Gartner 2020 Market Guide for Insider Risk Management Solutions | Get the report →
  • Partners
    • Technology Partners
    • Reseller Partners
    • Partner Portal
  • Customer Toolkit
  • University
  • Support
Code42 Logo
  • Products
    • Incydr™ Data risk detection and response for insider threat Product Overview right arrow icon
      • Features
      • Detection
      • Investigation
      • Response
      • Use Cases
      • Remote workforce monitoring
      • Departing employee monitoring
      • IP theft detection
      • View All
      • Information
      • Product Plans
      • Deployment
      • Integrations
      • Developer Portal
      • Trust & Security
      • Services
    • CrashPlan Cloud Endpoint data backup & recovery for the enterprise
  • Solutions
    • Insider Risk
    • Data Exfiltration
    • Incident Response
  • Company
    • About
    • News
    • Careers
    • Leadership
  • Resources
    • Resource Center
    • Reports, eBooks, Videos
    • Events & Webinars
    • Customer Stories
    • Product Resources
    • Integrations
    • Developer Portal
    • Trust & Security
    Data Protection: Code42 vs. DLP Leave DLP behind with a better, risk-based approach to protect data. Learn more right arrow icon
  • Blog
  • Get Started
  • Partners
    • Technology Partners
    • Reseller Partners
    • Partner Portal
  • Customer Toolkit
  • University
  • Support

DATA SECURITY STRATEGIES

The Unknown Areas of Your Data Security Landscape


5 MIN READ

SHARE

Nathan Hunstad

Principal Security Researcher and Engineer

Here’s an understatement: The world of work has changed — and so has data security. Even compared to two or three years ago, people are working in powerful new ways — collaborating from anywhere and any device via cloud-driven productivity apps. Mobile workforces, remote workforces and the “gig economy” of contractors are dramatically broadening the environment where data is being created for the typical organization. More files and data live outside the well-defended and easily visible interior. And today, the most valuable data in an organization is unstructured — think source code, design files, product roadmaps, customer lists and strategy documents. In this world, detecting insider threats has become a complex nightmare for many organizations.

To Continue Reading…

Share a few pieces of information and we’ll personalize your experience with us

Conventional security tools aren’t built for the modern paradigm

Today’s worker is remote at home, working on a laptop, creating and sharing data in the cloud — and just as likely to be working on a Mac as Windows. Conventional data security tools, such as DLP, just weren’t designed to handle this modern paradigm for three key reasons:

  1. They only detect what you tell them to.
  2. They’re built to block — not to enable.
  3. They aim to stop the threat — not see the threat.

In short, the traditional “lock it down” approach used with structured data just won’t work. Unstructured data is constantly evolving, it’s user-controlled — and you want it that way. Today, your business’ success depends on enabling a collaboration culture that allows your employees to create, iterate and share files quickly and seamlessly.

Adding to that, many companies have not yet integrated data security into critical processes — so their security teams are left with limited visibility and control. For example, companies’ data compliance policies and processes lag behind the current realities of their expanding, cloud-driven ecosystem. Another common gap involves employee onboarding and offboarding — two common workflows that present an increasing data loss risk. Security teams are not well integrated with these HR-driven workflows, meaning the security tools they do have cannot be effectively focused on these acute risks.

Prevention alone isn’t enough to stop insider threat

The harsh reality is that prevention alone won’t detect every insider threat. Data evolves too fast, technology progresses too fast, the workforce is always changing and users are just too creative. So, what happens when data falls through the prevention cracks? It’s a race against time. A valuable file is out there in the wild — and your security team needs to rapidly answer critical questions around who took what, when, how, etc. But because prevention tools struggle to see unstructured data as it evolves, the security team is left flying blind. Detection happens long after the fact, investigations are slow, and response comes too late.

Nathan Hunstad

As director of security operations at Code42, Nathan leads the team responsible for security tooling, red team exercises and responding to security events. Nathan joined Code42 in 2016, bringing experience from both the private and public sector, and is a graduate of the Masters of Science in Security Technologies (MSST) program at the University of Minnesota.

Code42 logo
Code42 logo

Code42

  • About Code42
  • News + Events
  • Awards
  • Investors
  • Leadership
  • Careers
  • Contact Sales

Learn More

  • Insider Risk Ecosystem
  • Reseller Partners
  • Federal Solutions
  • Higher Education Solutions
  • CrashPlan for Small Business
  • Customer Stories

Support

  • Help Center
  • Code42 University
  • Professional Services
  • Twitter Twitter
  • Facebook Facebook
  • LinkedIn LinkedIn
  • YouTube YouTube
  • Terms of Use
  • Privacy Statement
  • Impressum
© 2021 Code42 Software, Inc. All rights reserved.
Get Started with Incydr™
Contact Salesright arrow icon
We'll have an insider threat expert reach out within 24 hours
Start Free Trialright arrow icon
Try Incydr at no cost for 30 days to quickly uncover your data blindspots
Interactive Demo
Take Incydr for a spin in our free sandbox environment.
Launch the demo right arrow icon
Explore the deeper functionality of Incydr™
Contact Salesright arrow icon
We'll have an insider threat expert reach out within 24 hours
Interactive Demo
Take Incydr for a spin in our free sandbox environment.
Launch the demo right arrow icon

This website uses cookies to improve your user experience and to provide content tailored specifically to your interests. Detailed information on the use of cookies on this website, and how you can manage your preferences, is provided in our Cookie Notice. By clicking I Agree or continuing to use this website, you consent to the use of cookies. Learn more.

Code42
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.