but from the business itself.
Story image
Digital Transformation
Harnessing digital innovations to maximise loyalty programmes and improve CX
When it comes to the retail sector, merchants have never had access to so many different client touchpoints and data to understand their customers better.
Story image
Sift shares crucial advice for preventing serious ATO breaches
Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
Story image
BYOD / Bring Your Own Device
How zero trust can lead the battle against ransomware
SecOps teams champion a zero trust strategy to support the fight against the escalating risk of cybercrime and help monitor threat actors across a network.
Story image
The ups and downs and runarounds of catching cybercriminals in NZ
We're becoming more and more aware of cybercrimes but how many criminals actually get caught? The New Zealand police explain why the answer is complicated.
Story image
Digital Signage
MAXHUB's Digital Signage range to bolster boardroom productivity
The new MAXHUB Digital Signage technology is purpose-built to make every kind of team meeting more effective.
Story image
NVIDIA announces a spate of new innovations at Computex 2022
NVIDIA has announced its latest innovations in data center, robotics, content creation, and gaming in a virtual keynote address on the opening day of Computex 2022 in Taipei.