"Endpoint/client backups" refers to backing up endpoint devices such as desktop PCs, laptops, and in some cases mobile devices. The focus is on data and settings created or stored locally on the device (e.g., user profiles, local files, configurations). The goal is to prevent data loss due to hardware failure, theft, ransomware, human error, or system outages and to enable fast recovery of individual files or entire devices.
Central management & policies: Defining and enforcing backup rules (e.g., schedules, included folders, retention periods) via a central console.
Automated, time- or event-based backups: Running backups on a schedule or triggered by events (e.g., when connected to the corporate network, during idle time, after file changes).
Incremental/differential backup: Capturing only data that changed since the last backup to reduce runtime and storage requirements.
Versioning & retention: Keeping multiple file versions and defined retention periods to restore earlier states.
Encryption: Protecting backups through encryption in transit and/or at rest (e.g., in the repository or cloud storage).
Restore options (file-level to bare metal): Restoring individual files/folders, full user profiles, or entire systems (including the operating system) to the same or a replacement device.
Self-service recovery: Allowing users—within defined permissions—to restore files on their own without an IT ticket.
Offline support and bandwidth control: Backups outside the corporate network (home office/travel) plus throttling, time windows, and prioritization to reduce network/WAN load.
Deduplication & compression: Reducing storage and transfer volume by eliminating duplicate data and compressing backup sets.
Protection against ransomware/tampering: Features such as immutable backups, write protection, anomaly detection, or isolated backup targets.
Reporting & monitoring: Dashboards, alerts, compliance reports, and notifications for issues (e.g., failed backups).
An employee accidentally deletes a local project folder on a laptop; IT restores the latest version from the endpoint backup.
After a ransomware incident, an affected client is rolled back to a clean state and user data is restored from a protected backup version.
A notebook is stolen; the company restores the system image and user data onto a replacement device.
A field sales team backs up data automatically once devices are online again, including bandwidth throttling over mobile networks.
A company uses centralized policies to ensure defined folders (e.g., "Documents", "Desktop") are regularly backed up across all endpoints.