Enter your email address:
Delivered by FeedBurner
About the Author
Greg White is a Senior Manager of Product Marketing, focusing on Data Management and Protection. He has worked in in the technology industry in brand and product marketing for the last decade helping organizations of all sizes, verticals and geographies solve their IT challenges. Over the last six years, Greg has gained specific knowledge and experience in the enterprise application and storage areas where he has helped businesses find solutions for their data growth, data management, and data protection problems.
Jeff Dorr is a Senior Manager currently focused on data protection product marketing for CommVault. Over the past 10 years, Jeff has led efforts in several companies to develop, introduce, and manage market leading hardware, software, and services that really help users improve their data protection environment.
The Modern Data Protection Experts' Archives
Wednesday, September 14, 2011
By Greg White
I am seeing more and more coverage from the analysts and press of the rising consideration given to protecting employee's desktop and laptop data. According to Lauren Whitehouse at the Enterprise Strategy Group (ESG), their research found that "endpoint backup/recovery and remote office backup/recovery ranked in the top five of primary data protection challenges and the top ten data protection spending priorities." And Sheila Childs at Gartner Inc., published a research report titled "Desktop/Laptop Backup Update: Endpoint Backup Gains in Importance" (ID: G00211731) in March that also talks about how "organizations are waking up to the fact that they have important data resident on endpoint devices that is not adequately protected, but should be." Plus, there is the growing wealth of articles like Curtis Preston's mobile data backup tutorial and laptop and desktop data backup best practices. Perhaps most importantly, I am hearing the same sentiment from the companies and organizations that I talk to about storage and data protection.
The content of this blog reflects the thoughts and opinions of the author, and does not represent the thoughts, opinions, plans or strategies of CommVault Systems, Inc. ("CommVault") and CommVault undertakes no obligation to update, correct or modify any statements made by the author of this blog. Any and all third party links provided by this blog are not affiliated with, nor endorsed by, CommVault.