Code42 STEM

On Coder Day, Code42 Invests in its Families and a More Technical Future

At Code42, one of the ways we invest in our employees is to invest in their families – which is why Take Our Daughters and Sons to Work Day is a highlight of our year. In Code42-style, we call it “Bring Your Coder to Work Day.” Employees bring their kids to the office for a first-hand look at what Mom or Dad does at work – and to take part in some fun science and tech activities while they are at it.

This year, on April 26th, we opened our doors at our Minneapolis headquarters to welcome 200 kids – more than ever. They became “Junior Guardians” for the day (a theme based off of the Guardians of the Galaxy movies), learned about our core values, joined sing-a-longs and paraded through the office in costumes they created. Older children learned to code with binary numbers and built their first websites. There was even a chance to learn about mindfulness and give yoga a try.

Coder Day is a blast, but it’s a lot more than just a good time. Coder Day gives the next generation an opportunity to experience creating technology, not just using it. Exposing our children to STEM topics helps them learn more about the world and sets them up for success in a more technical future.

Coder Day is made possible by the amazing volunteers who dedicated their day to teaching our youth and making the experience a unique and memorable one for each and every child. We are already planning for next year and can’t wait to do it all again!

Here are some of the websites created by our kids:

If you would like to learn more about how you can introduce your child to STEM education, please visit the NEA’s STEM resources page.

Six Months a Guardian

Last week marked my six-month anniversary at Code42, and I couldn’t be prouder of our teams – what we’re focused on doing, our vision for where we’re going and what I know we’re going to do in the future. We are pouring blood, sweat and tears into creating a safer future for our customers’ ideas, a protected world for our users and a world of growth for those bold organizations that embrace innovation, forging a new future in their respective industries.

To our administrators: If you think about the change that we’ve endured in the past five years, it’s shocking. We’ve been asked to embrace mobility, cloud, virtualization, containerization, the server-less world, Infrastructure as a Service, Software as a Service, identity, federated authentication and compliance. It’s seemingly been an endless sea of changes, and the plight we’ve all faced is only compounded by the reality of data darkness we live in. However, Code42 is here to help.

To our users: Our teams here truly believe your ideas are beautiful and important. We wake up daily determined to figure out new ways to protect them. We recognize how every individual contributes to the greater growth of their organization. We’re here to keep your ideas safe, allowing you to contribute at your absolute best.

To the security teams that rely on Code42 to defend your organizations from the endless darkness of the cybersecurity world we live in: Realize that if there was a magic switch on the wall to dispel the data darkness, we’d flip it to let in the light. We know you and your users are under constant assault from individuals who seek to steal, ransom and destroy the ideas that will grow your organization. We’ve made countless changes to increase our defenses of your data and to stay one step ahead of those who seek to destroy or hold captive your value. We’re a partner in this journey.

– Rob

P.S. – Last, but not least, to my fellow guardians: Thank you for an amazing first six months. You have done incredible work and I’m so proud of the work we’re doing to make the world a safer place.

Code42 security industry awards

Three Security Industry Award Wins, and Why It Matters

What a month it’s been for Code42!

Last week, we hosted Evolution18, our annual customer conference; we launched Code42 Forensic File Search, an innovative, game-changing product for the information security market; and in the past few days, we were honored with three security industry awards:

Each of these awards is a true honor. Together, they point to the innovation we are driving, and how that’s paying off for our customers. Here are three takeaways.

Innovation drives us

The three awards we won point to our commitment to innovation. It’s a priority for us. We drive innovation to help our customers succeed – safeguarding their ideas wherever they live or move, whether that be on endpoints or in the cloud.

The value of visibility

You can’t protect what you can’t see. Our focus on visibility – helping companies see where their data lives and moves – is striking a chord with our customers and the industry in general.

When our customers win, we do too

While receiving these industry awards is a great honor, what’s even more meaningful for us is being able to recognize our customers.  Just last week at Evolution, we honored a select group of customers with our Evolutionaries awards. These annual awards celebrate our customers for their extraordinary innovations in the development, deployment and adoption of applications in data recovery and visibility. We’ll profile these winners in another post; I think you’ll be impressed with what they have accomplished.

There’s an unmistakable link between the amazing results our Evolutionaries are delivering for their organizations, and our selection as winners of these industry awards. By helping them win their data security battles, their businesses win, and we do too.

Evolution18 Begins Today

We’re thrilled to say that Evolution18, our annual customer conference, kicks off today! We are looking forward to welcoming customers and partners from around the globe to San Francisco. During the next three days, attendees will hear the latest on all the most important topics in data security, connect with industry experts, learn from the pros in our 30+ breakout sessions, get certified on Code42 administration – and, we think, have some fun in the process!

