Code42 Restores Files, Moods and Attitudes

Here’s a story you’ll probably recognize: Because there’s no sense reinventing the wheel, you use an existing file—for instance, an Excel file or PowerPoint presentation—as the starting point for a new project. As you transform that old file into something brilliant and new, you instinctively hit CTRL+S (because you don’t want to lose that work!)—and unintentionally overwrite the original file, destroying your previous (yet still valuable) work.

You may have also lived this story: You’re working diligently when an email or a webpage opens a pop-up. Thanks to clever trickery, the “OK” and “Cancel” buttons are renamed or the question is misleading, and you’re duped into the wrong click. Suddenly, you feel the heat from your computer as ransomware begins encrypting all your files.

Another painfully familiar tale: Your computer dies or is lost. A day later, your trusty IT team hands you a beautiful new one. This new computer is clean, pristine, fast and slick—but has none of your information on it.

The stages of data loss grief

I’ll bet everyone has experienced at least one of these disasters, so you also know the feelings of disbelief, rage, guilt and sadness that go with them. It’s a big deal! Your ideas are lost. Your data is gone. Your future productivity is marginalized as you scrounge around to find bits and pieces of your files and work.

“ We understand the value of your data; we understand the risk it constantly faces; and we understand the raw emotion of losing (and recovering) that value. ”

I know these feelings all too well. In fact, just last month, I ended up wiping out a presentation two days before I was due to take the stage as a keynote speaker. But it took me less than a minute to recover the file, because, not surprisingly, we here at Code42 have our agent deployed on every endpoint. This was just the latest, deeply personal reminder of why we do the work we do at Code42—why we work so tirelessly to protect your (and my) data. We understand the value of your data; we understand the risk it constantly faces; and we understand the raw emotion of losing (and recovering) that value.

Four big improvements make Code42 restores better than ever

In the last year, we’ve been focusing on updating our technologies to make your restore process even better. Here are four ways we’re taking data restores to a whole new level:

  • Speed: We know that the speed of a restore is at the heart of our solution. When you lose a file, every minute counts. In the last year, we’ve invested time in optimizing our technologies for the new file sizes we expect in 2018. For some of our customers, this has resulted in a 10x improvement in performance.
  • Push Restores: We’ve made a lot of changes to our technology and message queueing to make the push restores work much better. Ironically, modern computing sometimes works against us; computers have gotten so good at understanding their workload that they optimize for the operations they perform the most frequently. Statistically, the Code42 infrastructure does a lot more backups than restores—but those restores (your restores) need to be as fast as possible. We’ve re-trained our servers and message queuing to make sure that your restores are always our top priority.
  • Security: When you store as much data as we do at Code42, making sure it’s safe is absolutely critical. I was thinking about this recently during an internal security exercise. All customer data protected with Code42 is protected with the strongest possible data encryption both in transit and at rest. We continue to find ways to make your precious files even more secure.
  • Bulk Restores: Finally, we’ve done a lot to make sure that even if you are doing massive restores, they are still fast and easy. Whether it’s users recovering an entire machine in minutes, or organizations doing widespread device-to-device migrations (in case of an OS Migration or hardware refresh), we’ve minimized the time and the pain.

No matter how you use Code42, we take pride in taking those “much ado” moments and turning them into “nothing.” We love hearing that “Oh my gosh, thank you so much,” that comes from customers when they recover all of their lost files, and we’re proud to provide the technology that lets you do this for your users.

At Code42, we restore files, moods and attitudes.

Code42 Forensic File Search: Bringing “Night Vision” to Data Visibility

Code42 Forensic File Search: Bringing “Night Vision” to Data Visibility

The other day, while watching a show about modern warfare on The History Channel, I was struck by how technical advancements in modern warfare mirror the innovative leaps we have made in the battle of cybersecurity. In particular, the invention of night-vision goggles brought continuous visibility to the battlefield, changing warfare in two key ways:

  • It illuminated the dark corners: suddenly silent still actors would be seen as if they were fully illuminated; and
  • It enhanced the temporal dimension: what was traditionally a daytime activity became an around-the-clock battle.

Today, with the announcement of Code42 Forensic File Search, we’re happy to say that Code42 brings night vision to data security. We are enabling a new dimension of visibility—illuminating dark corners and creating a fully visible arena that you can examine, mine and use to take action in defense of your data.

