Welcome Aboard to our 2018 Interns!

Two offices. 1,678 applicants. 21 new summer interns.

Code42 recently welcomed a new class of summer interns, and we couldn’t be more excited to have them join us for the summer. The 21 young people who make up the 2018 summer intern class are unique, brilliant and valued members of our team.

At Code42, our internship program is built around three guiding principles: To provide interns with real-world professional experiences; to build meaningful connections that last a lifetime; and to receive real-time feedback, evaluation and mentoring.

“I have been looking forward to this internship since I received the offer in December,” said product design intern Stephanie Zapuchlak. “I came in with high expectations and somehow Code42 and my wonderful team have blown those expectations out of the water. Not only am I working on real-life projects that I can add to my portfolio, but I also have acquired a second family in my team.

“I also was fortunate enough to help with the User Experience Professionals Association event, where I networked with other UX professionals from around Minnesota. I beamed with pride as my team spoke passionately about product design while on the panel. 10/10 internship!”

“ I came in with high expectations and somehow Code42 and my wonderful team have blown those expectations out of the water. ”

Over the course of their 13 weeks with us, our interns will be totally immersed in our culture and get a chance to live out our Code42 values. Our interns will also participate in a “#code42coffeeconnections” social media challenge, attend a night of baseball with their managers and mentors, and use their Volunteer Time Off (VTO) days to give back to the community and leave the world a better place.

During their time at Code42, the interns will also have the opportunity to join our executive team during weekly “Lunch and Learn” sessions, giving them a unique opportunity to learn from our senior leaders in a small group setting. Additionally, interns are involved in their team’s day-to-day projects, helping achieve team goals and metrics. This type of responsibility and real-world experience is truly where the program’s value can be found and what will make their experiences unforgettable. We are proud to play a critical part in helping these talented students build the lifelong skills they need for a successful career.

“ While I received a solid foundation at school, I was craving a challenge and exposure to real-world problems and applications. I got exactly what I hoped for! ”

“Prior to my internship with Code42, my experience was limited to my computer science courses,” said development intern Jack Hysell. “While I received a solid foundation at school, I was craving a challenge and exposure to real-world problems and applications. I got exactly what I hoped for! In just the few short weeks that I have been here, I have worked with internal APIs, implemented JUnit tests, and delved into Spring Boot applications. Perhaps the greatest part of this experience has been my team interactions. I’m not treated like an intern. My mentor and colleagues assign real problems, and encourage me to provide input. While it can be terrifying at first, full immersion is truly the best approach. I am definitely a different developer than I was three weeks ago, and I can’t wait to see where I am at the end of this experience!”

Congratulations interns, welcome to the team!

Code42 STEM

On Coder Day, Code42 Invests in its Families and a More Technical Future

At Code42, one of the ways we invest in our employees is to invest in their families – which is why Take Our Daughters and Sons to Work Day is a highlight of our year. In Code42-style, we call it “Bring Your Coder to Work Day.” Employees bring their kids to the office for a first-hand look at what Mom or Dad does at work – and to take part in some fun science and tech activities while they are at it.

This year, on April 26th, we opened our doors at our Minneapolis headquarters to welcome 200 kids – more than ever. They became “Junior Guardians” for the day (a theme based off of the Guardians of the Galaxy movies), learned about our core values, joined sing-a-longs and paraded through the office in costumes they created. Older children learned to code with binary numbers and built their first websites. There was even a chance to learn about mindfulness and give yoga a try.

Coder Day is a blast, but it’s a lot more than just a good time. Coder Day gives the next generation an opportunity to experience creating technology, not just using it. Exposing our children to STEM topics helps them learn more about the world and sets them up for success in a more technical future.

Coder Day is made possible by the amazing volunteers who dedicated their day to teaching our youth and making the experience a unique and memorable one for each and every child. We are already planning for next year and can’t wait to do it all again!

Here are some of the websites created by our kids:

If you would like to learn more about how you can introduce your child to STEM education, please visit the NEA’s STEM resources page.

Evolution18: Cybersecurity Investigations: From Hollywood to the White House to Your Company

Cybersecurity Investigations: From the White House to Your Company

Cybersecurity investigations, from Hollywood fiction to your company’s reality, were one of the key topics at Code42’s annual Evolution18 customer conference April 9 – 11 in San Francisco.