Of course, we understand that not everyone can join us in California. That’s why we plan to post some of the biggest news from the event right here. This includes an exciting announcement about Code42’s newest product, which will take our data security capabilities to a new level, as well as the winners of our annual Evolutionaries Awards. We love to share success stories when we hear them. The awards honor Code42 customers that have demonstrated dedication to delivering the best possible data security and recovery solutions.

We’re also looking forward to sharing event highlights like the keynote speech from Theresa Payton, one of the nation’s leading experts in cybersecurity and IT strategy. Theresa served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff. Theresa has already shared some great thoughts on the state of cybersecurity with us, and we can’t wait to hear more.

Stay tuned to the blog all week for more on Evolution18.

Meet Evolution Guest Keynote Theresa Payton (part 2)

We are excited to welcome Theresa Payton, one of the nation’s leading experts in cybersecurity and first female White House CIO, as our guest keynote at Evolution18. Don’t miss the chance to meet her in person at our annual conference, April 9-11, in San Francisco. It’s not too late to register and attend!

Before she takes center stage, we asked Theresa to share her thoughts on the state of the security space and how it has evolved since her time as White House CIO. In part two of our interview, Theresa talks about the investigation process, the risks of the move to the cloud and securing the digital transformation.

Code42: Why do cybersecurity investigations take so long? What steps can security teams take today to shorten them?

Theresa Payton: In Hollywood movies, a geek sits at a computer in the dark, and starts typing away at a keyboard. The geek looks at lists of files and computer code and then, “aha,” finds the evidence that’s needed. If only it worked that way. There are no magic programs that allow investigators to do their work. It’s a literal “whodunit” when there is an incident. Cybersecurity investigations are complex. Often you do not have a witness to talk to that saw the cybercriminal deposit the malware or break into the company.  Cybercriminals may delete their tracks, making it hard to pinpoint what they actually stole and how.

One of the best things you can do is to have a plan in advance. Practice digital disasters and practice doing forensics. Set ground rules. Identify the tools you need to purchase and the training your team will need. Interview vendors and choose a vendor that you can work with if the forensics is too overwhelming to handle in house or if you want a second opinion.

C42: What are the risks facing companies as they embrace the move to the cloud?

TP: Think about the data that you and your customers are going to generate. Using cloud platforms can sometimes be a better option than managing your own servers.

You do need someone on your team worrying about the security configurations of your cloud instance. The cloud service providers do not do this for you. There remains no set-it-and-forget-it option when it comes to security.

C42: IT teams are tasked with moving the business forward by helping employees be more effective and embracing the mobile workforce. What advice do you have for security leaders embracing this digital transformation?

TP: No company is perfect. It’s not a technology issue. It’s a creativity issue and an issue of business risks. We have to really try to understand what risks we are willing to take, and which ones are non-negotiable business risks.

What you see in safer companies are the executives taking this very seriously. You often see a governance board, which could be different executives from around the company—so you may see C-suite members from marketing, customer service, legal, finance and risk.

Often, finance is assuming the role of getting that group together because finance is also thinking about the business strategy, business enablement and reducing business risk. Spending that time to talk upfront at the executive level about security as it relates to the organization’s most critical assets is vital to making sure that the issue actually permeates through the rest of the company.

A key item to remember about security is that in spite of following regulatory compliance checklists and compliance frameworks, bad things still happen. Following checklists didn’t stop WannaCry or Petya from spreading, HBO from getting hacked, or help Twitter, Netflix and Amazon during the scary hours of Friday, October 21, 2016, when we realized the Internet was slowing down and, in many cases, not available at all.

What was the cause of the slowdown of the Internet last year? Weaponized baby cams and other Internet of Things devices. It was on that fateful day that the Marai Botnet attack hit Dyn. Dyn, a cloud-based Internet performance management company was the target of a disruptive Distributed Denial of Service (DDoS) attack. The attack directed networked devices to route traffic at the Dyn’s Domain Name Servers (DNS). As a result, Dyn could not respond to the flood of DNS requests and consumers could not reach web sites. It was the biggest, baddest DDoS attack ever… at least until the next time.

C42: Has Hollywood and the media done a good job of portraying cybersecurity and the threats we face? Any examples that have proven to be accurate/predictive?