We illuminate the dark corners

Imagine that you could search and investigate file activity across every endpoint on your network. You could instantly query your data to find where files are located. In the event of a malicious file finding its way onto your network, within seconds you could know where that file had landed and who was impacted by it—regardless of where the file resided on that machine. Suddenly the ransomware files that hide silently in users’ Recycle Bins and Downloads directories are visible. The least managed–but most exposed–entry points for malware and ransomware are suddenly visible to you.

We change the temporal dimension

Being able to see into the dark corners of the “battlefield” is only the first step. Imagine being able to take immediate action against those endpoints regardless of whether they are on your network, or even powered off in someone’s home. This is the power of Code42 Forensic File Search. We’re constantly logging changes happening on your endpoints and sending them to our cloud where you can interactively query them to find files regardless of the state of the endpoint. Our optics give you the enhanced vision to illuminate file activity on your endpoints, in near real-time, without waiting for users to connect or manually going out and searching the endpoints that were unavailable to you.

Our element of surprise

For years, as security experts we’ve been forced to fight a blind battle—one where the night sky is devoid of stars; one where our enemies could exploit any weakness in our data visibility. Tomorrow’s data security battle is defined by night vision, enabling you to know where your data lives and moves across all endpoints – at a moment’s notice. It’s defined by the ability to get real-time results from dynamic queries. These new capabilities enable the level of digital trust that you need to drive your organization’s digital transformation journey.

Code42 “night vision” is just one of the transformative changes we’re bringing to the battlefield for data visibility and security. What’s next? Well, those in attendance at our Evolution18 customer conference have seen a few glimpses today. We’ll share more here soon.

Protect your business from ransomware

Protect Your Business from Ransomware with Code42

Code42’s endpoint data security solution provides your business with a variety of benefits, including increased productivity, risk mitigation, streamlined user workflows, and more–all in a single product that’s been proven to ultimately save you money. With ransomware making huge headlines in 2017, one of the Code42 features that enterprises are most interested in is ransomware recovery.

Since Code42 backs up your data every 15 minutes by default, you can roll back to a point in time and access files you were working on before the ransomware attack–without ever paying the ransom. Ransomware recovery is one of the major ways a true endpoint backup solution beats file sync and share products for data backup. Sync and share products can’t restore to a particular point in time, but they can actually spread ransomware through an organization.

To learn more about how Code42 beats sync and share products for ransomware recovery, watch our latest feature video below.

Driving Innovation for CrashPlan for Small Business

When we announced our exclusive focus on businesses of all sizes, there were (understandably) a lot of questions about what this means for the future of CrashPlan for Small Business. For those of you who aren’t familiar, CrashPlan for Small Business is our unlimited, automated, and secure cloud backup product designed for emerging businesses with less than 200 employees (including freelancers, home-based businesses, and more).

I understand why those questions came up. We routinely see IT consultants advising this segment to use CrashPlan for Home, and businesses opting for it instead of CrashPlan for Small Business. As a whole, CrashPlan for Home has largely been seen as interchangeable for business and personal use. But CrashPlan for Home and CrashPlan for Small Business are two different products. Expectations of businesses and home users continue to diverge. Businesses, small and large, are worried about things like the cost of doing business, privacy of employee data, and management of data for regulatory compliance (for instance, HIPAA data). These features simply aren’t needed by home users. This is where Code42’s ability to focus exclusively on needs of businesses will benefit our CrashPlan for Small Business customers. That’s because these are the types of problems we’ve been working on for our larger business customers, and we’re now able to apply those investments toward CrashPlan for Small Business.

We’ve already made several dedicated investments in CrashPlan for Small Business that will be ready to debut in 2017 and 2018. For example, we are:

  • Exploring the ability to make it possible for customers to purchase Code42 products more easily without necessarily having to go through a month-long trial (which is required today).
  • Working to introduce a new streamlined user experience for the CrashPlan for Small Business client to simplify common tasks like getting files from your backup or replacing an existing device.

These are just a couple of examples of investments that will lead to even greater innovations in the coming months and years. For those of you now using or considering using CrashPlan for Small Business, let me share some details on what enhancements you can expect.

Device migration

The process for updating computers or replacing lost or stolen laptops can be quite a struggle for most of us. You may not be sure that you’ve got all the data. Plus, you might spend several hours getting all your files from your old computer to a new computer. It’s common to spend half a day, or sometimes a whole day, getting to your new computer set up just right will all your files.

