42 Seconds with a Code42 Customer: Lehigh University

Code42 provides your business with a variety of data security benefits, including increased productivity, risk mitigation, streamlined user workflows, and more–all in a single product that’s been proven to ultimately save you money. While Code42 has a few primary use cases–backup and recovery, device migration, etc.–we’ve learned that our different customers use Code42 in different ways. To explore how customers use our product, we recently partnered with the talented team at creative agency Crash+Sues to create a series of animated videos featuring the voices and likenesses of actual Code42 users.

In our latest video, Naazer Ashraf, senior computing consultant at Lehigh University, explains why they rely on Code42 over sync and share products for data backup and restore. As one of the nation’s premier research universities, Lehigh’s faculty are known for their excellence in research. Obviously, data is extremely important (and valuable) to researchers, so imagine the reaction when one researcher deleted files from Google Drive to save space–and discovered that doing so wiped the files for 10 other researchers. Naazer tells the story in just 42 seconds. Check it out below.

5 Reasons Why Endpoint Resiliency Matters More Than Ever

Endpoint resilience is an end user’s ability to bounce back, carry on, never stop, to adapt and respond quickly to changes and daily disruptions, both intentional and unintentional. While most organizations have a business technology resilience plan, sometimes referred to as business continuity, it is often centered around servers and storage in the data center. With a workforce that’s more virtual and mobile than ever, focusing exclusively on data center resilience can leave an organization vulnerable, bringing the engine that drives growth to a screeching halt. That engine is the workforce, and it is fueled by the very ideas they create and store every minute of every day on their laptops.

Let’s face it, stuff is going to happen. The unpredictability of hardware, users, and the threat landscape in which we work all lead to disruption. An endpoint resiliency strategy is nothing more than minimizing the impact of said disruptions so that the business, IT, and Security teams can keep moving forward. The business wants to move forward by boosting the productivity of its workforce fostering an environment of creativity, ideation, and innovation. IT wants greater agility so they can minimize daily disruptions and focus on the bigger picture. And, security teams want greater insight so when bad stuff does happen, they can quickly investigate and respond to minimize the impact.

Here are 5 reasons why endpoint resiliency matters more than ever:

  1. Half of your company’s value lives on endpoints – According to Deloitte, intellectual property (IP) can make up 80 percent of a company’s value – and research shows that 60 percent of your company data is created and stored on endpoints. That means potentially half of a company’s value lives on employee laptops and desktops.
  2. Ideas (IP) fuel growth and two-thirds of executives agree: losing it destroys growth – Growth is the top priority of 60 percent of CEOs, and growth is fueled by ideas. From contracts and customer lists to research and roadmaps, ideas created and stored by employees on endpoints are often at the heart of a business’ growth strategy. To quote Meg Whitman, CEO of Hewlett Packard Enterprise, “in an Idea Economy, success is defined by the ability to turn ideas into value faster than your competition.” Most of those “ideas” start on your user’s laptops.
  3. Organizations’ most vulnerable ideas are on endpoints – From cyberattacks and user errors to mergers, acquisitions, and litigation, the loss of ideas or IP created and stored on endpoints are growing every day. Industry research says that as much as 70 percent of data loss incidents originate on the endpoint.
  4. Protecting all endpoint data – every version or every file – boosts IT agility. By having a complete backup of all end user data, IT can cut tech refresh times from 3 hours per device to 30 minutes. They can completely take themselves out of the legal hold process by never having to take possession of an end user’s device. Heck, they can even foster self-service IT with tools that make end user file restore and migration simple. All of which adds up to more time for the IT team.
  5. Having all end user files gives Security teams actionable intelligence – If there is one thing security teams want more than anything these days, it’s actionable intelligence. With so much noise being generated by security products, it is becoming increasingly difficult to tell what is material risk versus what isn’t. By having all end user data, security teams have a treasure trove of insights on user activity and the lifecycle files and their movement on and off the corporate network. Greater insight means faster detection and investigation resulting in faster time to respond when the really bad stuff hits.

In the research report “Business Technology Resiliency Matters More Than Ever,” Forrester says, “Threats and challenges to business technology services range from simple misconfiguration to widespread natural disasters to targeted cyberattacks. In today’s environment, businesses need the ability to bounce back not just from catastrophes but all kinds of disruptions, both expected and unexpected.”

