Code42 Helps Accelerate the Alert Data Pipeline for Ping Identity through Enhanced Detection and Response

Code42 Helps Accelerate the Alert Data Pipeline for Ping Identity through Enhanced Detection and Response (Video)

At Ping Identity, our whole business is built around security. Our unified platform provides intelligent access for customers, employees and partners so they can securely connect to cloud, mobile, SaaS and on-premises applications and APIs. With more than 2 billion identities under management, data security is critical to our mission. 

Data security comprises three critical areas: detection, protection and response. And no one solution can focus on all areas. Just like there’s no one tool you’d use to work on a car, different tools focus on different areas of security. Using them together enables a security team to deliver the greatest protection for their company. 

Code42 Next-Gen Data Loss Protection is one of the solutions that Ping uses to help detect and respond to data threats. Code42 has always been a data organization. Now with their next-gen solution, they’re evolving into a tool that handles a wide level of alerting, no matter where data lives and moves. At Ping, like many other companies, our data lives in many places: endpoints, cell phones, servers and cloud applications. Data is always moving, and detecting its movement as it exits the organization is critical. 

I would argue that the biggest challenge for security professionals today is managing a collection of disparate security tools along with the sheer volume of alerts that they drive.  While coordinating all these tools is a challenge, it would be impossible to secure an organization without them. This is why it is critical to bring alert data onto a central plane, where it can be seen by all security professionals and business partners in a singular manner. 

To achieve this at Ping Identity, I built an alert data pipeline. This highly scalable pipeline enables us to act quickly by routing the alerts directly to the individual accountable for responding. For example, in a situation where a departing employee moves data onto a USB, an alert would be automatically sent to Human Resources. Code42 is one of the security tools that fits into our alert data pipeline solution. It provides visibility to potentially risky data movement and accelerates our detection and response. 

For Ping, adding Code42 Next-Gen Data Loss Protection to our security toolkit has been critical in helping us achieve our mission — to keep our customers’ data safe.

Code42 Next-Gen Data Loss Protection Customer Success

CrowdStrike and Code42 vs. External and Insider Threats (Video)

After working on security teams at large retail organizations, I’m now in the unique, and fortunate, position to be the director of security at Code42, an organization that makes one of the products that my team uses daily. This gives us direct access to Code42’s latest product features, beta testing, and the opportunity to network with organizations like CrowdStrike both as peers and as customers of each other’s products.

The Code42 Next-Gen Data Loss Protection solution is an incredibly helpful tool to have in the toolkit. I’m proud of how my company is innovating to help fill a critical need in data security, particularly around protecting data from insider threats. But as any savvy security professional knows, there’s no one silver bullet to address all of an organization’s data security needs. For this, I rely on different products to protect Code42’s data from an ever-present array of threats.

One of the key solutions we use at Code42 is CrowdStrike, the fastest-growing endpoint detection and response solution on the market. Some of the things I love about CrowdStrike are its high-fidelity rate and its low rate of false positives; how it has a lot of searchable, granular event data; and its Falcon OverWatch service, which provides a “second set of eyes” to alert us to unusual activity in our environment. 

CrowdStrike and Code42 work shoulder-to-shoulder to protect our data. CrowdStrike protects our organizations from external threats such as malware, while Code42 accelerates our detection of and response to insider threats, like departing employees

“ CrowdStrike and Code42 work shoulder-to-shoulder to protect our data. CrowdStrike protects our organizations from external threats such as malware, while Code42 accelerates our detection of and response to insider threats, like departing employees. ”

As you can tell, I’m a huge advocate for CrowdStrike, which made it particularly cool to meet with Tim Briggs, CrowdStrike’s incident response analyst, at our Evolution19 conference in Denver earlier this year. I learned a lot from Tim, and even got a few tips from the trenches about how he uses Code42 and CrowdStrike in their environment. For example, Tim shared a story about a recent incident, when their security team received an alert from the CrowdStrike platform that was related to torrent activity in their system. Torrent activity could be extremely malicious, in that an employee may be exfiltrating valuable IP, or it could simply mean an employee was misusing company assets. 