While the Hollywood version of cybersecurity investigations includes a geek sitting in a dark room in front of a computer screen having an “aha!” moment, real-life cybersecurity investigations are incredibly complex. Guest keynote speaker Theresa Payton should know. In addition to being a national data security expert and former White House CIO, Payton is a star of the CBS series “Hunted,” a reality TV show about cyber investigators who hunt down people living off the grid.

“If solving our cybersecurity and privacy issues were as simple as following security best practices, we would all be safe,” Payton said in her keynote presentation on April 11, striking a serious note between regaling the audience with stories from her time in the White House and her experience on reality television. “In spite of talented security teams and hours of security training, breaches still happen. That’s why I want you to consider a new path to security, that of ‘designing for the human.’ This is the path that recognizes that humans can and do make mistakes, and plan for a way to respond when that inevitably happens.”

To that end, Evolution18 also marked the release of Code42 Forensic File Search, our latest enterprise security product. Code42 Forensic File Search reduces the time it takes to investigate, respond to and recover from data security incidents. By collecting file metadata and events from employee endpoints and making them searchable via the cloud, Forensic File Search provides comprehensive answers to challenging data security questions. It tackles tough questions like:

  • Does known malware have, or has it ever had, a foothold in our environment?
  • Has a particular crypto-mining agent been installed on our employees’ computers? Who has it now?
  • What files did an employee download or delete in the months before resigning?

“Responding to cyberattacks takes too long, exposing organizations to greater risks and climbing costs,” said Joe Payne, president and chief executive officer of Code42. “By collecting, analyzing and indexing file events, Code42 Forensic File Search helps organizations shrink time-to-response windows. Our new product provides visibility to where data lives and moves across all endpoints in seconds.”

Other highlights of the conference included these sessions:

Whether through ignorance or malintent, employees are one of the top data security threats to any organization. Code42 Senior Director of Information Security Jadee Hanson provided a behind-the-scenes look at running an insider threat program to prevent employees from leaking, exposing and exfiltrating data. Hanson also moderated a “Futurist Discussion” panel with industry leaders to discuss what’s on the horizon for data security. Thanks to these panels, attendees learned what’s to come in the near future of cybersecurity, what will become the latest buzzwords in the field and much, much more.

Minimizing user downtime during a device migration is a critical part of any IT strategy. Best practices discussed during a packed-room panel session with Code42 customer MacDonald-Miller include self-service migration and data restoration as well as managing user expectations.

Data compliance for higher education can be complex, particularly considering that federal grant requirements now require data retention for seven years. In a game show format complete with swag prizes and packs of ramen noodles (Get it? Higher ed? Ramen?) customers learned how to tell if data is leaving the university and how to build Freedom of Information Act requests into their data management issues. Yum.

The reviews from attendees are already rolling in, and we’re blushing at the positive responses:

“Love hearing what other Code42 customers are doing!” – desktop support specialist, Entrust Datacard

“Thanks to everyone at Code42 for putting on such a terrific conference! I’ve already started reaching out to my peers–encouraging them to attend Evolution19.” – IT program manager, University of Colorado Skaggs School of Pharmacy and Pharmaceutical Sciences

“Already registered for Evolution19 and looking forward to Colorado. See you guys then!” –systems administrator, Utex Industries

“Thank you, Code42! It was a great Evolution.” – computer support analyst, Stanford University

Dozens of customers have already signed up for Evolution19. Interested in joining them? Registration for next year’s conference, April 30 – May 2 in Denver, is open now. We hope to see you there!

Code42 security industry awards

Three Security Industry Award Wins, and Why It Matters

What a month it’s been for Code42!

Last week, we hosted Evolution18, our annual customer conference; we launched Code42 Forensic File Search, an innovative, game-changing product for the information security market; and in the past few days, we were honored with three security industry awards:

Each of these awards is a true honor. Together, they point to the innovation we are driving, and how that’s paying off for our customers. Here are three takeaways.

Innovation drives us

The three awards we won point to our commitment to innovation. It’s a priority for us. We drive innovation to help our customers succeed – safeguarding their ideas wherever they live or move, whether that be on endpoints or in the cloud.

The value of visibility

You can’t protect what you can’t see. Our focus on visibility – helping companies see where their data lives and moves – is striking a chord with our customers and the industry in general.

When our customers win, we do too

While receiving these industry awards is a great honor, what’s even more meaningful for us is being able to recognize our customers.  Just last week at Evolution, we honored a select group of customers with our Evolutionaries awards. These annual awards celebrate our customers for their extraordinary innovations in the development, deployment and adoption of applications in data recovery and visibility. We’ll profile these winners in another post; I think you’ll be impressed with what they have accomplished.

