Virtualization Technology News and Information
Article
RSS
Code42 Unveils Advanced Inside Threat Detection and Alerting for its Endpoint Data Security and Visibility Solution
Code42, the leader in cloud-based endpoint data security and recovery, today announced the introduction of Inside Threat Detection, to its enterprise data protection and security platform. By generating proactive alerts when data use patterns associated with inside threats emerge, IT and InfoSec teams can quickly identify what specific files were moved from a device, by whom, when and where. Code42 customers now have an all-in-one endpoint data protection and visibility solution that helps them spot risks sooner.

"Our newest capabilities make everyday endpoint data protection more actionable. We're helping our customers to monitor and detect voluntary or involuntary movement of proprietary data and sensitive company information," said Joe Payne, president and CEO of Code42. "Customers that originally partnered with us for real-time data protection and recovery now look to Code42 to help solve their data visibility challenges. These latest developments in detecting insider threats deliver complete data visibility across the entire organization without slowing them down."

Code42's single multi-purpose agent ensures that data protection is continuous and automatic, while providing analytical capabilities around insider threat detection. With over 100,000 enterprise licenses deployed, IT and Security teams can expand their use of Code42 to track and be alerted of suspicious file movements by employees. Future enhancements around file forensics and User Behavior Analytics (UBA) will introduce further automation, detection and analytical capabilities for IT and Security. 

According to a report written by Joseph Blankenship at Forrester Research, "Because insiders have privileged access to data to do their jobs, it's difficult for security pros to detect suspicious activity. Insiders accounted for 39% of data breaches in 2015 through accidental and malicious misuse of data."

HR, Security teams and IT struggle with knowing what data departing employees take with them, share, or delete before they leave. Combine the ever-increasing number of mobile users, devices, and cloud services and customers have the potential for IP leakage at mass scale, malicious or not.

Code42 Inside Threat can be used by IT and Security teams to conduct deeper analysis to determine data movement. Business and IT decision-makers can also set alert thresholds for size and amount of file movement, allowing them to customize and define indicators for anomalous or high-risk user behavior. Given the increasing risk of IP theft, IT security teams who desire access to the full history of their data can now trace it back to the last known entity who possessed it.

"Until very recently, data security tools essentially functioned through their ability to block, hold and prevent," said John Durant, CTO at Code42. "In striving to meet the day-to-day enterprise needs of business decision-makers, we have reached an inflection point in the security software industry that requires us to strike a much better balance in how we protect endpoint user data, while at the same time allowing them to get the job done."

Code42's customers include Fortune 500 firms, the largest and fastest-growing technology companies, and small- to medium-size enterprises. Code42's heritage is in endpoint backup and recovery, and the same platform that mitigates insider threats also supports use cases including legal hold, regulatory compliance, device migration, backup and restore, self-service recovery, and malware threats such as ransomware.

To learn more about Code42 data security endpoint solutions, code42.com

Published Tuesday, May 02, 2017 8:18 AM by David Marshall
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<May 2017>
SuMoTuWeThFrSa
30123456
78910111213
14151617181920
21222324252627
28293031123
45678910