Backup and Governance
Showing results for 
Search instead for 
Do you mean 

Data Protection: How BYOD and falling in love with your mobile device causes IT headaches

JackieSu ‎01-30-2014 08:03 AM - edited ‎02-20-2015 12:36 PM

As mobile workers develop strong preferences and become emotionally attached to their mobile devices, there's little doubt that the popularity of BYOD (Bring Your Own Device) with smartphones and tablets has rattled the nerves of IT managers. 


The rapid shift to mobile-based computing has changed how information is accessed and shared; data is exploding at the edge, everywhere, on a sea of devices. Important business data continues to make its way from the data center to endpoint devices such as laptops, tablets, and smartphones.  According to Gartner, approximately 70% of all organizational data resides outside the data center, on a PC file.  That means if there is not a deliberate and prudent strategy to protect user laptops then over two-thirds of an organization’s data is at risk—a recipe for disaster. 


Wait…where’s my laptop?

Up to 12,000 laptops are lost in U.S. airports each week. The real loss is the data that might need to be re-created if it was not properly protected. In fact, according to IDC, $14,000 in productivity is lost per worker each year due to the inability to find or access the data they require to work.  And another real concern is revealed in a recent study by Forrester that found 61% of users say they have taken their own steps to protect data, mostly through consumer grade online solutions (yikes!).  As a result, corporate data leaks outsides the company firewall, and if the employee leaves the company their data goes with them—BYOD policy or not.

Despite these staggering statistics only 37% of enterprise data centers provide any sort of endpoint data protection, making the risk of data leakage, outright data loss, and failure to meet compliance and litigation requirements tremendous.


Creating a reliable backup strategy

Because the risk of loss of unique corporate data is so high, the protection of these devices must be taken seriously.  It cannot be left up to either the good will of the users or a contract with a consumer-grade, public cloud provider.  Not only is this kind of backup strategy unreliable, but it promotes costly data leakage.


For the enterprise, protection of these devices needs to be an IT service that is managed and monitored centrally to ensure that all data is being systematically protected.  This is critical from a data protection standpoint as well as to ensure that the data can be leveraged for future litigation readiness or big data analysis.


Implementing a reliable backup strategy is challenging, but IT can no longer sit on the sidelines hoping that users “do the right thing” with an organization’s “in-the-wild” data.  Doing so leads to a variety of problems, including loss and leakage of data and the risk of not meeting compliance and litigation requirements. IT needs an endpoint data protection solution that offers users value, so they will embrace it.  It should also add value to the organization in the form of reduced risk, and a stronger compliance stance.  


It’s time to protect and leverage all of your corporate data in a mobile world, and HP Connected Backup can help you do just that.




Edited by Robin Hardy

0 Kudos
About the Author


Su serves as Director of Product Marketing for HP Connected Backup and LiveVault, and has more than 20 years of experience in enterprise software including SaaS, data protection, and information management & governance. She is based in Northern California.

27 Feb - 2 March 2017
Barcelona | Fira Gran Via
Mobile World Congress 2017
Hewlett Packard Enterprise at Mobile World Congress 2017, Barcelona | Fira Gran Via Location: Hall 3, Booth 3E11
Read more
Each Month in 2017
Software Expert Days - 2017
Join us online to talk directly with our Software experts during online Expert Days. Find information here about past, current, and upcoming Expert Da...
Read more
View all