There’s an unmistakable link between the amazing results our Evolutionaries are delivering for their organizations, and our selection as winners of these industry awards. By helping them win their data security battles, their businesses win, and we do too.

Evolution18 Begins Today

We’re thrilled to say that Evolution18, our annual customer conference, kicks off today! We are looking forward to welcoming customers and partners from around the globe to San Francisco. During the next three days, attendees will hear the latest on all the most important topics in data security, connect with industry experts, learn from the pros in our 30+ breakout sessions, get certified on Code42 administration – and, we think, have some fun in the process!

Of course, we understand that not everyone can join us in California. That’s why we plan to post some of the biggest news from the event right here. This includes an exciting announcement about Code42’s newest product, which will take our data security capabilities to a new level, as well as the winners of our annual Evolutionaries Awards. We love to share success stories when we hear them. The awards honor Code42 customers that have demonstrated dedication to delivering the best possible data security and recovery solutions.

We’re also looking forward to sharing event highlights like the keynote speech from Theresa Payton, one of the nation’s leading experts in cybersecurity and IT strategy. Theresa served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff. Theresa has already shared some great thoughts on the state of cybersecurity with us, and we can’t wait to hear more.

Stay tuned to the blog all week for more on Evolution18.

Up Close with Theresa Payton: Former White House CIO and Guest Keynote at Evolution (Part 1)

Meet Evolution Guest Keynote Theresa Payton (part 1)

We are excited to welcome Theresa Payton, one of the nation’s leading experts in cybersecurity and first female White House CIO, as our guest keynote at Evolution18. Don’t miss the chance to meet her in person at our annual conference, April 9-11, in San Francisco. It’s not too late to register and attend!

Before she takes center stage, we asked Theresa to share her thoughts on the state of the security space and how it has evolved since her time as White House CIO. In Part One of our interview, she talks about the evolution of security threats, social media data privacy and enterprise cybersecurity blind spots.

Code42: How have security threats evolved since your time in the White House? Are there any new threats that you didn’t anticipate?

Theresa Payton: Many of the challenges companies face today are similar to the security challenges at the White House. The pivotal moment for me that shifted how I design a security strategy started at the Executive Office of the President, in the White House. The security at the White House could not be just about boxes, servers, oppressive end-user policies and blinking lights in the Security Operations Center. Security at the White House came down to the people who served at 1600 Pennsylvania Avenue, across America and abroad. We knew we had to address the hearts and minds of the staff if we wanted to protect their privacy and security. After all, if solving cybersecurity and privacy issues was as simple as following security best practices, we would all be safe. It’s not that simple.

The cybercrime threats to organizations change every day and move all over the globe. The biggest change is the larger hit to an operation’s systems, especially in the cases where the victim has been hit by ransomware. That’s why companies need to make strategic investments to protect themselves.

The attacks that make the news typically have complex motivations that are both economic and political; but the vast majority of attacks, many unreported, are simply about the money.

As far as any threats that I didn’t anticipate, not so far; but I can say that regarding my predictions, I wish I were wrong.

C42: Based on your time in the government, do you see a law like GDPR ever being passed in the U.S.?

TP: It is possible we will see Congress one day pass a consumer bill of rights for the Internet, digital safety and privacy; but I think we are several years away from that.

Privacy laws, the court systems and law enforcement’s ability to source cases are lagging with the digital age. Technology, specifically drones, have been a great tool for law enforcement in spotting potential victims and helping rescue those who need help in dangerous conditions. But with the popularity of domestic drones, we now have flying spies in our neighborhoods. This is a discussion that as a society we need to have. It’s common knowledge that it’s not polite to peep through people’s windows—it’s illegal.

But do we have any laws protecting us from social media companies collecting and selling our data, credit bureaus from aggregating our spending habits and selling our information, and our neighbors’ surveillance cameras or overhead drones from gathering our data? We don’t—at least not yet.

C42: What are enterprises missing when they think about data security?

TP: It’s very challenging for companies to get their arms around their data architecture. When companies have highly regulated data elements such as HIPAA, PII, PCI-DSS and others, we also see “data haves” and “data have nots” as far as security in those companies. I would ask your business team and your data architects a few questions to see what might be missing from your data security plan.

