Replace outdated devices with OpenText™ Core Endpoint Backup
Running older devices can slow productivity, frustrate users, and compromise security. That’s why most organizations have a hardware refresh cycle for laptops and PCs.

Lauren Beliveau
November 27, 2023•3 min read

But device replacements are often time-consuming for IT administrators and end users. Organizations that only use OneDrive to back up employee documents might miss files that are saved on the user’s device, as well as applications, user configurations, and signatures. Users must recreate all of these items on their new device.
Luckily, organizations that use OpenText Core Endpoint Backup can capture all these components. Administrators can quickly and easily restore a user’s settings and all the items that live outside OneDrive. Whether it’s a scheduled refresh or the result of a lost or stolen device, Carbonite Endpoint Backup can seamlessly transition users from one device to another.
Streamline device replacement
The newest release of Endpoint Backup introduces even more capabilities to simplify device replacement:
Automatic device replacement reduces the workload for IT administrators. Using dashboard and command-line activation options, they can designate the user's new device and associate the data from the old device to the new one. Then they can delete the old device from the dashboard to maintain the device count.
Plus, end users no longer have to deal with slow, manual data transfers once they get their new device—saving time and frustration for employees and IT administrators alike.
Backup health insights enable you to monitor and maintain the integrity of your backups to reduce the risk of data loss and security breaches. This new feature offers a comprehensive overview of the health status of all your devices. These insights ensure data protection for the organization by empowering IT administrators to quickly identify, diagnose, and react to backup issues.
Uncover insights and gain visibility into user roles
In this release, you can also improve visibility with:
Restore info summary equips administrators with data-backed knowledge that is critical to data protection. They now have an at-a-glance view of all completed restore jobs, including the total number and size of restored files, from both the dashboard and device. With immediate visibility into completed restores, administrators can showcase the value of the solution to the organization and maintain continuity of business operations.
User role reporting displays user permissions to provide insight into each user's role within a company. This feature simplifies the tasks of granting and revoking access, which enhances security measures and reduces administrative overhead.
Endpoint backup: Bolster your data protection strategy
With OpenText Core Endpoint Backup, we strive to alleviate the burden on IT teams. Whether it’s streamlining device replacement or enhancing visibility into user roles, we’re always looking for ways to help administrators do their jobs more efficiently—while protecting business-critical data on endpoints.
Backing up your endpoint data is just one part of keeping your business cyber resilient. OpenText Cybersecurity provides a full suite of solutions to keep your data protected.
To learn more about OpenText™ Core Endpoint Backup or our cybersecurity solutions, book a consultation with one of our experts.

Lauren Beliveau
Lauren Beliveau is a product marketing manager for the OpenText Cybersecurity data management portfolio. She is dedicated to delivering robust data management solutions to help businesses become more cyber resilient.