{"id":516145,"date":"2024-06-05T17:09:59","date_gmt":"2024-06-05T21:09:59","guid":{"rendered":"https:\/\/www.commvault.com\/?post_type=cmv_glossary&#038;p=516145"},"modified":"2024-08-08T12:07:34","modified_gmt":"2024-08-08T16:07:34","slug":"endpoint-backup","status":"publish","type":"cmv_glossary","link":"https:\/\/www.commvault.com\/glossary-library\/endpoint-backup","title":{"rendered":"Endpoint Backup"},"content":{"rendered":"\n<div class=\"alignfull wp-block-commvault-v2-glossary-content\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"col-12 col-md-4\">\n\t\t\t<div class=\"table__content\">\n\t\t\t\t<div class=\"js-toc_glossary\"><\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"col-12 table__content__mobile hidden-md\">\n\t\t<\/div>\n\t\t<div class=\"col-12 col-md-8\">\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"js-toc-content\">\n\t\t\t\t\t\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"endpoint-backup-definition\">Endpoint Backup Definition<\/h2>\n\n\n\n<p class=\"\">Endpoint backup solutions offer data protection for employee user devices, including desktops and laptops for today\u2019s remote workforce. <br><br>By collecting and transmitting data residing on employee devices, Endpoint backup solutions can protect users by automatically and securely backing up data copies offsite to a cloud storage location, without any end user intervention.<\/p>\n\n\n\n<h2 class=\"wp-block-heading shift-cls heading__glossary__content is-style-heading-4\" id=\"what-is-endpoint-backup\">What is endpoint backup?<\/h2>\n\n\n\n<p class=\"\">In today\u2019s new remote workplace model, endpoint data backup is becoming an essential part of data protection strategies. Endpoint backup solutions offer comprehensive coverage from deletion and attack, protecting data and information stored on laptops and PCs running Windows, Mac OS and Linux.<\/p>\n\n\n\n<p class=\"\">Endpoint backup services enable both end users and administrators to recover from data loss. End users can utilize self-service search and restore capabilities to locate and recover their data without IT intervention. Administrators, on the other hand, can protect and recover endpoint data silently from remote, centralized locations \u2013 without impacting user productivity.<\/p>\n\n\n\n<p class=\"\">With SaaS-delivered endpoint backup (or Backup as a Service), businesses can reduce the risks of potential end user data loss, while lowering the burden on IT support with an efficient cloud solution.<\/p>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"how-does-it-work\">What is the endpoint backup process, and how does it work?<\/h2>\n\n\n\n<p class=\"\">Endpoint backup offers complete protection for a company\u2019s endpoint devices, such as laptops and desktops. Remote devices are automatically assigned ready-made plans that define data backup and recovery frequency, retention plan, and data to back up and destination storage targets. IT administrations can centrally manage the backup process to include or exclude elements of backup.<\/p>\n\n\n\n<div style=\"height:13px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"why-is-endpoint-backup-important\">Why is endpoint backup important?<\/h2>\n\n\n\n<p class=\"\">The rapid shift to work from home and distance learning have heightened the security risks as remote workers, as endpoints have become a prime target for attack. In fact, a recent survey IT security professionals shows that <a rel=\"noreferrer noopener\" href=\"https:\/\/engage.morphisec.com\/2020-endpoint-security-risk-study\" target=\"_blank\">64% of companies have had compromised data assets<\/a> or IT infrastructure as a result of one or more endpoint attack (such as ransomware or malware).<\/p>\n\n\n\n<p class=\"\">Endpoint backup provides a solution that is an essential component of any holistic security solution for business data at the edge. By protecting user device data, companies can ensure that their dispersed (and now remote) business data is protected and recoverable in the face of unwanted threats or data loss.<\/p>\n\n\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"benefits-of-endpoint-backup\">Benefits of endpoint backup<\/h2>\n\n\n\n<p class=\"\">Protecting remote workforces and their laptop data is vital for business continuity. A dedicated SaaS-delivered backup solution provides a safety net in the face of data loss or corruption. With endpoint protection, businesses get comprehensive data backup and recovery protection for data at the edge, and a smart solution will offer the following benefits:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"\"><strong>Flexibility<\/strong>. Endpoint backup should offer flexible, granular restore of laptop and desktop data for companies and their remote employees. Remote workers\u2019 PCs are protected, as enterprise backup solutions use cloud copies of a device data to restore lost information and keep employees productive. Endpoint backup solutions also offer businesses self-service flexibility \u2013 as end-users can restore their own data (without any IT support), or administrators can do so from a centralized and remote location.<br><br><\/li>\n\n\n\n<li class=\"\"><strong>Data compliance<\/strong>. Endpoint backup for remote laptops and desktops moves workers\u2019 data to designated secure cloud storage and can help you stay data compliant by meeting compliance with regulatory requirements such as HIPAA, GDPR, SOC2 and ISO 27001 standards.<br><br><\/li>\n\n\n\n<li class=\"\"><strong>Advanced security and compliance.<\/strong> Endpoint backup solutions can also offer hardened security controls to prevent data loss. With advanced at-rest\/in-flight data encryption, zero trust authentication and access controls, and AI-powered anomaly detection, endpoint backup solutions help thwart bad actors from gaining access to critical user data. Paired with geolocation and remote wipe functionality, administrators can better locate and wipe loss devices to help ensure sensitive data never gets in the wrong hands.<br><br><\/li>\n\n\n\n<li class=\"\"><strong>Reduced IT burden. <\/strong>Endpoint backup solutions don\u2019t have to be complex. In fact, a SaaS-delivered backup solution can save countless hours of IT resources by simplicity and efficiency protecting backups. Not only does SaaS backup shift upfront capex to a budget-friendly opex model, but it also reduces the load for administrators. IT can centrally deploy, run, and manage backups without any impact on user productivity. This provides IT teams with nimble tools to silently administer data backups, without disruption to business operations.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-group is-style-group-reduced-padding\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group alignwide is-style-group-rounded mt-sm\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns alignfull has-eggshell-background-color has-background is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-left:3%;flex-basis:50%\">\n<h2 class=\"wp-block-heading has-text-align-left is-style-large is-style-heading-4 has-almost-black-color has-text-color\" id=\"h-see-data-protection-in-action\"><strong>See data protection in action <\/strong><\/h2>\n\n\n\n<p class=\"has-text-align-left is-style-small has-almost-black-color has-text-color\">See the fully functional, full-service product today, and see how Commvault can serve your needs directly.<\/p>\n\n\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/request-demo\"\n\t\t\taria-label=\"Get a demo\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tGet a demo\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"614\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg\" alt=\"\" class=\"wp-image-74628\"\/><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"common-use-cases-for-endpoint-backup\">Common use cases for endpoint backup<\/h2>\n\n\n\n<p class=\"\">Organizations of all sizes need endpoint backup for these everyday use cases:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"\"><strong>Remote work continuity<\/strong>. Businesses can protect all of their data on employees\u2019 PCs and bring endpoint devices back to life following unpredictable disruptions. With enterprise-grade security controls, advanced anomaly detection, and hardened compliance protocols \u2013 backup can help prevent unwanted corruption or cyberattacks.<br><br><\/li>\n\n\n\n<li class=\"\"><strong>Data protection<\/strong>. Without proper protection, your data remains susceptible to potential loss, corruption, or attack. Endpoint backup solutions can preserve device data integrity and offer usable copies of lost or corrupted endpoint data via virtual air-gapped data copies. By storing endpoint backups in an isolated location, businesses can ensure they maintain immutable copies of their data \u2013 that\u2019s not susceptible to user device breaches.<br><br><\/li>\n\n\n\n<li class=\"\"><strong>Disaster recovery<\/strong>. IT environments face constant data loss, corruption, and ransomware threats. Ensuring rapid recovery from data loss events, and helps restore worker productivity with lower risks. Backups commonly run on an automated, periodic schedule \u2013 capturing most recent copies of user data. Coupled with granular and point-in-time restore capability data backup and recovery solutions offer administrators and users with comprehensive and efficient tools to rapidly restore data.<br><br><\/li>\n\n\n\n<li class=\"\"><strong>Remote management.<\/strong> With SaaS backup, users benefit from the ability to manage and protect their users \u2013 from remote locations. Backups can be automated, and run silently in the background, without any impact to user productivity. Geo-location &amp; remote wipe functions, also give governance controls to ensure data never gets into the wrong hands. This enables admins to deploy with ease, and comprehensive protect users from centralized location.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"does-metallic-offer-endpoint-backup\">Does Commvault offer endpoint backup?<\/h2>\n\n\n\n<p class=\"\">Yes! Commvault<sup>\u00ae<\/sup> <a href=\"\/platform\/endpoint-backup-and-recovery\">Endpoint Backup and Recovery<\/a> offers powerful, award-winning data protection for desktops and laptops \u2013 in a simple SaaS-delivered solution. With automated daily backups, advanced encryption, granular search, and flexible point-time and item-level restore options, Commvault comprehensively safeguards data from deletion, corruption and attack. <br><br>And because it\u2019s SaaS, customers get easy deployments, hassle-free maintenance, and unlimited storage and one year of retention built-in. You can be up and protecting your endpoints in as little as fifteen minutes!<\/p>\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n<div class=\"alignfull wp-block-commvault-v2-free-trial-glossary\" id=\"free-trial-glossary\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"col-12\">\n\t\t\t\n\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tIt\u2019s time to take cyberthreats personally\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tLearn from Commvault\u2019s CISO, how to stay one step ahead in the battle against cyber threats, whether at home, in the office, or on the road.\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/blogs\/its-time-to-take-cyberthreats-personally\"\n\t\t\taria-label=\"Learn more\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tGartner Leader for the 13<sup>th<\/sup>\u00a0time\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\t13 times a Gartner\u00ae Magic Quadrant\u2122 Leader Enterprise Backup and Recovery Software Solutions.\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/gc\/itleaders\"\n\t\t\taria-label=\"Learn more\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n\n\n<h4 class=\"wp-block-heading heading__quick-links\" id=\"h-quick-links\">Quick Links<\/h4>\n\n\n\n<ul class=\"wp-block-list list__free-trial\">\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/resources\">All Resources<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/customers?cmv_lang=en_US\">Case Studies<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/supported-technologies\">Supported Tech<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/webinars-and-events?cmv_lang=en_US\">Webinars &amp; Events<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/services\">Training &amp; Education<\/a><\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Endpoint backup solutions offer data protection for employee user devices, including desktops and laptops for today\u2019s remote workforce.<\/p>\n","protected":false},"author":143,"featured_media":0,"parent":0,"menu_order":0,"template":"","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""}},"class_list":{"0":"post-516145","1":"cmv_glossary","2":"type-cmv_glossary","3":"status-publish","5":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v23.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Endpoint Backup | Knowledge Center | Commvault<\/title>\n<meta name=\"description\" content=\"Endpoint backup solutions offer data protection for employee user devices, including desktops and laptops for today\u2019s remote workforce.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/glossary-library\/endpoint-backup\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Endpoint Backup\" \/>\n<meta property=\"og:description\" content=\"Endpoint backup solutions offer data protection for employee user devices, including desktops and laptops for today\u2019s remote workforce.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/glossary-library\/endpoint-backup\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-08T16:07:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Endpoint Backup | Knowledge Center | Commvault","description":"Endpoint backup solutions offer data protection for employee user devices, including desktops and laptops for today\u2019s remote workforce.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/glossary-library\/endpoint-backup","og_locale":"en_US","og_type":"article","og_title":"Endpoint Backup","og_description":"Endpoint backup solutions offer data protection for employee user devices, including desktops and laptops for today\u2019s remote workforce.","og_url":"https:\/\/www.commvault.com\/glossary-library\/endpoint-backup","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_modified_time":"2024-08-08T16:07:34+00:00","og_image":[{"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg"}],"twitter_card":"summary_large_image","twitter_site":"@commvault","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/glossary-library\/endpoint-backup","url":"https:\/\/www.commvault.com\/glossary-library\/endpoint-backup","name":"Endpoint Backup | Knowledge Center | Commvault","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/glossary-library\/endpoint-backup#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/glossary-library\/endpoint-backup#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg","datePublished":"2024-06-05T21:09:59+00:00","dateModified":"2024-08-08T16:07:34+00:00","description":"Endpoint backup solutions offer data protection for employee user devices, including desktops and laptops for today\u2019s remote workforce.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/glossary-library\/endpoint-backup#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/glossary-library\/endpoint-backup"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/glossary-library\/endpoint-backup#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/06\/1_CCPP.jpg?quality=80","width":1024,"height":614},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/glossary-library\/endpoint-backup#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Endpoint Backup"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_glossary\/516145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_glossary"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/cmv_glossary"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/143"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=516145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}