The first one is to ask, “Have we actually had a company discussion on what our top two or three most critical assets are? And do we agree?” I think a very simple way to do that is you get in a staff meeting. Tell everybody no peeking. Pass out index cards and have everybody write down their list. Ask a facilitator to help you force rank each list until all agree on a company list.

The next question you should ask is, “What is our worst digital-disaster nightmare?” Name it and define it. Practice (dealing with) that nightmare. Learn what capabilities you have and don’t have. Discover where you need new partners to assist you. And then figure out what you can’t mitigate on your own through partners, through process, through technology—that’s what you want to go get cyber liability insurance to cover.

The other thing that I think companies overlook is that you can increase your security and reliability and also your resiliency if you pick the right cloud-services provider. If you are holding on to some legacy mail platforms and things like that, it may be time to reintroduce making a strategic decision around the cloud. That could save you money and it could, if you pick the right provider, create a whole new set of security protections and protocols you don’t have in-house.

More about Theresa: A pioneering technology leader

Theresa Payton is one of the nation’s leading experts in cybersecurity and IT strategy. She is currently CEO of Fortalice Solutions, an industry-leading security consulting company; and co-founder of Dark Cubed, a cybersecurity product company.

Theresa began her career in financial services, and after executive roles at Bank of America and Wachovia, she served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff.

Schneider Electric Achieves Multiple Benefits with Code42

Schneider Electric Sweden, an energy management company, lives or dies based on the success of their team of well-traveled consultants. And their consultants’ success is directly tied to the sensitive data that travels with them wherever they go. In fact, Schneider estimates the value of the data on a consultant’s laptop to be $150,000.

Because of the importance of this data–and the dire business consequences of it being lost, stolen or simply unavailable–Schneider decided to upgrade their backup and recovery solution to Code42.

The change was easy to justify. Schneider implemented the Code42 solution and it has already paid off for them in substantial ways:

  • Laptop upgrades in one sixth the time
  • Over 7,000 hours of employee downtime saved
  • Successful recovery from a WannaCry ransomware attack

Check out the full case study to learn more about how Schneider Electric keeps their most precious resource–their consultants–as productive as possible.

Code42 Employees Give Back to the Community with Volunteer Hours

I came across a quote online that was written by the well-known actor, Will Smith. It read, “I want the world to be different because I was here. However lofty or crazy or delusional that may sound, I want people’s lives to be better because I was here.” Will may have played a few ‘out there’ characters during his acting career, but his mission to leave the world a better place and make an impact on people’s lives is far from delusional to the employees at Code42.

We believe so strongly and wholeheartedly in leaving the world a better place that we made it one of our core values. In pursuit of that value, Code42 offers every employee two paid volunteer time off (VTO) days a year.  Employees can give back to the community that they live and work in by sharing their time, talents and resources with a charitable cause or non-profit organization. The best part is that the employees are not directed to a specific organization. They choose the organization that matters most to them.

As a company, we believe that we have a corporate social responsibility to better the experience of those we share this world with. Dr. Martin Luther King, Jr. once said, “Life’s most persistent and urgent question is: ‘What are you doing for others?’” Various departments at Code42 listened to this call and chose to volunteer as a team. The benefits of volunteering as a team are endless. By volunteering together, you not only help others, but also help yourself improve as a person. Giving back creates an opportunity for the team to help make change in a community and work towards something great together, all while building your own self-worth.

We are proud to say that in 2017 Code42 employees contributed more than 3,700 volunteer hours as part of our Code42 Cares initiative. The VTO program is an employee driven, grassroots committee that organizes and supports employees to volunteer. This committee does more than just provide volunteer opportunities. They go above and beyond their normal full-time job responsibilities to provide enriching life experiences that impact people personally and professionally.

In 2017, Code42 employees participated in a wide variety of volunteer activities, including working with the Build-A-Wheelchair Foundation, the American Red Cross and Habitat for Humanity. Employees have knit hats and scarves for the homeless, built bicycles for underprivileged children and packed 53,000 pounds of food at Second Harvest Heartland, an organization that collects and distributes food through various programs and services. One employee-led effort – the Extra Life charitable gaming marathon – raised over $10,000 for a local children’s hospital.

Code42’s commitment to giving back has not gone unnoticed by the organizations with which our employees have volunteered.

“The Sheridan Story’s mission is to fight child hunger through community and school partnerships, and we can’t do it without the community.” said Rob Williams, executive director at The Sheridan Story. “Volunteering is one of the most important ways to make an impact, and we are incredibly thankful for our friends at Code42. I appreciate the company’s commitment to providing paid time off for their employees to serve with their time.”

