Code42 Diversity and Code42 Inclusion

Code42 is Committed to Diversity and Inclusion

What makes a company a great place to work? In our diverse world, having engaged and empowered employees requires more than just good pay and benefits. At Code42, we believe that employee satisfaction is enhanced when we go beyond just business goals, truly listen to who people are and make concrete efforts to include them. This is why we launched Belong at Code42, a team dedicated to creating a culture of inclusivity within the company.

Belong at Code42

Belong at Code42 is a group of 14 people from across all departments, skill levels, backgrounds and identities. The team comes together regularly to help the company fulfill three key goals for our employees: ensuring everyone is a resource, everyone has a place, and everyone thrives at Code42.

“We’re focused on the current state of diversity and inclusion in the company, how we hope to see things change, and what we can do to affect that change,” said Derek Sung, Code42 committee member and senior designer. “Our goal is to help employees feel like they can be their authentic self at work. It feels good to be a part of this, because it doesn’t feel like it’s just an HR exercise.”

“Previous companies I’ve worked at didn’t have much interest in inclusion,” said Code42 committee member and senior talent acquisition business partner, Heidi Daumen. “But focusing on diversity and inclusion is such a big part of building a culture. As a group, we work hard to develop goals that are actionable and measurable. It’s very hard to get 14 people in a room and not have it turn into strictly philosophical conversations. But we are doing it.”

Putting focus on inclusion

In its first six months, Belong at Code42 has taken concrete steps to make the company more inclusive for everyone, including hosting outside speakers and panel discussions, and delivering training for Code42 employees on a variety of diversity and inclusion topics. The employee handbook has been rewritten with more inclusive language to make employees of all backgrounds feel welcome. Code42 has signed both the Minnesota Technology Diversity Pledge and the National Tech Inclusion Pledge.

These positive steps have been noticed by the Code42 workforce as a whole. “People are really happy that this is happening,” said Daumen. “This is an environment that is very open to what we’re doing. Making sure that everyone feels comfortable and welcome when they come to work is only going to make the company better for all.”

One outward sign of success: Code42 was recently named one of Minnesota’s Top 150 Workplaces for 2018 by the Star Tribune. Of course, we don’t work to achieve an inclusive culture simply to win awards. We firmly believe that creating and maintaining an environment that supports authenticity and celebrates what makes us different ultimately benefits our customers. We have a big job here at Code42. The customers we support, the ideas we protect and the trust we maintain with our customers is the backbone of our company. When employees are happy and comfortable at work, they can better focus on meeting the needs of our customers. We all do our best work when we’re in a place where we feel like we truly belong.

For information about careers at Code42, visit code42.com/careers.

Code42 security industry awards

Gosh, Well, What Can We Say Except “Thank You?”

Wherever their data lives or moves, whether on endpoints or in the cloud, our customers trust us to protect their ideas, and we take that trust seriously. Ensuring their success is our number one mission here at Code42.

That’s why it is especially gratifying when we are recognized among industry innovators for finding new ways to make our customers’ data safer and workflows easier. We are thrilled to announce that in the first half of 2018 Code42 has received a number of industry honors:

  • Winner: Cyber Defense Magazine 2018 InfoSec Award
    Hot Company: Insider Threat Detection
  • Winner: Cyber Defense Magazine 2018 InfoSec Award
    Cutting Edge: Endpoint Security
  • Winner: 2018 SC Awards Europe
    Best Data Leakage Prevention Solution
  • Winner: Info Security PG’s Global Excellence Awards
    Security Products and Solutions for the Enterprise, Gold
  • Winner: Info Security PG’s Global Excellence Awards
    Endpoint Security, Silver
  • Winner: 2018 Fortress Cyber Security Awards
    Threat Detection
  • Finalist: 2018 SC Awards                                                          
    Best Data Leakage Prevention Solution

While we’re proud to make a difference in the lives of our customers, we also take pride in making Code42 a great place to work for employees. Code42 was recently named one of the Top Workplaces in Minnesota by the Star Tribune, our local newspaper. As a Top Workplace, Code42 joins the ranks of the most progressive companies in Minnesota, based on employee opinions measuring engagement, organizational health and satisfaction.

It’s the dedication and hard work of our employees that enable us to continue to fulfill our customer-first mission. With that said, we want to extend special thanks to our employees and customers whose passion for what they do has driven us for the last 17 years to become an industry leader in data security.

3D Printing: From Employee Hobby to Life-Changing Tech

At Code42, our employees firmly believe that technology can be used to make the world a better place. As an organization, we’re also big promoters of employees volunteering for organizations they believe in. Sometimes, the two beliefs come together seamlessly. Here’s an example of one philanthropic project that involves using technology for the greater good: making 3D-printed prosthetic hands.