Code42 has long offered a device adoption feature in the CrashPlan client to help users with this process. We received a lot of feedback from customers that the device adoption feature is hard to understand and use. So last year, we introduced a refreshed device replacement workflow as part of the CrashPlan client that we delivered to our larger enterprise customers, and made several improvements in that workflow since. Several of our customers like Getty Images, Jones Lang Lasalle, and Schneider Electric use this updated capability.

CrashPlan for Small Business Device Replacement

When we introduce the new user experience in CrashPlan for Small Business in the near future, you will be able to take advantage of this new, simplified device replacement feature as well. You will spend less time figuring out how to get your files from your old computer to your new one, and it will be easier for you to replace your old computer with the new one.

Security & compliance

Health Insurance Portability and Accountability Act (HIPAA)
Many small and emerging businesses have a need to manage their backup data in a HIPAA compliant manner. If you’re in the healthcare services sector or a law firm, then you know what I’m talking about. Such businesses need technology vendors with whom they can have a Business Associate Agreement (BAA).

Today, Code42 offers the ability to execute a BAA only to our larger enterprise customers – CrashPlan for Small Business customers don’t have this option. As a result, many small businesses opt to purchase our product aimed at larger enterprises. This introduces added complexity to their IT operations, and can add to cost of doing business. Over the last couple of years, Code42 has invested more in the compliance and security aspects of our core platform, and in our internal company processes to make it easier for our enterprise customers to manage their data in a HIPAA-compliant manner. In the near future, we’re planning to introduce the ability to sign a HIPPA BAA for CrashPlan for Small Business customers.

Code42 Security Center
A key feature we’ve rolled out in 2017 for Code42 Enterprise is Code42 Security Center. This feature helps companies figure out if a departing employee has taken sensitive company data with him by copying it to a thumb drive or a personal Dropbox or Google Drive folder. We are exploring the potential of making this application available for small businesses.

Increased globalization

Currently, the majority of CrashPlan for Small Business customers reside in the U.S. While we also have a strong and growing base globally, including in the U.K., Australia, New Zealand and more, those customers have to purchase CrashPlan for Small Business in US Dollars. The data Code42 manages for those customers also resides in Code42’s secure U.S. data centers. For our customers in other parts of the world, this can lead to poor experience with restore speeds, and with the purchase process. We have had many requests from our non-U.S. customers and prospects to be able to purchase CrashPlan for Small Business using local currency, and to have the data reside in their regions.

Based on this feedback, we will expanding our CrashPlan for Small Business features to allow transactions in non-U.S. currencies, and to allow data storage in Code42’s secure data centers around the globe. We will start first with Europe and the U.K., and then work to expand to other regions based on customer need and demand.

These are just a few of the exciting new capabilities we’re working on for CrashPlan for Small Businesses. As we work on all these improvements, we’re also very keen to get direct feedback from our CrashPlan for Small Business customers. To help with this, we have formed a new internal CrashPlan for Small Business Customer Council, which is designed to meet with customers, consider their feedback, and adjust our product development roadmap.

Looking ahead

I am truly excited about all the new capabilities we’re developing for our business customers. We’re working hard to deliver high-quality products that will delight you and will continue to “just work” for you! Thank you for taking the time to read this blog post. Thank you also for considering Code42, and CrashPlan for Small Business for your business needs.

Product Spotlight: Code42 6.0 Platform Launch

Turn endpoint data into valuable security insights, lock user access to data that may be compromised, and experience a simpler, faster platform.

We are pleased to announce that Code42’s 6.0 platform is generally available today! This latest version introduces several new features and upgrades, including:

  • Security Center, which provides the ability to create thresholds for user data activity and configure automatic notifications.
  • Access Lock, which enables administrators to prevent unauthorized access to all content on a device.
  • Refreshed administration console design.
  • A simplified process for managing legal holds.
  • New subscription options called product plans enable administrators to customize which features are available in their Code42 environment.

Security Center:

Starting in the 5-series, Code42 began making significant strides towards solving some of today’s most pressing security concerns for our customers. With Security Center, Code42 provides enterprises with proactive alerts to detect and mitigate insider threat incidents. Leveraging Code42’s multiple-purpose single agent, this app tracks user behavioral patterns based on profile settings, letting you track when data movements exceed established thresholds. Specifically, this allows you to focus on data exfiltration to removable media and cloud storage folders.

Access Lock:

A new feature added by popular demand, Access Lock allows customers to place a device-level lock on users that may be compromising data. Access Lock was built as an immediate action step to the alerts that may be triggered by Security Center. Unlike conventional Remote Wipe approaches, the Code42 approach is unique in that we prevent access to all data on the device, not just the data tagged for backup!