If you are looking for a career that challenges you, inspires you and truly emphasizes helping others, then check out the open positions at Code42 here. We invite you to help us leave the world a better place. #becode42

The Top 10 Reasons to Attend Evolution18

Looking to learn what’s next from Code42? Join us April 9-11, 2018, at the Westin St. Francis in San Francisco for Evolution, our annual education conference. At Evolution18, you’ll hear the latest on all the most important topics in data security, connect with industry experts, learn from the pros in our 30+ breakout sessions, get certified on Code42 administration – and you’ll have a pretty good time while doing it all! Want to learn more? Here are the top 10 reasons to attend.

10. Evolution opening keynote. Code42 CEO Joe Payne and other special guests will take the stage to talk about all things landscape and product. If you’ve ever attended an Evolution opening keynote, you know that they always include surprises and keep the entertainment coming the entire time.

9. Education and certification. Check out the educational sessions that the conference offers. You can get in-person training and make use of that training budget to come to the rest of the conference! Each course offers a certificate of completion, and current Code42 EDU members can even take their admin certification exam. Talk about maximizing your time and money!

8. Evolution sponsors. It’s not easy to get budget to go to any conference, so it’s great to have sponsors like HGST and Jamf, so attendees can talk to other business partners and make the most of their time.

7. The Evolution Mobile App. The Evolution mobile app is one of the most engaging conference apps we’ve seen. Attendees talk, network, make plans and even engage in some friendly competition, all via the app. It also allows for live feedback and Q/A with presenters. This tool makes coming the conference a breeze!

6. Onsite meetings + networking. Every year, attendees tell us that networking and hanging with Code42 peers is the highlight of the week. Book meetings with anyone on the Code42 team, from customer champions to product owners. You may find yourself sitting and having breakfast next to the CEO, which always ends in great conversation!

5. Customer-led sessions. Have you seen our customer speaker lineup? Listen to talks from Juniper Networks, Lyft and BAYADA Home Health to learn just what’s going in IT and Security from around the US. Customer-led sessions are always a huge hit at Evolution!

4. Product launches. You won’t know until you show up. We can’t say much more than that, but there are exciting things in the works for Code42, and those in attendance will be the first to get the scoop.

3. The conference party at the Exploratorium. Anyone who attends Evolution is invited to the Exploratorium for a night of exploring their inner geek. We’ll eat local San Francisco bites and sip libations. It’s going to be a great night for networking with peers.

2. Theresa Payton Guest Keynote. Leading cybersecurity authority and former White House Chief Information Officer Theresa Payton will be giving us a ton of insights on the security landscape today. You might even spot her having lunch with some of our attendees. We can’t wait to meet her.

1. Security, security, security. For the first time ever, Evolution has added a security track. The track features industry experts such as Forrester Vice President and Security and Risk Research Director Stephanie Balaouras and speakers from the SANS Institute. Security pros will also listen to panel discussions with security professionals from IBM, Entrust Datacard and Palo Alto Networks. Attendees in this exclusive track will hear and discuss approaches to employee security training, vendor management, new tactics in security operations and more. You won’t want to miss this!

Customer Reviews Recognize Code42 as Industry Leader

At Code42, we have always viewed customer referrals as the gold standard. That’s why we’re so proud to announce that Code42 has been recognized as a 2018 Top 100 Software Company and Top 50 Mid-Market Software Company by G2 Crowd. G2 Crowd is an independent research company that provides an online platform for software buyers to learn about technology solutions based on the reviews of their users. It is these reviews of the Code42 platform that drove our placement on both lists, and we would like to extend our sincere thanks to our customers for their continued partnership.

Code42 is ranked number 63 out of 100 for software companies of all sizes, and number 29 out of 50 for mid-market software companies. We’re proud to appear on these lists along with the absolute biggest names in the software and technology sectors, such as Slack, Google, Mailchimp, SurveyMonkey and more.

While analyst rankings are important, we know that technology buyers rely heavily on hands-on experience from their peers. Positive reviews and inclusion on lists such as these help us to continue to make improvements to our product. Reviews of the Code42 platform on G2 Crowd consistently cite its ease of setup and use, reliability, customer support and scalability. To see more user reviews on G2 Crowd, visit the Code42 profile page here.

For G2 Crowd’s complete 2018 Software Company rankings, read the report here.

Facebook Twitter Google LinkedIn YouTube