This is especially true for end user laptops and desktops. As you read the Forrester report, think about your organization’s endpoint resiliency strategy. Are you keeping the very ideas that are created and stored on your end users’ devices safe? Is your current backup solution dependable? The Forrester report will guide you through the key elements of building a modern business technology resiliency plan. Read it today to ensure that your growth engine keeps running. 

Non-profit Uses Code42 to Better Achieve its Mission of Helping Struggling Communities Thrive

Communities Unlimited is an Arkansas-based non-profit with the stated mission “to move rural and under-resourced communities in areas of persistent poverty to sustainable prosperity.” The organization helps communities, small businesses, entrepreneurs, and families with lending programs, business consulting, and even technical support. Communities Unlimited services seven southern states: Arkansas, Mississippi, Tennessee, Texas, Oklahoma, Louisiana, and Alabama. Their service area includes 60 percent of the persistently poor counties in the United States.

Communities Unlimited might not be type of organization you think of first when you think of who needs rock-solid data protection, but it turns out that it has very critical data protection needs. As a condition of government grants, Communities Unlimited (and organizations like it) must retain data for seven years. With a geographically huge service area, the organization has many employees in the field. And as an organization that provides technical support to small businesses and families, they are not only handling their data, but the data of clients as well.

Communities Unlimited now uses Code42 for automatic and continuous data backup, and like many organizations, they came to us after their previous data protection strategy failed. Before Code42, the organization was using external hard drives and Microsoft OneDrive to back up its files. But catastrophe struck, and Communities Unlimited learned the hard way that both sync and share products like OneDrive and policy-dependent backup methods like external hard drives have serious shortcomings as data protection solutions.

In the Communities Unlimited case study, you’ll learn about the painstaking, months-long recovery process Communities Unlimited had to undertake in order to recover their critical data. You’ll also learn how that problem has been solved with Code42, as well as how the organization has used it to disarm ransomware, protect their employees in the field, and why Communities Unlimited IT Manager Cliff Goeke says, “With Code42, we’re always protected—and that gives us peace of mind.”

Read the Communities Unlimited case study today.

MacDonald-Miller Protects Company Time, Money, and Reputation with Code42

For some businesses, the old adage “time is money” is especially true. Take the construction industry. You might not think that a lost file would cause significant headaches at a building site, but when you start pulling on that thread, it all makes sense. If an engineer loses a file and has to spend 15 minutes calling IT, that may result in concrete hardening inside a mixing truck, workers sitting idle while on the clock, or other delays – all of which cost money.

MacDonald-Miller Facility Solutions is a full-service, design-build mechanical contractor based in the Pacific Northwest, and the subject of the most recent Code42 case study. In it, MacDonald-Miller network administrator Chad Tracy discusses how Code42 has helped the organization prevent data loss, protecting them from loss of time, money, and reputation.

Prior to Code42, data loss had a very real cascading effect on the company. “When people would lose a file, they’d say, ‘You know, the two to four hours it took me to recreate that file cost me time on the job,’” Tracy says. “It got to a point where we heard enough of those stories. We just wanted a system in place so it would never happen again.”

Read the case study today to learn why MacDonald-Miller believes that Code42 not only protects the company from risks to future growth, but also changed the very culture of the company.

42 Seconds with a Code42 Customer: North Highland

Code42 provides your business with a variety of benefits, including increased productivity, risk mitigation, streamlined user workflows, and more – all in a single product that’s been proven to ultimately save you money. While Code42 has a few primary use cases – backup and recovery, device migration, etc. – we’ve learned that our different customers use Code42 in different ways. To explore how customers use our product, we recently partnered with the talented team at creative agency Crash+Sues to create a series of animated videos featuring the voices and likenesses of actual Code42 users.

Why did we choose to go with animation? We decided that by animating customer stories, we could bring them to life in a way that a “talking head” video simply can’t. Plus, it gives us the opportunity to pack our videos with fun Easter eggs and in-jokes!

In our first video, Lincoln Higdon, director of information technology at professional services firm North Highland, explains how they use Code42 for backup and recovery. In the professional services industry, the old saying “time is money” is especially true. As a company that depends on billable hours, any downtime can literally harm the bottom line, the company’s reputation, or both. Fortunately, with Code42, firms like North Highland can easily bounce back from data loss. Check out the video to hear Lincoln’s story. After all, who doesn’t have 42 seconds to spare?

Real-time Recovery Is at the Core of Code42

Code42 provides your business with a variety of benefits, including increased productivity, risk mitigation, streamlined user workflows, and more – all in a single product that’s been proven to ultimately save you money. All of these benefits are all built off our core feature: real-time recovery of endpoint data. With Code42, you get your data back faster when data loss incidents strike – and strike they will. Accidental deletion, file corruption, hardware failure, or even widespread cyberattack – sooner or later you’ll have to deal with one or more of these issues.

We recently partnered with the talented team at creative agency Crash+Sues to create a series of videos about the core features of Code42, and we naturally kicked the project off by highlighting our recovery feature. We’re happy to share it with you today. Take a look to learn more about Real-time Recovery with Code42 – you may even be entertained in the process!

How the Rise of Cybercrime Is Prompting Small Businesses to Fight Back with Automated Cloud Backup

Smaller businesses and organizations like your financial planner, advertising agency, or attorney may seem small in comparison to their large enterprise peers but are actually a big draw for online hackers. This is because they often don’t have the capabilities, like an in-house IT team, to prevent and quickly recover from an attack.

And the risks are significant. The U.S. Securities and Exchange Commission reports six out of 10 small businesses hit by an attack like ransomware will go out of business within six months.

Because of this striking statistic, small businesses are increasingly turning to the kind of automated cloud backup we’re able to deliver with CrashPlan for Small Business.

In fact, CrashPlan for Small Business has seen a 57 percent year-over-year increase in new customers – growth spurred in part by a rash of malicious viruses and attacks hitting small businesses. For example, following the news of WannaCry, the daily average volume of customers who signed up for a free trial of CrashPlan for Small Business rose 98 percent – a record volume for new signups in a single day.

The risk of attack and impact on the business is simply too high a cost for small businesses – freelancers, home-based entrepreneurs and other growing organizations. That’s one of the reasons why we deliver the safety and security of knowing that your data is protected and can be quickly restored, but also why we deliver a product that is affordable, unlimited and flexible.

Small businesses are responding positively to the technology and support investments we’re making. We created a dedicated team, and recently expanded our weekday customer support for small business customers (now 7:00 a.m.-7:00 p.m. CT). We’re also finalizing plans to roll out an improved user interface for CrashPlan for Small Business. As we continue to grow, we’ll invest even more.

At the beginning and end of every day, it is important to us that small businesses know that Code42 will be there in the key moments when they need help. That’s what’s important to us – putting customers first so they are protected and can be successful.

Learn more about CrashPlan for Small Business or start a free month-long trial and see what our customers have said about us.

Why One-to-One Device Migrations Are Killing Your Business

Data migrations have always been constant—and a constant headache—in enterprise IT, and they’re only growing more frequent. The pace of technology innovation keeps accelerating. With new devices, new operating systems, OS updates and more coming out multiple times a year, businesses are constantly moving users to the latest tech to keep them at the leading edge of productivity and security. To compound the issue, the average enterprise user now has two or three devices—doubling or tripling the device migration workload.

The one-to-one migration doesn’t fit the digital enterprise

Whether you call them one-to-one migrations, the white-glove treatment or IT-heavy migrations, the traditional approach to device migration can’t keep up with the increasing frequency of tech refresh projects in the typical enterprise.

  • Users lose days of productivity: Most one-to-one migrations take a day or more. That means users often lose an entire day of productivity. That’s annoying for the individual user, but the impact is immense in large-scale, enterprise-wide tech refresh projects.
  • IT is overwhelmed: For businesses in every industry, IT is shifting from a necessary cost center to delivering a wide range of projects of differentiating value. But when they’re forced to spend the bulk of their time on low-level tasks like one-to-one migrations, they have less time for high-value projects. Worse yet, the tedious device migration burden leads to IT burnout, as top talent looks for bigger and better challenges elsewhere.
  • Projects run on forever: In the typical enterprise, not everyone works 9 to 5 under the same roof. Flexible work schedules, increasing mobility and a growing remote workforce make scheduling one-to-one-migrations a nightmare. At least one in 10 users end up rescheduling—sometimes multiple times. Remote users are left out—until they can make a trip to the home office. This is part of the reason that data migrations have an average time overrun of 41 percent.
  • They’re incredibly expensive: Businesses tend to think the cost of the technology itself is the big budget item in tech refresh. But it’s IT costs that lead 80 percent of data migrations to run over budget. Gartner says that traditional, IT-heavy device migration costs an average of $445 per device. For a typical enterprise with 2,500 users, that’s $1.1 million. That’s without considering all the lost productivity.
  • Valuable data falls through the cracks: Traditional device migration workflows lean heavily on manual user actions for data backup and restore. The result: One in three enterprise data migration projects experience significant data loss.

Moving to scalable enterprise device migration

As device migrations come more frequently, the pain of the “old way” is becoming evident to IT and business leaders. Moreover, innovative businesses and industry analysts are demonstrating and quantifying the promise of a more scalable approach to device migration. In fact, Gartner says moving away from one-to-one migrations toward a “well-managed and automated” process could cut migration time by 65 percent—and cost 42 percent less.

So, what does “well-managed and automated” device migration look like?

Read our new white paper, Best Practices in Device Migration: Two Scalable Strategies, to find out.

Move Forward Faster: An Inspiring Tale of Device Migration—Transformed

Here’s an all-too-familiar story that’s sure to keep IT pros up at night: A new CIO arrives at a large enterprise and announces an urgent, company-wide tech upgrade. All 14,000+ employees need new laptops—within the year. Looking at your existing, IT-heavy device migration process—averaging a day or more per user—you’re not feeling hopeful.

An IT nightmare turns into an IT dream

What if we told you this story has a happy—quite incredible—ending? That the IT team managed to cut device migrations from a day or more to just an hour? That they enabled user-driven migrations and largely cut IT out of the equation? That they refreshed more than 1,000 laptops a month and hit their goal of upgrading more than 14,000 users in just a year?

Backup awareness means knowing all that your backup can do for your business

That’s the true story of how Qualcomm, a leading telecom company, used Code42 to conquer a momentous device migration challenge. It’s also a powerful example of how the best endpoint backup solutions go beyond backup and recovery, solving perennial IT challenges and helping businesses move forward faster.

Move forward faster: Code42-powered device migration

There are a number of ways Code42’s comprehensive endpoint data collection, protection and recovery lead to faster, more successful enterprise device migrations:

  1. Get a major head start: IT never has to manually back up user devices, nor wait or worry about users manually backing up before a migration. Every device and every file is continuously backed up.
  2. Streamline migration workflows: Migrate all user device data—including device settings and preferences—in one simple step. Cut migration timelines from days to hours.
  3. Deploy more efficient migration models: Enable group migrations that reduce IT time and the scheduling burden of large-scale migration projects.
  4. Solve the problem of remote users: Enable remote device migrations to keep your entire workforce on the latest, most secure technology.
  5. Move toward the dream of user-driven migrations: Provide intuitive self-restore workflows that allow even the least tech-savvy users to make the migration anytime, anywhere—on their schedule.
  6. Never—ever—lose your data: Rest assured that all user data is always backed up, so you eliminate the risk of costly data loss that plagues 1 in 3 enterprise data migration projects.

Put all these together and the result is powerful: tech refresh that doesn’t slow users down and doesn’t overburden IT.

Ready to reimagine device migration? Download the Device Migration Toolkit to get started.

Simple Is Better—and Policy-Dependent Backup Isn’t Simple

In the 1300s, the principle known as Occam’s razor was established, holding that the best solution is the simplest one. About 600 years later, network drive policy was born. It sounds reasonable enough: You tell your employees to back up their files to the network drive. They do it. Then you back up that drive. Voila! Your files are all protected and backed up. Right?

Wrong. The problem is that users are also following this principle of simplicity. They’re looking for the path of least resistance—and network drive policies only add burdens to their daily workflows. So they don’t back up. Or they forget to back up. Or they come up with their own (unreliable) means of backup.

Policy-dependent backup leaves a widening gap in data security

As much as two-thirds of a company’s data now lives exclusively on endpoint—where digital productivity takes place. In the typical enterprise, 35 percent of endpoints haven’t been recently backed up. Do the math and you see the big problem: About one-quarter of a company’s data is not protected—unrecoverable if disaster strikes, invisible to IT and highly vulnerable to hacks and data theft.

The simplest solution is backing up data right at the source: the endpoint

William of Ockham, credited creator of Occam’s razor, was right—a simpler solution is a better solution. If you or your organization’s leadership still believe policy-dependent backup can protect your business, it’s time to read our new white paper, Debunking the Myth of Policy-Dependent Backup. See why network drive policies impede productivity, burden IT and leave dangerous data security holes—and understand why endpoint backup is the simple solution you and your users have been looking for.

Debunking the Myth of Policy Dependent Backup

Facebook Twitter Google LinkedIn YouTube