Platform:

In addition to the introduction of new features, 6.0 also comes with a number of exciting platform updates to significantly speed up and ease your Code42 experience. These updates span the Code42 dashboard experience, Cold Storage management, license subscription management and Legal Hold enhancements.

Get started today

Take advantage of these and other 6.0 features by upgrading to version 6.0 of the Code42 platform. View the release notes for more details, and upgrade now.

Why Local Deduplication Is the Key to Faster Restores

Why Local Deduplication Is the Key to Faster Restores

Scan through the Code42 blog and you could sum things up by saying, “Back up your data, back up your data, back up your data.” It’s true that backing up all of your endpoint data is the critical and foundational step in a modern data security strategy (and something most companies still don’t get right). But data recovery is where the rubber meets the road. Faster restores mean you get your files back sooner, minimize downtime and get back to business faster.

What if we told you there was one simple way to make your restores up to nine times faster—and that many enterprise backup solutions still choose NOT to use this approach?

The old way: minimize storage with global data deduplication

Most businesses are accustomed to worrying about minimizing data storage to control costs. Global data deduplication was designed to address this concern, creating one giant data store containing a single copy of each unique block of data across all users in the enterprise. Restores with global dedupe can be painfully slow—it takes a long time to scan one enormous data store to locate all the unique pieces of data needed for a given user’s device restore. But hey, slow restores are worth it because you’re paying a lot less for storage, right?

Wrong. Today the cloud makes flexible data storage incredibly affordable. That’s why Code42 offers truly unlimited backup storage for our customers. So if your backup provider is still touting the benefits of global dedupe, it might be time to ask, “Benefits to whom?”

The better way: maximize restore speeds with local deduplication

Freed from the need to minimize the overall size of data backups, businesses can now take full advantage of local data deduplication to maximize restore speeds. Local dedupe creates user-specific data stores, making it quick and easy for the backup application to locate a user’s files and data in a restore scenario. Just how much faster? One independent study showed that Code42’s restores using local deduplication were five to nine times faster than restores using global deduplication. That’s no small advantage. And with the cost of downtime and lost productivity rising, every minute truly counts.

Want to get your data back faster? Read our latest white paper “Get Your Data Back Faster: Why Enterprises Should Choose Local Deduplication for Endpoint Data Backup” to see how local data deduplication and unlimited data storage give you powerful business continuity advantages.

User Adoption: 5 Ways to Get and Keep Your Users on Code42

Welcome to the Code42 family! Now that you have made the decision to protect all of your endpoint data, how do you communicate this great new tool to your users and get it into their hands? I recently presented a webinar about user adoption, which is a topic I feel strongly about. As a member of our Customer Success team, I have worked on many of our very large enterprise deployments. I sometimes see customers in IT departments that love and value the product, but run into roadblocks when trying to get their users on board. Some of the ways to get and keep your users on Code42 are shared below and in the webinar.

First, I recommend making sure your users understand why you purchased Code42 in the first place. I walk though real stories on how Code42 can help users, such as never needing to worry about ransomware, lost files, failed hard drives, or losing data when migrating to a new laptop.

Another recommendation is to communicate your specific use cases to your users by creating email campaigns or internal marketing events and advertising Code42 to your users. Our user adoption kit is a great place to start for assets to help with your internal campaign! This will get the word out about the application and how much of a productivity booster it can really be.

Lastly, it’s imperative that the application can be deployed to your users in the least disruptive way possible. I review the different deployment strategies and the new usability of the latest Code42 client to help assist with this.

Throughout the webinar, I show a couple demos, uncover a few “gotchas” and share tips and tricks to help your users adopt quicker. I hope you enjoy it!

Code42 Tackles the “People” Problem with Security Center

The people in your organization are a problem. Sounds controversial, doesn’t it? Any time you mention the word “problem” preceded or followed by “people,” you’re asking for backlash of some kind. Yet in today’s modern enterprise, the “people” problem presents more challenges than you’d think. Also known as insider threat, this issue currently costs the average company $4.3 million a year. Unfortunately, this is a growing trend that promises to only get worse.

After all, people with credentials who work within your walls tend to have a good understanding of what data is available, what it’s worth and how it’s protected. This makes it difficult for enterprises to defend against a variety of scenarios, such as a terminated employee transporting valuable data out the door or disgruntled employees looking to turn a profit—or just inflict damage—by sending data to competitors.

