Carbonite Endpoint 360

Protect endpoint data no matter where it's stored

Data created on desktops, laptops and tablets is vulnerable to ransomware, human error, hardware failures, loss and theft. Carbonite Endpoint 360 protects against these common data loss scenarios, and includes backup for the entire Microsoft Office 365 suite.

With features like geo-tracking and remote wipe, Carbonite 360 provides all-around endpoint data protection. So you can take control of your critical busines data–no matter where it lives.

Anywhere there’s data, there’s a risk of data loss

  • Accidental deletions and overwrites
  • Laptop loss and theft
  • Ransomware or other malware infection
  • Hardware failure
  • Data loss due to departing employee
45%
of business data is held on devices that organizations can't control.
— Gartner, Inc.

 

 
 

How endpoint data is vulnerable

Studies reveal the risk of data loss associated with endpoints
 
Studies reveal the risk of data loss associated with endpoints
Endpoint vulnerabilities
Endpoint data is vulnerable to theft, user error, hardware failures and ransomware.
Loss and theft
According to Ponemon Institute, over 600,000 laptops are lost or stolen at U.S. airports each year.
User error
According to a 2018 Harris Poll, only 6% of laptops are backed up daily and nearly one in four have never been backed up.
Ransomware
According to Osterman Research, 60% of attacks impact endpoint data.

Carbonite Endpoint

Advanced features help simplify the process of protecting endpoint data
  • Easy deployment – Automated, silent, centralized installation and operation, secure over public and private networks.
  • Global deduplication – Reduces backup-related WAN traffic by up to 98% during business hours.
  • Advanced admin control – Legal hold transparent to end users and admin-driven restore functionality.
  • Secure protection – 256-bit AES encryption in motion and at rest, and mitigation features like global location tracking, remote data wipe and poison pill.
  • Policy-controlled backups – Create and deploy policies to back up as frequently as every minute.
  • Incremental restore – Restore only new or changed files. Ideal for recovering from ransomware and device migration.