Code42 Unveils Advanced Inside Threat Detection and Alerting

Minneapolis — May 1, 2017 

Code42, the leader in cloud-based endpoint data security and recovery, today announced the introduction of Inside Threat Detection, to its enterprise data protection and security platform. By generating proactive alerts when data use patterns associated with inside threats emerge, IT and InfoSec teams can quickly identify what specific files were moved from a device, by whom, when and where. Code42 customers now have an all-in-one endpoint data protection and visibility solution that helps them spot risks sooner.

"Our newest capabilities make everyday endpoint data protection more actionable. We’re helping our customers to monitor and detect voluntary or involuntary movement of proprietary data and sensitive company information," said Joe Payne, president and CEO of Code42. “Customers that originally partnered with us for real-time data protection and recovery now look to Code42 to help solve their data visibility challenges. These latest developments in detecting insider threats deliver complete data visibility across the entire organization without slowing them down."

According to a report written by Joseph Blankenship at Forrester Research¹,  "Because insiders have privileged access to data to do their jobs, it's difficult for security pros to detect suspicious activity…Insiders accounted for 39% of data breaches in 2015 through accidental and malicious misuse of data."

HR, Security teams and IT struggle with knowing what data departing employees take with them, share, or delete before they leave. Combine the ever-increasing number of mobile users, devices, and cloud services and customers have the potential for IP leakage at mass scale, malicious or not.

Code42 Inside Threat can be used by IT and Security teams to conduct deeper analysis to determine data movement. Business and IT decision-makers can also set alert thresholds for size and amount of file movement, allowing them to customize and define indicators for anomalous or high-risk user behavior. Given the increasing risk of IP theft, IT security teams who desire access to the full history of their data can now trace it back to the last known entity who possessed it.

"Until very recently, data security tools essentially functioned through their ability to block, hold and prevent,” said John Durant, CTO at Code42. “In striving to meet the day-to-day enterprise needs of business decision-makers, we have reached an inflection point in the security software industry that requires us to strike a much better balance in how we protect endpoint user data, while at the same time allowing them to get the job done."

Code42's customers include Fortune 500 firms, the largest and fastest-growing technology companies, and small- to medium-size enterprises. Code42's heritage is in endpoint backup and recovery, and the same platform that mitigates insider threats also supports use cases including legal hold, regulatory compliance, device migration, backup and restore, self-service recovery, and malware threats such as ransomware.

 

¹”Hunting Insider Threats”, Forrester Research, Inc., July 20, 2016