Home > APEX > Cyber & Data Protection > White Papers > Introduction to Dell APEX Backup Services > Overview of services and features
The following figure shows the services and features with APEX Backup Services.
APEX Backup Services are categorized as:
With Legal Hold, you can preserve user backup data and avoid data deletion. When you keep a user on Legal Hold, the backup data for that user is excluded from compaction.
APEX Backup Services does not delete the data that the user backs up from any endpoint device. Administrators can analyze user data by using eDiscovery tools.
When you put a user on Legal Hold, the user data from endpoints such as laptops and mobile, and from cloud applications is preserved.
APEX Backup Services has a unique capability that allows you to centrally perform a global-federated-metadata search across all users and workloads in the backup, from a single pane of glass. Federated Search extends the keyword-based search with metadata search to enhance investigative capabilities for security, legal, and forensic teams. Federated Search also supports of search of files and email messages using the different parameters available for files and email messages.
Note: Federated Search is only applicable to endpoints and SaaS apps.
Federated search is valuable across multiple use cases including:
Sensitive Data Governance provides visibility of compliance breaches associated with end-user data in your organization. Sensitive Data Governance lets you proactively track, monitor, and get notified for data compliance risks in your organization.
The end-user data can be across any of the following data sources:
Sensitive Data Governance reports compliance violations for sensitive data that occurs in the email body, subject, and attachments. APEX Backup Services displays email messages with sensitive data on the Sensitive Data Governance Dashboard and allows administrators to download email messages in the EML file format.
Once enabled, Sensitive Data Governance:
With APEX Backup Services, you have data protection with backup data isolated in a cloud platform and away from the customers’ infrastructure, providing immutable protection. Our cloud-native architecture prevents ransomware from encrypting your clean backup copies, and enables you to:
APEX Backup Services offers data loss prevention (DLP) features. These features enable IT administrators to maintain secure control over sensitive data on endpoint devices and respond to potential data loss events quickly if endpoint devices are lost or stolen. DLP is an effective solution that reduces the total economic impact of a lost or stolen laptop or mobile device for enterprises.
DLP provides powerful, multi-layered protection of critical data residing in your organization’s devices such as:
File Analytics provides you detailed insights which you can turn into a source of discovery to:
For an organization, the data that is generated can be classified as critical data, essential for running the business, and noncritical data, which may not be required to function a business. While it is essential to protect and preserve the critical data, noncritical data can be deleted or excluded from backup to eliminate the cost of protecting it.
Protecting the right information has the following benefits like:
File Analytics provides dashboard using which administrators can determine the type of data that is being backed up in the organization, identify whether the data under protection is critical or noncritical, and which datasets are driving up the storage costs.
In parallel, you can use Recommendations, a smart service that automatically scans the data under protection and identifies the noncritical data and its total size in each of the backup set.
Recommendations is a smart service designed to identify and proactively inform administrators about the backup spends on the noncritical business data under protection and recommend necessary action to exclude it from backup and save costs.
Recommendations sits on top of File Analytics. File Analytics provide administrators detailed insights and enable them to identify whether the data under protection is critical or noncritical. Eliminating noncritical data requires effort. Even if administrators or users decide to eliminate the noncritical data on their own, it can be an overwhelming task to get rid of all the noncritical data.
Recommendations enable faster detection of noncritical files and save costs. They enable administrators to: