💻
Database Magazine
GlossaryBest Practices and TipsFAQsResources
  • Database Magazine
  • Glossary of Terms
    • A
      • Archive
      • Active backup for Office 365
      • AWS Backup
      • Active Directory
      • Agent
      • Anti-ransomware solutions
    • B
      • Backup
      • Backup and Recovery
      • Backup as a service
      • Bare-metal backup
      • Backup repository
      • Backup schedule
      • Backup Solutions
      • Business Continuity
    • C
      • Cloud Backup
      • Continuous Data Protection (CDP)
      • Compression
      • Consistency check
      • Cold Backup
      • Cloud Data Management (CDM)
    • D
      • Data Deduplication
      • Disaster Recovery (DR)
      • Differential Backup
      • Disk-to-Disk (D2D) Backup
      • Disaster Recovery (DR)
    • E
      • Encryption
      • Endpoint Backup
      • Erasure Coding
      • Export/Import
      • Enterprise Backup Software
    • F
      • Full Backup
      • Failover
      • File-Level Backup
      • File Sync and Share
      • Fireproof and Waterproof Storage
    • G
      • Grandfather-Father-Son (GFS)
      • Granular Recovery
      • Geographically Dispersed Backup
      • Ghost Imaging
      • Global Deduplication
    • H
      • Hybrid Backup
      • Hot Backup
      • High Availability (HA)
      • Hard Disk Drive (HDD)
      • Hybrid Cloud Backup
    • I
      • Incremental Backup
      • Image-based Backup
      • Instant Recovery
      • Integrity Check
      • Infrastructure as a Service (IaaS)
    • J
      • Journaling
      • Job Scheduler
      • Just-in-Time Recovery
      • Journal-Based Recovery
      • Jumbo Frames
    • K
      • Key Management
      • Kernel-Based Recovery
      • Kickstart
      • Kept Versions
      • Kill Switch
    • L
      • Long-Term Retention
      • Log-Based Recovery
      • Local Backup
      • Latency
      • Load Balancing
    • M
      • Metadata
      • Mirroring
      • Multi-Site Replication
      • Media Rotation
      • Mounting
    • N
      • Nearline Storage
      • Network-Attached Storage (NAS)
      • Non-Destructive Recovery
    • O
      • Offsite Backup
      • Online Backup
      • Object Storage
      • Offsite Replication
      • Open File Backup
      • Overwrite Protection
      • One-Click Restore
    • P
      • Point-in-Time Recovery
      • Primary Storage
      • Physical Backup
      • Private Cloud Backup
      • P2V (Physical-to-Virtual) Conversion
    • Q
      • Quiesce
      • Quick Recovery
      • Quota Management
      • Quality of Service (QoS)
      • Query-Based Recovery
    • R
      • Recovery Point Objective (RPO)
      • Recovery Time Objective (RTO)
      • Replication
      • Restore
      • Retention Policy
    • S
      • Snapshot
      • Storage Area Network (SAN)
      • Secondary Storage
      • Single Point of Failure (SPOF)
      • Synthetic Full Backup
    • T
      • Tape Backup
      • Two-Factor Authentication (2FA)
      • Thin Provisioning
      • Test Restore
      • Transaction Log
    • U
      • Universal Restore
    • V
      • Versioning
      • Virtual Machine (VM) Backup
      • Verification
      • Vaulting
      • Virtual Tape Library (VTL)
    • W
      • Warm Site
      • Workload Mobility
      • WAN Acceleration
      • Write-Once, Read-Many (WORM)
      • Windows Backup
    • X
      • XOR (Exclusive OR)
    • Y
      • Yearly Backup
    • Z
      • Zero Data Loss
  • Best Practices and Tips
    • How to backup Microsoft 365 using third-party backup tools
  • FAQs
    • Does Office 365 have backups?
    • What is the best backup for Office 365?
    • How do I backup my Office 365 backup?
    • What is the backup tool for Office 365?
    • Does Office 365 have storage?
    • Is OneDrive a reliable backup solution?
    • What is an Incremental Backup?
    • Does VMware have a backup tool?
    • What is VMware considered backup?
    • What are the types of backup in VMware?
    • Is VMware snapshot a backup?
    • What is the best way to backup a Hyper-V VM?
    • How do I create a backup in Hyper-V?
    • Should you backup a Hyper-V host?
    • What is the difference between Hyper-V snapshot and backup?
    • What is the disaster recovery in IT industry?
    • What should an IT disaster recovery plan include?
    • What are the main steps in IT disaster recovery?
    • What is the difference between IT security and disaster recovery?
    • What is a NAS backup?
    • How do I backup my NAS data?
    • Can NAS be used as a backup?
    • What is Nutanix used for?
    • What is Nutanix storage?
    • What is RPO and RTO in Nutanix?
    • What is MSP backup?
    • What is managed backup service?
    • How do I restore my MSP backup?
    • What is Azure Backup?
    • What is the purpose of Azure Backup?
    • What are the different types of Azure cloud backups?
    • Is Azure Backup a PaaS?
    • What are the downsides of Backblaze?
    • Does Backblaze backup everything?
    • Is Backblaze better than Google Drive?
  • Resources
Powered by GitBook
On this page
  • Definition
  • Explanation
  • Related terms
  1. Glossary of Terms
  2. E