Code42 Software Engineers Joseph Bozarth and Tom Florin have been working with e-NABLE, a nonprofit that allows volunteers to create hands and arms “for those who were born missing fingers or who have lost them due to war, disease or natural disaster.” The Washington state-based organization is entirely operated by volunteers who create free 3D-printed hands and arms for people around the world in need of an upper limb assistive device. While many of the prosthetics are suitable for and strong enough for plumbers and electricians, many of the individuals the organization works with are children, who will need prosthetics of several different sizes as they grow.

The Code42 volunteers

Joseph and Tom have both been with Code42 since 2016. Tom said one of the big attractions to working here is the company’s “strong unselfish desire to see us succeed in building things.” Joseph agreed. “Being afforded the opportunity to take time off to give back to the community to make a difference is rarer than it should be,” he said. Both say they’ve never worked anywhere before that supported volunteering.

Around Code42, both Tom and Joseph are well-known for their shared “addiction” to 3D printing. “A while back, Tom came to me and asked if I would be interested in getting involved with an organization that involves 3D-printing for those in need,” said Joseph. e-NABLE provided a perfect outlet.

“ Getting the chance to work on projects that give back to the community is rewarding. I’d be doing this project even if I didn’t work at Code42, but it is nice to know that my company is supportive and encouraging of my efforts. ”

How it’s helping today

“Traditional prosthetics can be extremely expensive,” said Joseph. “Most people, I don’t think, realize just how expensive a prosthetic can be and to significantly lower that barrier for people is great.” A traditional basic hook-style prosthetic can easily cost $400 to $600. Joseph stressed that the costs can stack up considerably for children, who will need multiple prosthetics as they grow.

In comparison, printed hands cost under $20, and they can easily be enlarged as kids grow. Tom added that while they’re helping make prosthetics more affordable, they also are helping children express themselves. “I have seen volunteers even theme the prosthetics after superheroes like Captain America or Iron Man.”

Bringing it all home

Volunteering helps others, of course, but it also benefits those who do the volunteering. Tom said that this work has helped him learn more about 3D printing in general and how this young field is full of untapped potential. “I think that having the opportunity to work on projects like this is special because it shows Code42 is aware of the needs of others.”

“Having creative outlets, in general, is important to stay engaged at any job,” added Joseph. “Getting the chance to work on projects that give back to the community is rewarding. I’d be doing this project even if I didn’t work at Code42, but it is nice to know that my company is supportive and encouraging of my efforts.”

Code42 supports the efforts of volunteers like Tom and Joseph with our Volunteer Time Off (VTO) program. Since 2016, we’ve been promoting volunteerism via Code42 Cares, giving every employee two paid days off per year to volunteer for causes they’re passionate about.

For more information about e-NABLE, including how to become an approved creator for the organization, visit enablingthefuture.org.

Welcome Aboard to our 2018 Interns!

Two offices. 1,678 applicants. 21 new summer interns.

Code42 recently welcomed a new class of summer interns, and we couldn’t be more excited to have them join us for the summer. The 21 young people who make up the 2018 summer intern class are unique, brilliant and valued members of our team.

At Code42, our internship program is built around three guiding principles: To provide interns with real-world professional experiences; to build meaningful connections that last a lifetime; and to receive real-time feedback, evaluation and mentoring.

“I have been looking forward to this internship since I received the offer in December,” said product design intern Stephanie Zapuchlak. “I came in with high expectations and somehow Code42 and my wonderful team have blown those expectations out of the water. Not only am I working on real-life projects that I can add to my portfolio, but I also have acquired a second family in my team.

“I also was fortunate enough to help with the User Experience Professionals Association event, where I networked with other UX professionals from around Minnesota. I beamed with pride as my team spoke passionately about product design while on the panel. 10/10 internship!”

“ I came in with high expectations and somehow Code42 and my wonderful team have blown those expectations out of the water. ”

Over the course of their 13 weeks with us, our interns will be totally immersed in our culture and get a chance to live out our Code42 values. Our interns will also participate in a “#code42coffeeconnections” social media challenge, attend a night of baseball with their managers and mentors, and use their Volunteer Time Off (VTO) days to give back to the community and leave the world a better place.

During their time at Code42, the interns will also have the opportunity to join our executive team during weekly “Lunch and Learn” sessions, giving them a unique opportunity to learn from our senior leaders in a small group setting. Additionally, interns are involved in their team’s day-to-day projects, helping achieve team goals and metrics. This type of responsibility and real-world experience is truly where the program’s value can be found and what will make their experiences unforgettable. We are proud to play a critical part in helping these talented students build the lifelong skills they need for a successful career.