With the alert in hand, the CrowdStrike security team was able to use Code42 to look at the files and download history of the employee in question. They quickly figured out that the employee was downloading movies onto their device. With that context, the CrowdStrike team was able to ascertain that, while the employee was misusing company assets, he wasn’t behaving maliciously or exfiltrating data. The security team was then able to report that to their executive team. 

While the threat landscape is in a constant state of flux, two things will never change. Breaches will happen, and employees will take data when they leave. It is that simple. Together, CrowdStrike and Code42 are dedicated to making it faster and easier for our respective customers to detect and respond to insider and external threats. 

Code42 Next-Gen Data Loss Protection Customer Success

Code42 and Splunk Protect IP from Employee Misuse for MACOM (Video)

As a semi-conductor design and manufacturer company, MACOM’s data includes proprietary designs and CAD drawings that are extremely valuable forms of IP. Making sure that data stays within the company and is protected from employee misuse is key to our success as a business. Part of our challenge in protecting our data is that we’re about 1,500 employees spread across roughly 50 sites globally. For such a large global organization, our security team runs lean. Jeff Litwinowich, director of IT and Security, and I are really the only two members of the team who are accountable for security at MACOM. To give us some extra horsepower, we need tools that provide visibility into what’s happening in regards to our data on both endpoints and in cloud applications.  

Having had a positive experience as a Code42 customer at a previous organization, Jeff and I were eager to look at Code42 Next-Gen Data Loss Protection as we were evaluating products which could help lay the foundation of our data loss protection strategy. At the time, MACOM was in the midst of our digital transformation, with the intention to go from IT 1.0 to 3.0 within the year. We needed a product to ensure that our data is always protected, as we were rapidly adopting cloud solutions and going through organizational changes. We needed to accomplish this without placing an administrative burden on our lean IT or security teams, or requiring on-premises infrastructure to support.   

Our initial POC validated that Code42 was easy to deploy and could detect data movement that previously would have gone unnoticed. The POC soon expanded to a company-wide deployment of Code42 Next-Gen Data Loss Protection. The global deployment went very smoothly. It was complete within about a month, which was a fast turnaround for us. Today, we have gone a step further, and integrated Code42 and Splunk. Together, these solutions not only help us monitor data activity, but also consolidate that information for a clear snapshot of what’s happening at an individual and organizational level. Having these tools provides efficiencies and enhanced security beyond what we had before. 

“ If a departing employee tells us they’re just taking personal pictures that were on their device, we can look back and validate if that is true. If we access the files and find that it was actually company property, the conversation changes. ”

Code42 and Splunk allow us to trust our employees, but verify. We’re a company of people and everyone needs to trust each other and work together. While I want to believe that no one is doing anything malicious, it’s my duty to verify, to ensure we’re all in the clear. Code42 is the validator. 

Validation happens in a few ways. When a rule is broken, we need to understand why it was broken. Was there a legitimate business reason, and was that a good enough reason not to follow that rule? Should we make an exception to the rule?

Validation can also be thought of as our way of responding to data exfiltration incidents. In times when we detect data leaving the company, we are able to access the file in question and determine if it was inadvertent or malicious. For example, if a departing employee tells us they’re just taking personal pictures that were on their device, we can look back and validate if that is true. If we access the files and find that it was actually company property, the conversation changes. 

“ Code42 and Splunk allow us to trust our employees, but verify. ”

In my role, I have a general idea of what data is important and what’s not, but I rely on the business to tell me what is truly critical. HR and legal are my primary stakeholders when it comes to protecting data from insider threats. Generally, they are looking at users who are involved in litigation or someone who’s leaving the company. They ask us to monitor the user’s activity and provide insight related to actions the user has taken in regards to their data in the past. By analyzing the Code42 data in the Splunk dashboard, I can easily go back and look at somebody’s activities after the fact to make sure we’re protecting what’s most critical to the business. 

With Code42 and Splunk, I am also able to be proactive. By setting up alerts, I can look at specific users and get immediate notification if they’re engaging in suspicious behavior like moving something to an unsanctioned cloud application or a USB. The best thing about Code42 is we have all the data and it gives us an incredible amount of visibility that we’ve never had before. 

Code42 Evolution19

My Career and Data Security Evolution

My first experience as a Code42 customer actually began when I started deploying Code42 as an intern at Maxim Integrated. At this point, we were really focused on protecting data from loss through data backup. Code42 taught me all about how to stand up internal servers and deployment application remotely. Really, working with Code42 was a godsend for me because it helped me advance in my career. It’s a big reason behind how I got to where I am.

Today, I am a system engineer at MACOM. In my role, I am responsible for deployment, integrating systems and protecting MACOM’s most valuable data as we continue our digital transformation. Unlike my past experience as a Code42 customer, MACOM’s story doesn’t begin with endpoint backup, it actually begins with data monitoring.

“ Every company needs to understand how their data is flowing. Especially as many organizations, like MACOM, undergo digital transformations. ”

We knew that we needed to understand what was happening in regard to the data on our endpoints, which led us to evaluating Code42’s Next-Gen Data Loss Protection solution. Having had a positive experience with Code42 in a past life, I was eager to learn more about this innovative new solution. It quickly became a match made in heaven.

While my experience with Code42 spans IT and security centric use cases, the common denominator across them all is data. Data is the core of any company’s competitive advantage. If somebody walks out with a prototype or design file on a USB, well then there it goes. Every company needs to understand how their data is flowing. Especially as many organizations, like MACOM, undergo digital transformations. It’s important to understand how data is moving between cloud services and USB drives.

MACOM has been a Code42 Next-Gen DLP customer for a little less than a year now, and we have already made significant strides related to protecting our most valuable data. In fact, I will be co-hosting a session at Evolution19 on this topic with Code42 SE, Isaac O’Connell. For a deeper dive into MACOM’s story, join Isaac and I on Wednesday, May 1 at 10:30 am for our session, Using Next-Gen DLP to Protect Data from Inside Threats.

I hope to see many of you in Denver and hear about your own evolution with Code42. Pun intended!

Shape Technologies Group Relies on Next-Gen DLP

Shape Technologies Group Relies on Code42 Next-Gen Data Loss Protection to Safeguard Data

As industry leaders seek to consolidate their positioning in the global marketplace, mergers and acquisition activity continues to surge. In 2018, companies announced more than 50,000 transactions worldwide for a total value of approximately $4 trillion.  However, only one out of five M&As achieves its potential value. 

One culprit for lackluster M&A results? Losing valuable IP—much of which lives on employee endpoints—from the sell-side company during the acquisition process. Much of an acquisition target’s value lies in its IP. In order to get the full value of an acquisition, buy-side organizations must identify, locate, secure and safely migrate the IP of the sell-side company. And it has to happen fast.

IT implications for growth

One company that’s garnering top value from the IP of its merger and acquisitions is SHAPE. You likely encounter the results of SHAPE’s waterjet cutting solutions every day. Its technologies are integral in many industries such as auto, aerospace, food, mobile and fabrication. Since 1974, the Kent, Washington-based company has delivered more than 13,000 waterjet systems to customers in more than 100 countries.

The global company employs 1,400 workers in more than 20 offices in North and South America, Asia and Europe. The organization’s goal is to double in size over the next four years to reach $1 billion. In addition to strong organic growth, one of SHAPE’s growth strategies is acquisitions — many of which are smaller companies and some are overseas.

With such aggressive growth targets come data security and IT challenges. 

SHAPE turned to Code42 for its Next-Gen Data Loss Protection (DLP) to help protect precious IP during M&As and against loss or theft during employee departures.

“ Some of the companies SHAPE acquires don’t have sophisticated security and IT programs, so SHAPE’s IT team must quickly get their data secured, integrated with their core technologies and aligned with IT standards. ”

Protecting sell-side company data

A large part of the value proposition when SHAPE buys a company is the IP that comes along with it. Unfortunately, that data is easily put at risk by employee actions and departures. That’s why it’s critical to protect the files and information on the sell-side company’s devices. The IT department at SHAPE understands the reality of this risk and proactively takes steps to protect the organization’s IP and secure the data. 

“Our initial goal is to get the data captured and backed up,” says Jeff Zuniga, director of IT operations. “Some people have taken it upon themselves to delete files thinking they’re helping by cleaning things up. Once we get the data protected, we are able to manage it and consume it as needed.”

