Detect when remote workers put data at risk

Don't Let WFH become WTF!?

SEE FOR YOURSELF

Remote Workforce Use Case

Use Case

Remote workers introduce new security challenges. We help you manage the risk of off-network activity when employees work from home.

USE CASE

See off-network file movement

Gain visibility into file activity of employees who are working from home.

USE CASE

Track file activity across all remote workers

See all browser upload activity, such as attachments to personal email.

USE CASE

Uncover Shadow IT and exfiltration risks

Gain immediate insight into the use of unsanctioned cloud sync applications and websites.

USE CASE

Quickly investigate high-risk file events 

Receive actionable context on suspicious activity.

USE CASE

Speed insider threat investigations

View a user's profile to review their activity in context.

Use Case

Remote workers introduce new security challenges. We help you manage the risk of off-network activity when employees work from home.

USE CASE

See off-network file movement

Gain visibility into file activity of employees who are working from home.

Code42 detects web upload, USB and cloud sync activity across all remote users, and prioritizes the employees who require further investigation.

USE CASE

Track file activity across all remote workers

See all browser upload activity, such as attachments to personal email.

Code42 detects organization-wide usage of cloud sync applications like Dropbox, iCloud, Box, OneDrive and Google Drive. Clicking on a destination, such as Dropbox, shows a breakdown of the types of files moving to DropBox as well as the employees who are moving data.

USE CASE

Uncover Shadow IT and exfiltration risks

Gain immediate insight into the use of unsanctioned cloud sync applications and websites.

Code42 provides you with a breakdown of cloud activity by file category and user. Security teams can receive alerts on remote employee activity based on destination, file type, count and size.

USE CASE

Quickly investigate high-risk file events 

Receive actionable context on suspicious activity.

All file events are enriched with information on the user, file and activity in question. You can review the exact file at risk as well as navigate to the user’s profile to see their activity in context.

USE CASE

Speed insider threat investigations

View a user's profile to review their activity in context.

Profiles provide a historical view of a user's cloud and endpoint file activity. You can reference helpful user attribute information such as the employee's name, title, department and manager. You'll have the information you need to respond to insider threats quickly, whether that be through education, automated action, corrective conversation, or legal action.

Product Demo: Using Code42 to protect data when employees work from home

Frequently Asked Questions

Learn more about how Code42 helps manage data risk caused by a remote workforce.

What information does Code42 provide on web upload activity?

We identify when files are accessed by web browsers or other web-based applications such as FileZilla and FTP. Most notably, Code42 provides the browser tab/window title and the tab URL for the event so security teams can quickly identify where files are sent.

What cloud sync applications can Code42 monitor?

Code42 detects when files are added to installed cloud sync applications such as Dropbox, iCloud, Google Drive, Google Backup and Sync, OneDrive and Box. Code42 can also identify and differentiate between files sent to personal and corporate Slack accounts.

Can Code42 detect improper sharing from corporate accounts?

Yes. Code42 has built integrations with corporate cloud services to monitor employee file activity in Microsoft OneDrive, Google Drive and Box. You can receive alerts when files are shared outside of your trusted domains, when sharing settings are elevated, or when public links are generated.

How are file types categorized?

Code42 uses a variety of file metadata, including MIME type and file extension, to assign files to categories. Categories include archive, audio, document, executable, image, PDF, presentation, script, source code, spreadsheet, video and virtual disk image.

How Code42 Helps Manage Data Risks of a Remote Workforce:

Enable secure collaboration
  • Validate proper use of sanctioned collaboration tools, such as Slack and OneDrive
  • Uncover Shadow IT applications that may indicate gaps in corporate tools or training
Pinpoint risky activity
  • Gain visibility into off-network file activity, such as web uploads and cloud sync apps
  • Quickly detect, investigate and respond to data exfiltration by remote employees
Improve response time
  • Receive activity alerts based on file type, size or count
  • Access detailed user activity profiles to speed investigation and response
ABOUT THE PRODUCT

Integrations

Code42 integrates with top technologies to help correlate data risks, deliver actionable insights and improve the efficiency and effectiveness of customer workflows.

Learn more right arrow icon

When to Use Code42

Odds are you're experiencing an insider threat right now. Here are the most common times when employees put data at risk:

Join more than 50,000 organizations using Code42

Get faster detection and response to data loss caused by insider threats.
Contact Sales