“ While I received a solid foundation at school, I was craving a challenge and exposure to real-world problems and applications. I got exactly what I hoped for! ”

“Prior to my internship with Code42, my experience was limited to my computer science courses,” said development intern Jack Hysell. “While I received a solid foundation at school, I was craving a challenge and exposure to real-world problems and applications. I got exactly what I hoped for! In just the few short weeks that I have been here, I have worked with internal APIs, implemented JUnit tests, and delved into Spring Boot applications. Perhaps the greatest part of this experience has been my team interactions. I’m not treated like an intern. My mentor and colleagues assign real problems, and encourage me to provide input. While it can be terrifying at first, full immersion is truly the best approach. I am definitely a different developer than I was three weeks ago, and I can’t wait to see where I am at the end of this experience!”

Congratulations interns, welcome to the team!

Code42 STEM

On Coder Day, Code42 Invests in its Families and a More Technical Future

At Code42, one of the ways we invest in our employees is to invest in their families – which is why Take Our Daughters and Sons to Work Day is a highlight of our year. In Code42-style, we call it “Bring Your Coder to Work Day.” Employees bring their kids to the office for a first-hand look at what Mom or Dad does at work – and to take part in some fun science and tech activities while they are at it.

This year, on April 26th, we opened our doors at our Minneapolis headquarters to welcome 200 kids – more than ever. They became “Junior Guardians” for the day (a theme based off of the Guardians of the Galaxy movies), learned about our core values, joined sing-a-longs and paraded through the office in costumes they created. Older children learned to code with binary numbers and built their first websites. There was even a chance to learn about mindfulness and give yoga a try.

Coder Day is a blast, but it’s a lot more than just a good time. Coder Day gives the next generation an opportunity to experience creating technology, not just using it. Exposing our children to STEM topics helps them learn more about the world and sets them up for success in a more technical future.

Coder Day is made possible by the amazing volunteers who dedicated their day to teaching our youth and making the experience a unique and memorable one for each and every child. We are already planning for next year and can’t wait to do it all again!

Here are some of the websites created by our kids:

If you would like to learn more about how you can introduce your child to STEM education, please visit the NEA’s STEM resources page.

Evolution18: Cybersecurity Investigations: From Hollywood to the White House to Your Company

Cybersecurity Investigations: From the White House to Your Company

Cybersecurity investigations, from Hollywood fiction to your company’s reality, were one of the key topics at Code42’s annual Evolution18 customer conference April 9 – 11 in San Francisco.

While the Hollywood version of cybersecurity investigations includes a geek sitting in a dark room in front of a computer screen having an “aha!” moment, real-life cybersecurity investigations are incredibly complex. Guest keynote speaker Theresa Payton should know. In addition to being a national data security expert and former White House CIO, Payton is a star of the CBS series “Hunted,” a reality TV show about cyber investigators who hunt down people living off the grid.

“If solving our cybersecurity and privacy issues were as simple as following security best practices, we would all be safe,” Payton said in her keynote presentation on April 11, striking a serious note between regaling the audience with stories from her time in the White House and her experience on reality television. “In spite of talented security teams and hours of security training, breaches still happen. That’s why I want you to consider a new path to security, that of ‘designing for the human.’ This is the path that recognizes that humans can and do make mistakes, and plan for a way to respond when that inevitably happens.”

To that end, Evolution18 also marked the release of Code42 Forensic File Search, our latest enterprise security product. Code42 Forensic File Search reduces the time it takes to investigate, respond to and recover from data security incidents. By collecting file metadata and events from employee endpoints and making them searchable via the cloud, Forensic File Search provides comprehensive answers to challenging data security questions. It tackles tough questions like:

  • Does known malware have, or has it ever had, a foothold in our environment?
  • Has a particular crypto-mining agent been installed on our employees’ computers? Who has it now?
  • What files did an employee download or delete in the months before resigning?

“Responding to cyberattacks takes too long, exposing organizations to greater risks and climbing costs,” said Joe Payne, president and chief executive officer of Code42. “By collecting, analyzing and indexing file events, Code42 Forensic File Search helps organizations shrink time-to-response windows. Our new product provides visibility to where data lives and moves across all endpoints in seconds.”

Other highlights of the conference included these sessions:

Whether through ignorance or malintent, employees are one of the top data security threats to any organization. Code42 Senior Director of Information Security Jadee Hanson provided a behind-the-scenes look at running an insider threat program to prevent employees from leaking, exposing and exfiltrating data. Hanson also moderated a “Futurist Discussion” panel with industry leaders to discuss what’s on the horizon for data security. Thanks to these panels, attendees learned what’s to come in the near future of cybersecurity, what will become the latest buzzwords in the field and much, much more.