TP: Our reality TV show, Hunted, did a good job portraying the challenges investigators face when chasing fugitives and the challenges the public faces based on how they live their digital lives. I believe Endemol Shine and CBS did a good job portraying how your digital tracks can betray you. The one thing you did not see were the hours and hours of our team digging and coming up with nothing. You just see the exciting parts. If you have not watched it, my mom says it’s her favorite show and you should trust my mom.

More about Theresa: A pioneering technology leader
Theresa Payton is one of the nation’s leading experts in cybersecurity and IT strategy. She is currently CEO of Fortalice Solutions, an industry-leading security consulting company; and co-founder of Dark Cubed, a cybersecurity product company.

Theresa began her career in financial services, and after executive roles at Bank of America and Wachovia, she served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff.

Up Close with Theresa Payton: Former White House CIO and Guest Keynote at Evolution (Part 1)

Meet Evolution Guest Keynote Theresa Payton (part 1)

We are excited to welcome Theresa Payton, one of the nation’s leading experts in cybersecurity and first female White House CIO, as our guest keynote at Evolution18. Don’t miss the chance to meet her in person at our annual conference, April 9-11, in San Francisco. It’s not too late to register and attend!

Before she takes center stage, we asked Theresa to share her thoughts on the state of the security space and how it has evolved since her time as White House CIO. In Part One of our interview, she talks about the evolution of security threats, social media data privacy and enterprise cybersecurity blind spots.

Code42: How have security threats evolved since your time in the White House? Are there any new threats that you didn’t anticipate?

Theresa Payton: Many of the challenges companies face today are similar to the security challenges at the White House. The pivotal moment for me that shifted how I design a security strategy started at the Executive Office of the President, in the White House. The security at the White House could not be just about boxes, servers, oppressive end-user policies and blinking lights in the Security Operations Center. Security at the White House came down to the people who served at 1600 Pennsylvania Avenue, across America and abroad. We knew we had to address the hearts and minds of the staff if we wanted to protect their privacy and security. After all, if solving cybersecurity and privacy issues was as simple as following security best practices, we would all be safe. It’s not that simple.

The cybercrime threats to organizations change every day and move all over the globe. The biggest change is the larger hit to an operation’s systems, especially in the cases where the victim has been hit by ransomware. That’s why companies need to make strategic investments to protect themselves.

The attacks that make the news typically have complex motivations that are both economic and political; but the vast majority of attacks, many unreported, are simply about the money.

As far as any threats that I didn’t anticipate, not so far; but I can say that regarding my predictions, I wish I were wrong.

C42: Based on your time in the government, do you see a law like GDPR ever being passed in the U.S.?

TP: It is possible we will see Congress one day pass a consumer bill of rights for the Internet, digital safety and privacy; but I think we are several years away from that.

Privacy laws, the court systems and law enforcement’s ability to source cases are lagging with the digital age. Technology, specifically drones, have been a great tool for law enforcement in spotting potential victims and helping rescue those who need help in dangerous conditions. But with the popularity of domestic drones, we now have flying spies in our neighborhoods. This is a discussion that as a society we need to have. It’s common knowledge that it’s not polite to peep through people’s windows—it’s illegal.

But do we have any laws protecting us from social media companies collecting and selling our data, credit bureaus from aggregating our spending habits and selling our information, and our neighbors’ surveillance cameras or overhead drones from gathering our data? We don’t—at least not yet.

C42: What are enterprises missing when they think about data security?

TP: It’s very challenging for companies to get their arms around their data architecture. When companies have highly regulated data elements such as HIPAA, PII, PCI-DSS and others, we also see “data haves” and “data have nots” as far as security in those companies. I would ask your business team and your data architects a few questions to see what might be missing from your data security plan.

The first one is to ask, “Have we actually had a company discussion on what our top two or three most critical assets are? And do we agree?” I think a very simple way to do that is you get in a staff meeting. Tell everybody no peeking. Pass out index cards and have everybody write down their list. Ask a facilitator to help you force rank each list until all agree on a company list.

The next question you should ask is, “What is our worst digital-disaster nightmare?” Name it and define it. Practice (dealing with) that nightmare. Learn what capabilities you have and don’t have. Discover where you need new partners to assist you. And then figure out what you can’t mitigate on your own through partners, through process, through technology—that’s what you want to go get cyber liability insurance to cover.

The other thing that I think companies overlook is that you can increase your security and reliability and also your resiliency if you pick the right cloud-services provider. If you are holding on to some legacy mail platforms and things like that, it may be time to reintroduce making a strategic decision around the cloud. That could save you money and it could, if you pick the right provider, create a whole new set of security protections and protocols you don’t have in-house.

