top of page
End Point Header.jpg

YB End Point Protect

End Point Protect

45 Percent.jpg
  • Accidental deletions and overwrites

  • Laptop loss and theft

  • Ransomware or other malware infection

  • Hardware failure

  • Data loss due to departing employee

45 percent of business data is held on devices that organizations can't control.

— Gartner, Inc

How endpoint data is vulnerable

​

Studies reveal the risk of data loss associated with endpoints

End Point arrows 1.jpg
End Point arrows 4.jpg

Endpoint data is vulnerable to theft, user error, hardware failures and ransomware.

According to Ponemon Institute, over 600,000 laptops are lost or stolen at U.S. airports each year.

End Point arrows 2.jpg

According to a 2018 Harris Poll, only 6% of laptops are backed up daily and nearly one in four have never been backed up.

End Point arrows 3.jpg

According to Osterman Research, 60% of attacks impact endpoint data.

YB  Backup Endpoint Protect

​

Advanced features help simplify the process of protecting endpoint data

Easy deployment – Automated, silent, centralized installation and operation, secure over public and private networks.

Global deduplication – Reduces backup-related WAN traffic by up to 98% during business hours.

Secure protection – 256-bit AES encryption in motion and at rest, and mitigation features like global location tracking, remote data wipe and poison pill.

Policy-controlled backups – Create and deploy policies to back up as frequently as every minute.

Advanced admin control – Legal hold transparent to end users and admin-driven restore functionality.

Incremental restore – Restore only new or changed files. Ideal for recovering from ransomware and device migration.

How it works

​

  • Establish a centrally-managed vault in the YB Backup-hosted vault.

​

  • Silently deploy YB Backup software on computers, laptops and tablets using management tools like SCCM, Intune, LANDesk and others.

​

  • Back up distributed devices using the local cache, or directly to the vault.

​​

  • Recover data, or remotely wipe data if a device is lost or stolen.

Carbonite End Point Image.jpg

Supported Platforms:

​

  • Windows 10, 8, 7

  • Mac OS X 10.12 and later

  • iOS 8 and later

  • Android 4.1 and later

bottom of page