Some of the companies SHAPE acquires don’t have sophisticated security and IT programs, so SHAPE’s IT team must quickly get their data secured, integrated with their core technologies and aligned with IT standards.

“We needed a quick way to be able to start collecting the data that resided on their machines,” says Zuniga. “A lot of them ran on a shoestring budget and workstation backups weren’t part of their vocabulary.”

Safeguarding data during consolidation

Organizational consolidation often accompanies acquisitions — and often includes employee departures. To monitor IP and determine whether there’s any suspicious file movement or deletion during this process, SHAPE is using Code42. 

“Being able to make sure we’re protecting our IP, that it’s not walking out the door, is important,” says Zuniga.

At a company that’s the innovator in its field, IP carries a premium—and without the right tools, it could be vulnerable to insider threats.

“We have a lot of IP like our drawings, sensitive information like cost of goods, where we purchase things, vendor lists,” says Zuniga. “We’ve been running reports and looking at users who have copied their local drives. We have to sort through and see if they’re personal files or does it contain IP.”

As it maintains its growth trajectory, SHAPE’s strategic approach to IT will continue to serve it well. And Code42 Next-Gen Data Loss Protection capabilities like data collection and monitoring, will help the industry leader safeguard its valuable IP—that of its acquisition targets and the homegrown ideas that have made it the industry leader for more than four decades.

How-Next-Gen-DLP-is-helping-Code42-customers-today

How Next-Gen DLP Is Helping Code42 Customers Today

Since we announced the Code42 Next-Gen Data Loss Protection (Next-Gen DLP) product last month, it has struck a chord with the prospects and industry analysts we’ve spoken to. It’s exciting to see, because we believe this is an important step beyond conventional data loss prevention technology.

With the introduction of our new product, Code42 is rewriting the paradigm for legacy data loss prevention — shifting the focus from prevention to protection. The Code42 Next-Gen DLP solution offers a simpler, quicker way to secure an organization’s endpoint and cloud data from loss, leak, misuse and theft. Unlike traditional DLP, this cloud-native solution safeguards every version of every file without complex policies and without blocking user productivity or collaboration.

“ Code42 is rewriting the paradigm for legacy data loss prevention — shifting the focus from prevention to protection. ”

The positive reception is no surprise to us. Code42 customers have been using the capabilities that make up Code42 Next-Gen DLP to secure their businesses from data threats for a long time. Here are some of their stories:

Full control of IP — even when employees leave

One of our customers is a global advertising and communications firm. Like many professional services businesses, they need to ensure that proprietary information stays inside the organization to maintain its competitive position and client trust. Backed by Code42’s solution, their organization has visibility into where files are moving and who has access to what information, protecting the company from stolen data — especially when employees leave the company. “It can be a huge hit to your reputation if you lose data specific to a client or project,” the infrastructure project manager said. “Code42 gives us an unalterable snapshot of every single record — which means we’re always protected.”

GDPR compliance with mobile workers

Marel is another customer that has put Code42 to work inside their organization. They are a food processing machinery company based in Iceland. Like many global companies, Marel must comply with the EU’s new General Data Protection Regulation (GDPR), which strengthens personal data protection for business customers.

With Europe as one of its top markets, Marel needed a way to proactively protect and secure data stored on employee devices. “Our sales and service force use laptops heavily so they can work more efficiently while they’re traveling,” said Rob Janssen, manager of global infrastructure and QRC at Marel. “Likewise, managers also work from different locations. In the past their documents, which may contain sensitive data, were not always immediately synced back to the central storage solutions.”

Code42 continuously backs up every version of every file in real time, enabling Marel to comply with key GDPR data protection, recovery and notification requirements. Marel can easily meet GDPR rules requiring companies to report the extent of any personal data breach within 72 hours. The company can recover all files, including data that’s been deleted or maliciously encrypted. The ability to search through archives allows Janssen to determine what files were on a device at a given date and time, what users had access to those files, and what content, including personal information, was housed within those files.

“In the event of a data breach, Code42 helps us assess our exposure by giving us full visibility into every file on every laptop,” Janssen said. “We believe this is critical to complying with the GDPR. Of course, there is a strict process to be followed in these cases.”

A legal hold process with teeth

Another company we count as our customer is MacDonald-Miller. Located in the Pacific Northwest, they are a full-service, design-build mechanical contractor. MacDonald-Miller’s unique value proposition includes designing and blueprinting buildings, and then sending in a full team of plumbers, electricians and sheet metal workers to work on the build. With all that valuable design IP to protect, having an effective legal hold process is critical.

“Prior to Code42, our legal hold process was very vague,” said MacDonald-Miller Network Administrator Chad Tracy. “HR or IT had to find the user’s computer and manually try to search through documents, pictures and Excel files to see what may or may not have been on the user’s computer at the time of termination.”

Now, with Code42, MacDonald-Miller can use a portal to set up a legal hold for users and then monitor whether they’re copying documents on their personal drives.

“We had a pretty high-profile gentleman leaving the company,” said Eddie Anderson, a help desk support agent at MacDonald-Miller. “Through that portal, we were able to monitor his file history and found out 90 gigs of sales opportunities and other critical data had left to the network onto his external drive. Before Code42, there was no way of ever knowing that was happening.”

50,000 customers and counting

Code42 Next-Gen DLP is built from a combination of products that are part of the company’s award-winning data security portfolio, including Code42 Forensic File Search, File Exfiltration Detection, Legal Hold and Backup + Restore. Today, more than 50,000 customers are using capabilities that are part of the Code42 Next-Gen DLP solution.

If you’re a Code42 customer with a tale of success that you’d like to share, let us know. We look forward to including you in a future post!


Baylor University Fast-Tracks Its Windows 10 Migration with Code42

Baylor University Fast-Tracks Its Windows 10 Migration

In order to quickly gain the benefits of Windows 10, Baylor University has been fast-tracking its migration across 8,000 PCs through a strategically scheduled process that effectively handles user settings and profiles. With that many devices on campus needing to be migrated to Windows 10, Baylor University’s IT team knew it had its work cut out for it. Baylor University recently joined Code42 for a webinar detailing their Windows 10 migration journey.

“We realized that there was a need to make the process a little bit smoother, a little bit faster,” said Mike Gonzales, assistant director of system support at Baylor University. “That’s when we started working on getting things scripted to give us the ability to migrate in a faster, more automated, consistent fashion.”

“ The quicker you can get them in and out of the office so they can get back to their day, the easier an experience it is for them. The goal is to leave them in a better position than when they first started. ”

Baylor University’s migration process

One of the first steps in Baylor’s process was to ensure that the IT team could encrypt and back up their devices on pace with the speed of the Windows 10 release cadence.

Once that was established, the team decided to roll out the migration with a testing phase. After they got comfortable with the process, they were then able to migrate larger numbers of devices. They started with the devices that would have the least impact and complexity — in their case desktop computers that didn’t have third-party encrypted software installed.

It was important to keep the migration process moving along because extended support for Windows 7 ends in January 2020. So they strategically scheduled a certain number of migrations per month to meet that deadline.

Creating a consistent, scalable process has been critical for Baylor University. The goal of their process was to ensure that all users had the same positive migration experience and that the IT team could successfully and quickly migrate a large number of devices.

A quick and easy experience for users

By integrating Microsoft’s User State Migration Tool (USMT) with Code42, Baylor’s IT team developed a script that automatically recreated a user’s profile and settings so that after the migration, the device was as familiar to users as it had been previously.

“When end users log in, they see their desktop background of their kids and that’s a really good user experience,” said Brad Hodges, senior analyst programmer at Baylor.

Using cloud-based technology such as InTune or Autopilot in combination with Code42 has helped with consistency and efficiency. The team can set up 32 machines to migrate concurrently in the installation area.

Because it’s moving from Windows 7 to Windows 10, Baylor University is using a wipe-and-reload process so as not to leave behind any legacy and incompatibility issues. The process has been efficient, consistent and reliable.

“It’s a huge change for our people to go from 7 to 10,” said Gonzales. “The quicker you can get them in and out of the office so they can get back to their day, the easier an experience it is for them. The goal is to leave them in a better position than when they first started.”

Up next for Baylor University

Now that they have refined their process and made it scalable, the IT team members have been making plans to extend their migration process to their Mac devices. They are also working on a project to create a self-service model for out-of-the-box devices. Based on the new model, users can unbox their device, log in and simply run a script to configure their new device with the same settings and profiles of their previous computer.

Tips From the Trenches: Choosing a Security Orchestration Tool

MacDonald-Miller Boosts Mobile Workforce Productivity with Code42 (Video)

Ineffective data security strategies are expensive. Whether it’s an IT team trying to save corrupted files or perform manual data storage tasks, an employee having to redo work because a file was irretrievably deleted, or lost sales due to stolen IP, the cost in time, productivity and revenue can add up fast.

Recent research by the Ponemon Institute found that the global average cost of a data breach is $3.86 million, and the average cost for each lost or stolen record containing sensitive information is $148. However, much of that lost productivity can be mitigated with a comprehensive data security strategy that includes effective backup, restore, user self-service and legal hold tools.

Case in point: MacDonald-Miller, a full-service, design-build mechanical contractor in the Pacific Northwest, has developed and implemented a multi-faceted data security strategy that uses Code42 to save time and safeguard valuable company IP. With more than 1,000 employees — many of them mobile workers moving around to different job sites — and 10 locations, it’s critical for MacDonald-Miller’s IT team to have the right tools in place to keep its diverse workforce at maximum productivity. They turned to Code42 to help.

Mitigating employee downtime

With a highly mobile workforce of contractors, foremen, electricians, plumbers and other workers at different job sites, maintaining productivity is critical. If blueprints or plans are lost throughout the day, that can result in expensive idle time.

“All of a sudden, they can’t work,” says Eddie Anderson, help desk support agent for MacDonald-Miller facility solutions. “That’s an expensive workforce to have on hand.”

Previously, restoring lost files was a highly manual, labor intensive process with a low success rate. Workers had to drive to the company’s central location in Seattle to have the IT team work on the problem.

“We’d have to dig through recycle bins, looking for previous versions,” says Chad Tracy, network administrator for MacDonald-Miller facility solutions. “If it really came down to it, we’d have to scan the hard drive to search for missing sectors of files.”

Now, with Code42 Backup + Restore, MacDonald-Miller is saving time on lost file incidents like this, freeing up IT to take on more strategic work.

“We’re saving an hour if not more per restore,” says Tracy. “We’re utilizing that time to really revamp a lot of our knowledge base articles, help users understand self-service, get into that culture mindset and give us creative freedom. We can now jump into things like augmented and virtual reality, which is helping us as a very powerful sales tool.”

Leveraging employee self-service

Because user sophistication varies across MacDonald-Miller’s 1,000-plus employee base, developing self-service tools for IT tasks can be a challenge.

“Our engineering team is very tech-savvy. Then we have electricians and plumbers who, quite frankly, would not like to use a computer ever,” says Anderson. “When we look at a solution for self-service, it needs to be able to hit all those different aspects of our company.”

Previously, when users needed to restore a file, the process was very hands-on and manual. They would call the IT service desk and the IT personnel would have to figure out whether they would need to drive in to the central location for hands-on support.

Now, with Code42, users are able to perform their own restores. This boosts workforce productivity for both the employee needing the restore and the IT department. One sales team member accidentally deleted a bid proposal right before a presentation. She was able to use Code42 to restore a previous version of the file on her own.

“One of the best parts was, IT didn’t even know about it until she came and told us,” says Anderson.

Protecting valuable IP

MacDonald-Miller’s unique value proposition includes designing and blueprinting buildings, and then sending in a full team of plumbers, electricians and sheet metal workers to work on the build. With all that valuable design IP to protect, having an effective legal hold process is critical.

“Prior to Code42, our legal hold process was very vague,” says Tracy. “HR or IT had to find the user’s computer and manually try to search through documents, pictures and Excel files to see what may or may not have been on the user’s computer at the time of termination.”

Now, with Code42, MacDonald-Miller can use a portal to set up a legal hold for users and then monitor whether they’re copying documents on their personal drives.

“We had a pretty high-profile gentleman leaving the company,” says Anderson. “Through that portal, we were able to monitor his file history and found out 90 gigs of sales opportunities and other critical data had left to the network onto his external drive. Before Code42, there was no way of ever knowing that was happening.”