More about Theresa: A pioneering technology leader

Theresa Payton is one of the nation’s leading experts in cybersecurity and IT strategy. She is currently CEO of Fortalice Solutions, an industry-leading security consulting company; and co-founder of Dark Cubed, a cybersecurity product company.

Theresa began her career in financial services, and after executive roles at Bank of America and Wachovia, she served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff.

Code42 Employees Give Back to the Community with Volunteer Hours

I came across a quote online that was written by the well-known actor, Will Smith. It read, “I want the world to be different because I was here. However lofty or crazy or delusional that may sound, I want people’s lives to be better because I was here.” Will may have played a few ‘out there’ characters during his acting career, but his mission to leave the world a better place and make an impact on people’s lives is far from delusional to the employees at Code42.

We believe so strongly and wholeheartedly in leaving the world a better place that we made it one of our core values. In pursuit of that value, Code42 offers every employee two paid volunteer time off (VTO) days a year.  Employees can give back to the community that they live and work in by sharing their time, talents and resources with a charitable cause or non-profit organization. The best part is that the employees are not directed to a specific organization. They choose the organization that matters most to them.

As a company, we believe that we have a corporate social responsibility to better the experience of those we share this world with. Dr. Martin Luther King, Jr. once said, “Life’s most persistent and urgent question is: ‘What are you doing for others?’” Various departments at Code42 listened to this call and chose to volunteer as a team. The benefits of volunteering as a team are endless. By volunteering together, you not only help others, but also help yourself improve as a person. Giving back creates an opportunity for the team to help make change in a community and work towards something great together, all while building your own self-worth.

We are proud to say that in 2017 Code42 employees contributed more than 3,700 volunteer hours as part of our Code42 Cares initiative. The VTO program is an employee driven, grassroots committee that organizes and supports employees to volunteer. This committee does more than just provide volunteer opportunities. They go above and beyond their normal full-time job responsibilities to provide enriching life experiences that impact people personally and professionally.

In 2017, Code42 employees participated in a wide variety of volunteer activities, including working with the Build-A-Wheelchair Foundation, the American Red Cross and Habitat for Humanity. Employees have knit hats and scarves for the homeless, built bicycles for underprivileged children and packed 53,000 pounds of food at Second Harvest Heartland, an organization that collects and distributes food through various programs and services. One employee-led effort – the Extra Life charitable gaming marathon – raised over $10,000 for a local children’s hospital.

Code42’s commitment to giving back has not gone unnoticed by the organizations with which our employees have volunteered.

“The Sheridan Story’s mission is to fight child hunger through community and school partnerships, and we can’t do it without the community.” said Rob Williams, executive director at The Sheridan Story. “Volunteering is one of the most important ways to make an impact, and we are incredibly thankful for our friends at Code42. I appreciate the company’s commitment to providing paid time off for their employees to serve with their time.”

If you are looking for a career that challenges you, inspires you and truly emphasizes helping others, then check out the open positions at Code42 here. We invite you to help us leave the world a better place. #becode42

The Top 10 Reasons to Attend Evolution18

Looking to learn what’s next from Code42? Join us April 9-11, 2018, at the Westin St. Francis in San Francisco for Evolution, our annual education conference. At Evolution18, you’ll hear the latest on all the most important topics in data security, connect with industry experts, learn from the pros in our 30+ breakout sessions, get certified on Code42 administration – and you’ll have a pretty good time while doing it all! Want to learn more? Here are the top 10 reasons to attend.

10. Evolution opening keynote. Code42 CEO Joe Payne and other special guests will take the stage to talk about all things landscape and product. If you’ve ever attended an Evolution opening keynote, you know that they always include surprises and keep the entertainment coming the entire time.

9. Education and certification. Check out the educational sessions that the conference offers. You can get in-person training and make use of that training budget to come to the rest of the conference! Each course offers a certificate of completion, and current Code42 EDU members can even take their admin certification exam. Talk about maximizing your time and money!

8. Evolution sponsors. It’s not easy to get budget to go to any conference, so it’s great to have sponsors like HGST and Jamf, so attendees can talk to other business partners and make the most of their time.

7. The Evolution Mobile App. The Evolution mobile app is one of the most engaging conference apps we’ve seen. Attendees talk, network, make plans and even engage in some friendly competition, all via the app. It also allows for live feedback and Q/A with presenters. This tool makes coming the conference a breeze!

6. Onsite meetings + networking. Every year, attendees tell us that networking and hanging with Code42 peers is the highlight of the week. Book meetings with anyone on the Code42 team, from customer champions to product owners. You may find yourself sitting and having breakfast next to the CEO, which always ends in great conversation!