Endpoint Backup

Explore the benefits of Endpoint Backup, a reliable solution for protecting data on individual devices.

Definition

Endpoint Backup refers to the process of backing up data stored on endpoints, such as desktop computers, laptops, tablets, or mobile devices. It ensures that critical data residing on these devices is protected and can be restored in the event of data loss or device failure.

Explanation

Endpoints, including user devices such as laptops and mobile devices, often contain valuable data that is susceptible to loss or damage. Endpoint Backup solutions aim to safeguard this data by automatically backing it up to a centralized storage location or cloud-based platform.

Endpoint Backup typically includes the following features:

  1. Automated backups: Endpoint Backup solutions can be configured to automatically and regularly back up data from endpoints without requiring manual intervention from the user. This helps ensure that data is consistently protected and up-to-date.

  2. Incremental backups: To optimize storage space and backup times, endpoint backup solutions often use incremental backup techniques. Incremental backups capture only the changes made since the last backup, minimizing the amount of data transferred and stored.

  3. Centralized management: Endpoint Backup solutions provide centralized management capabilities, allowing IT administrators to configure backup policies, monitor backup status, and initiate restores from a single management console. This simplifies the backup process and enhances control over endpoint data protection.

  4. Secure data transfer and storage: Endpoint Backup solutions employ encryption and secure transfer protocols to protect data during transit from endpoints to the backup storage location. Additionally, data is often encrypted at rest in the storage repository to ensure its confidentiality.

Endpoint Backup is crucial for protecting user-generated data, including documents, presentations, spreadsheets, emails, and other files. It serves as an essential layer of data protection, complementing other backup strategies such as server backups and database backups.

Related terms

  • Data loss prevention (DLP): Strategies and technologies aimed at preventing data loss or leakage from endpoints and other devices.

  • Mobile device management (MDM): Solutions that enable the centralized management and control of mobile devices, including backup and security features.

  • Bring Your Own Device (BYOD): A policy allowing employees to use their personal devices for work purposes, requiring appropriate endpoint backup measures to protect corporate data.

  • Remote wipe: The capability to remotely erase data from a lost or stolen device to prevent unauthorized access to sensitive information.

  • File synchronization and sharing: Solutions that enable users to synchronize and share files across multiple devices, often incorporating backup features to protect data stored on endpoints.

  • Endpoint protection: Comprehensive security solutions that include backup, antivirus, anti-malware, and other features to safeguard endpoints from various threats.

  • Data recovery: The process of restoring backed up data to its original location or a different endpoint device following a data loss event.

PreviousEncryptionNextErasure Coding

Last updated 1 year ago