Minimizing user downtime during a device migration is a critical part of any IT strategy. Best practices discussed during a packed-room panel session with Code42 customer MacDonald-Miller include self-service migration and data restoration as well as managing user expectations.

Data compliance for higher education can be complex, particularly considering that federal grant requirements now require data retention for seven years. In a game show format complete with swag prizes and packs of ramen noodles (Get it? Higher ed? Ramen?) customers learned how to tell if data is leaving the university and how to build Freedom of Information Act requests into their data management issues. Yum.

The reviews from attendees are already rolling in, and we’re blushing at the positive responses:

“Love hearing what other Code42 customers are doing!” – desktop support specialist, Entrust Datacard

“Thanks to everyone at Code42 for putting on such a terrific conference! I’ve already started reaching out to my peers–encouraging them to attend Evolution19.” – IT program manager, University of Colorado Skaggs School of Pharmacy and Pharmaceutical Sciences

“Already registered for Evolution19 and looking forward to Colorado. See you guys then!” –systems administrator, Utex Industries

“Thank you, Code42! It was a great Evolution.” – computer support analyst, Stanford University

Dozens of customers have already signed up for Evolution19. Interested in joining them? Registration for next year’s conference, April 30 – May 2 in Denver, is open now. We hope to see you there!

Forrester’s Mitigating Insider Threats: The Security Playbook

By submitting this form, you agree to Code42’s Privacy Policy.

Code42 security industry awards

Three Security Industry Award Wins, and Why It Matters

What a month it’s been for Code42!

Last week, we hosted Evolution18, our annual customer conference; we launched Code42 Forensic File Search, an innovative, game-changing product for the information security market; and in the past few days, we were honored with three security industry awards:

Each of these awards is a true honor. Together, they point to the innovation we are driving, and how that’s paying off for our customers. Here are three takeaways.

Innovation drives us

The three awards we won point to our commitment to innovation. It’s a priority for us. We drive innovation to help our customers succeed – safeguarding their ideas wherever they live or move, whether that be on endpoints or in the cloud.

The value of visibility

You can’t protect what you can’t see. Our focus on visibility – helping companies see where their data lives and moves – is striking a chord with our customers and the industry in general.

When our customers win, we do too

While receiving these industry awards is a great honor, what’s even more meaningful for us is being able to recognize our customers.  Just last week at Evolution, we honored a select group of customers with our Evolutionaries awards. These annual awards celebrate our customers for their extraordinary innovations in the development, deployment and adoption of applications in data recovery and visibility. We’ll profile these winners in another post; I think you’ll be impressed with what they have accomplished.

There’s an unmistakable link between the amazing results our Evolutionaries are delivering for their organizations, and our selection as winners of these industry awards. By helping them win their data security battles, their businesses win, and we do too.

Evolution18 Begins Today

We’re thrilled to say that Evolution18, our annual customer conference, kicks off today! We are looking forward to welcoming customers and partners from around the globe to San Francisco. During the next three days, attendees will hear the latest on all the most important topics in data security, connect with industry experts, learn from the pros in our 30+ breakout sessions, get certified on Code42 administration – and, we think, have some fun in the process!

Of course, we understand that not everyone can join us in California. That’s why we plan to post some of the biggest news from the event right here. This includes an exciting announcement about Code42’s newest product, which will take our data security capabilities to a new level, as well as the winners of our annual Evolutionaries Awards. We love to share success stories when we hear them. The awards honor Code42 customers that have demonstrated dedication to delivering the best possible data security and recovery solutions.

We’re also looking forward to sharing event highlights like the keynote speech from Theresa Payton, one of the nation’s leading experts in cybersecurity and IT strategy. Theresa served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff. Theresa has already shared some great thoughts on the state of cybersecurity with us, and we can’t wait to hear more.

Stay tuned to the blog all week for more on Evolution18.

Up Close with Theresa Payton: Former White House CIO and Guest Keynote at Evolution (Part 1)

Meet Evolution Guest Keynote Theresa Payton (part 1)

We are excited to welcome Theresa Payton, one of the nation’s leading experts in cybersecurity and first female White House CIO, as our guest keynote at Evolution18. Don’t miss the chance to meet her in person at our annual conference, April 9-11, in San Francisco. It’s not too late to register and attend!