5. Customer-led sessions. Have you seen our customer speaker lineup? Listen to talks from Juniper Networks, Lyft and BAYADA Home Health to learn just what’s going in IT and Security from around the US. Customer-led sessions are always a huge hit at Evolution!

4. Product launches. You won’t know until you show up. We can’t say much more than that, but there are exciting things in the works for Code42, and those in attendance will be the first to get the scoop.

3. The conference party at the Exploratorium. Anyone who attends Evolution is invited to the Exploratorium for a night of exploring their inner geek. We’ll eat local San Francisco bites and sip libations. It’s going to be a great night for networking with peers.

2. Theresa Payton Guest Keynote. Leading cybersecurity authority and former White House Chief Information Officer Theresa Payton will be giving us a ton of insights on the security landscape today. You might even spot her having lunch with some of our attendees. We can’t wait to meet her.

1. Security, security, security. For the first time ever, Evolution has added a security track. The track features industry experts such as Forrester Vice President and Security and Risk Research Director Stephanie Balaouras and speakers from the SANS Institute. Security pros will also listen to panel discussions with security professionals from IBM, Entrust Datacard and Palo Alto Networks. Attendees in this exclusive track will hear and discuss approaches to employee security training, vendor management, new tactics in security operations and more. You won’t want to miss this!

Customer Reviews Recognize Code42 as Industry Leader

At Code42, we have always viewed customer referrals as the gold standard. That’s why we’re so proud to announce that Code42 has been recognized as a 2018 Top 100 Software Company and Top 50 Mid-Market Software Company by G2 Crowd. G2 Crowd is an independent research company that provides an online platform for software buyers to learn about technology solutions based on the reviews of their users. It is these reviews of the Code42 platform that drove our placement on both lists, and we would like to extend our sincere thanks to our customers for their continued partnership.

Code42 is ranked number 63 out of 100 for software companies of all sizes, and number 29 out of 50 for mid-market software companies. We’re proud to appear on these lists along with the absolute biggest names in the software and technology sectors, such as Slack, Google, Mailchimp, SurveyMonkey and more.

While analyst rankings are important, we know that technology buyers rely heavily on hands-on experience from their peers. Positive reviews and inclusion on lists such as these help us to continue to make improvements to our product. Reviews of the Code42 platform on G2 Crowd consistently cite its ease of setup and use, reliability, customer support and scalability. To see more user reviews on G2 Crowd, visit the Code42 profile page here.

For G2 Crowd’s complete 2018 Software Company rankings, read the report here.

Join Code42 at Evolution18

Ready to take your Code42 administration skills to the next level? Join us April 9-11, 2018, at the Westin St. Francis in San Francisco for Evolution, our annual education conference. At Evolution18, you’ll hear the latest on all the most important topics in data security, connect with industry experts, learn from the pros in our 30+ breakout sessions, get certified on Code42 administration – and you’ll have a pretty good time while doing it all!

For Code42 administrators, Evolution18 presents a valuable opportunity to learn the latest information and best practices in endpoint data protection, visibility and recovery, including the opportunity for instructor-led product trainings and certification. Some of the scheduled sessions include “How Industry Leaders are Approaching Threat Hunting,” “Running the Business vs. Building the Business: An IT Leader’s Guide to Demonstrating Business Value,” “How Code42 Uses Code42: Our Insider Tips and Tricks” and many more.

Evolution18 also presents the opportunity to hear from some of the thought leaders in the cybersecurity space. We are especially thrilled to hear from our just-announced guest keynote speaker, Theresa Payton. Whether you know her as the star of the CBS series “Hunted” or as the first woman to serve as White House chief information officer, her varied and unique experiences will certainly make for a can’t-miss keynote speech.

“We are thrilled to bring together customers for our annual conference, which has become a destination for the latest in data security education and Code42 product certifications,” said Joe Payne, president and CEO of Code42. “Our event draws IT and security thought leaders in charge of protecting some of the world’s most recognized brands. Attendees will hear from industry experts, like Theresa Payton, and discover ways to address some of the most important and complex data security challenges facing organizations today.”

We hope you can join us for Evolution18 this April in San Francisco. In addition to the opportunity to get certified in Code42 administration, the conference is always a great opportunity to connect with peers, industry insiders and Code42 employees. Plus, we always have a few special surprises in store for guests! Highlights from last year’s event included a welcome reception inspired by the foods of different San Francisco neighborhoods, a ping pong party with customized graffiti-tagged paddles, a claw machine loaded with Code42 swag and much more!

Watch the highlights from Evolution17, including the welcome reception and day 1 events.