Schneider Electric Saves Time and Productivity with Code42 (Video)

Code42 customer Schneider Electric is a global specialist in energy management and automation. The company helps its customers manage energy and processes in homes, commercial buildings, data centers and industries. With such a wide variety of projects in the organization, the company’s IT desk also faces a broad range of requests from employees. Fortunately, Schneider Electric is a Code42 customer, and the self-service features of the Code42 platform help keep minor tasks like device migrations and file restores from getting in the way of more pressing IT projects.

Schneider Electric Infrastructure Architect Brian Junker and Endpoint Solutions Senior Engineer Austin Joe recently spoke to us about how Code42 helps them preserve the productivity of both the IT team and end users.

In this video, they discuss how Code42’s self-service restore features remove the burden of file restores from IT:

In the second video, Brian and Austin discuss how those same self-service restore features are saving time in device migration and tech refresh projects — a task that traditionally eats up a lot of hours for both IT and the end user.

Zinpro Redefines Data Security for its Remote Workforce

Due to the evolving nature of cyber threats—including ransomware, cryptomining, inside actors and more—the definition of “data security” is shifting. Traditional data recovery, including backup and restore, is merging with security functionality to create more comprehensive data protection—the kind of protection companies need in a threat landscape where breaches happen even with the strongest security perimeters.

Luckily for organizations, there are strategies and tools out there to allow the kind of collaboration within IT and security that will reduce risk and save time and money.  Nowhere is this more important than in managing the IT needs of a remote workforce. A great example of best practices around this is Zinpro Corp., which uses Code42’s Backup + Restore and Security Center solutions to protect the data of its global employee base.

Zinpro secures and recovers their data with Code42.

Remote backup for global workforce

For nearly half a century, Zinpro has pioneered research and development of organic trace minerals that improve animal wellness and performance. With a tight focus on trace mineral nutrition, the private, family-owned company attributes its steady growth to the high caliber of its products and its workforce.

It now operates in 11 countries and markets its products in more than 70 countries. Continuous growth of a largely remote workforce brought IT challenges, such as providing reliable backup and monitoring of the company’s employee base. That’s where Code42 comes in.

Zinpro started using Backup + Restore five years ago to protect and mitigate data loss across its global workforce. The Backup + Restore solution has saved the day for Zinpro’s IT department many times.

In one example, an employee working in Belgium took her laptop to the Apple store to diagnose an issue. In order to reinstall the operating system, an Apple employee wiped her hard drive, deleting all of her files.

The employee, who hadn’t backed up her files locally, asked Zinpro’s IT department if anything could be done. Because Zinpro had been using Code42, they were able to restore everything to her computer.

“Without the Code42 backup, she would have lost everything,” said Andrew Williams, Zinpro’s systems engineer and client device specialist. “We were able to use Code42 to restore everything.” Andrew was a finalist in Code42’s 2018 Evolutionary Awards in the Catalyst category.

“ Zinpro is also expanding its use of Code42 Security Center, merging the success of its Backup + Restore practices with the solution’s data monitoring capabilities. The new approach is already reaping benefits. ”

Data visibility

Zinpro is also expanding its use of Code42 Security Center, merging the success of its Backup + Restore practices with the solution’s data monitoring capabilities. The new approach is already reaping benefits. Recently, when an employee left the company, Zinpro was unsure whether she had taken files with her.

Using Code42, Zinpro’s IT department was able to quickly check her computer to see if any files had been moved or transferred. “There was nothing to be worried about, everything was good to go,” said Williams. “Code42 helped put our minds at ease.”

As Zinpro has grown, it continues to add Code42 licenses for each employee. Williams, who is in charge of purchasing for the IT department, has had no trouble making the case for each employee to have a Code42 seat.

“Code42 has saved me many different times and it’s made my job 10 times easier,” said Williams.

Continuing its legacy of steady global growth, Zinpro has a bright future improving trace mineral nutrition for animals. And through its use of Code42 solutions, Zinpro’s IT department will be able to do its part in supporting the company’s employees and mission.

“Code42 is great,” says Williams. “Everyone at Code42 is easy to talk to. You can ask them anything. If they don’t know, they’ll find someone to get the answer for you.”