Before she takes center stage, we asked Theresa to share her thoughts on the state of the security space and how it has evolved since her time as White House CIO. In Part One of our interview, she talks about the evolution of security threats, social media data privacy and enterprise cybersecurity blind spots.

Code42: How have security threats evolved since your time in the White House? Are there any new threats that you didn’t anticipate?

Theresa Payton: Many of the challenges companies face today are similar to the security challenges at the White House. The pivotal moment for me that shifted how I design a security strategy started at the Executive Office of the President, in the White House. The security at the White House could not be just about boxes, servers, oppressive end-user policies and blinking lights in the Security Operations Center. Security at the White House came down to the people who served at 1600 Pennsylvania Avenue, across America and abroad. We knew we had to address the hearts and minds of the staff if we wanted to protect their privacy and security. After all, if solving cybersecurity and privacy issues was as simple as following security best practices, we would all be safe. It’s not that simple.

The cybercrime threats to organizations change every day and move all over the globe. The biggest change is the larger hit to an operation’s systems, especially in the cases where the victim has been hit by ransomware. That’s why companies need to make strategic investments to protect themselves.

The attacks that make the news typically have complex motivations that are both economic and political; but the vast majority of attacks, many unreported, are simply about the money.

As far as any threats that I didn’t anticipate, not so far; but I can say that regarding my predictions, I wish I were wrong.

C42: Based on your time in the government, do you see a law like GDPR ever being passed in the U.S.?

TP: It is possible we will see Congress one day pass a consumer bill of rights for the Internet, digital safety and privacy; but I think we are several years away from that.

Privacy laws, the court systems and law enforcement’s ability to source cases are lagging with the digital age. Technology, specifically drones, have been a great tool for law enforcement in spotting potential victims and helping rescue those who need help in dangerous conditions. But with the popularity of domestic drones, we now have flying spies in our neighborhoods. This is a discussion that as a society we need to have. It’s common knowledge that it’s not polite to peep through people’s windows—it’s illegal.

But do we have any laws protecting us from social media companies collecting and selling our data, credit bureaus from aggregating our spending habits and selling our information, and our neighbors’ surveillance cameras or overhead drones from gathering our data? We don’t—at least not yet.

C42: What are enterprises missing when they think about data security?

TP: It’s very challenging for companies to get their arms around their data architecture. When companies have highly regulated data elements such as HIPAA, PII, PCI-DSS and others, we also see “data haves” and “data have nots” as far as security in those companies. I would ask your business team and your data architects a few questions to see what might be missing from your data security plan.

The first one is to ask, “Have we actually had a company discussion on what our top two or three most critical assets are? And do we agree?” I think a very simple way to do that is you get in a staff meeting. Tell everybody no peeking. Pass out index cards and have everybody write down their list. Ask a facilitator to help you force rank each list until all agree on a company list.

The next question you should ask is, “What is our worst digital-disaster nightmare?” Name it and define it. Practice (dealing with) that nightmare. Learn what capabilities you have and don’t have. Discover where you need new partners to assist you. And then figure out what you can’t mitigate on your own through partners, through process, through technology—that’s what you want to go get cyber liability insurance to cover.

The other thing that I think companies overlook is that you can increase your security and reliability and also your resiliency if you pick the right cloud-services provider. If you are holding on to some legacy mail platforms and things like that, it may be time to reintroduce making a strategic decision around the cloud. That could save you money and it could, if you pick the right provider, create a whole new set of security protections and protocols you don’t have in-house.

More about Theresa: A pioneering technology leader

Theresa Payton is one of the nation’s leading experts in cybersecurity and IT strategy. She is currently CEO of Fortalice Solutions, an industry-leading security consulting company; and co-founder of Dark Cubed, a cybersecurity product company.

Theresa began her career in financial services, and after executive roles at Bank of America and Wachovia, she served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff.

Schneider Electric Achieves Multiple Benefits with Code42

Schneider Electric Sweden, an energy management company, lives or dies based on the success of their team of well-traveled consultants. And their consultants’ success is directly tied to the sensitive data that travels with them wherever they go. In fact, Schneider estimates the value of the data on a consultant’s laptop to be $150,000.

Because of the importance of this data–and the dire business consequences of it being lost, stolen or simply unavailable–Schneider decided to upgrade their backup and recovery solution to Code42.

The change was easy to justify. Schneider implemented the Code42 solution and it has already paid off for them in substantial ways:

  • Laptop upgrades in one sixth the time
  • Over 7,000 hours of employee downtime saved
  • Successful recovery from a WannaCry ransomware attack

Check out the full case study to learn more about how Schneider Electric keeps their most precious resource–their consultants–as productive as possible.

Facebook Twitter Google LinkedIn YouTube