Not surprisingly, many of Code42’s customers told us statements such as:

  • “I don’t know which departing employee might be taking sensitive data.”
  • “I don’t know which critical employees might be leaking sensitive data.”
  • “I can’t track how data moves through my organization.”

Enter Security Center, a powerful web app announced today at our Evolution17 customer conference. Security Center provides enterprises with proactive alerts to detect and mitigate insider threat incidents. Leveraging Code42’s multiple-purpose single agent, this app tracks user behavioral patterns based on profile settings, letting you track when data movements exceed established thresholds. Specifically, this allows you to focus on data exfiltration to removable media and cloud storage folders. With Security Center, IT is immediately notified when user behaviors that may include suspicious file transfers occur so follow up action can be taken. And with the included Access Lock feature, IT admins can go a step further and lock a user out of a device if there is a perceived threat. By locking down a device rather than remotely wiping it, users’ access to their files can be immediately restored if the activity that caused the alert turns out to be legitimate.

Security Center is the start to a very important Code42 journey. It signals the beginning of tackling the very important “people” problem that continues to plague today’s mobile driven enterprise. Over time, significant investments into file forensics and user behavior analytics (UBA) leveraging machine learning will allow customers to access even more advanced information about who ever had access to confidential data, and to further predict who is most likely to exfiltrate and leak data. The future is truly exciting!

Upgrading with Code42: Make it Second Nature

While upgrading most software is second nature to most of us, we know that sometimes customers forget to upgrade, and it’s easy to fall a few versions behind. This is why we recently hosted a webinar for technical tips and tricks for upgrading the Code42 platform. This webinar was designed to make it easy to stay up to date, and includes a quick demo to put these tips into action.

Code42 is constantly evolving, enhancing existing features and adding new ones. In addition to the fun stuff, we’re constantly adding behind-the-scenes enhancements such as security patches and performance improvements. In the webinar, I discuss some best practices when performing upgrades. The upgrade process has been significantly streamlined and improved over the years, but there are still some very important tips to keep in mind.

For example, Code42 creates a database dump every night. This database dump contains your entire master server settings, such as users, LDAP configuration, encryption keys and much more. This database allows you to restore quickly in case something goes wrong during the upgrade. It is very important that you back this up in general, but manually dumping a copy right before performing an upgrade is critical. Our support article on recovering a server covers the process of restoring your master server if needed.

We’ve also got tips on controlling client upgrades to help with network issues in larger environments. These tips also apply to deploying the redesigned client included with the Code42 server 5.x upgrades. It is perfectly fine to have a mix of the legacy 4.x client and the newer 5.x client in your environment.

If you aren’t up to date in your Code42 environment and aren’t sure where to start, check out the webinar. We’re confident that you’ll find the information within it useful, but if you need any additional help, please remember to reach out to our technical support team or your CSM for additional help.

Data Migration: Moving Your Organization’s Crown Jewels

I recently hosted an on-demand webinar in which I covered the technical details on performing data migrations using Code42. In past webinars and blog posts, we’ve talk about the benefits of using Code42 for migration—in other words, the WHY. But what we haven’t covered in-depth is the HOW.

In this webinar, I walk through the three main approaches in performing migrations. They are the self-service, Do-It-For-Me (DIFM), and the Do-It-With-Me (DIWM). The self-service migration utilizes the self-service wizard in the client and allows the user to migrate their settings (as of the 5.4 client) and files themselves to their new device. The DIFM method involves IT performing the migration on behalf of the user. The user simply hands in their old device and is immediately given their new device. Finally, the DIWM method is a combination of the two. IT works directly with the user in migrating the data, typically through the self-service wizard. Each has its pros and cons depending upon resources, time, geography, automation, etc.

When it comes to Windows migrations, we now support the migration of a user’s profile along with their data (as of the 5.0 & 4.4 clients). A user profile includes things like wallpaper, folder options, taskbar settings, etc. To do that, Code42 leverages the Windows User State Migration Tool (USMT). Why did Code42 choose to use that instead of building it directly in? Well, USMT gives you the power and flexibility to migrate nearly anything and is built by Microsoft themselves. I go into detail on exactly how to set that up, what’s best practice, and how to troubleshoot errors.

For the Do-It-For-Me migration, I walk through all the steps in detail on how an IT professional can perform the migration without the user needing to be present—in other words, a completely white-glove approach. And for organizations that are tasked with hundreds or thousands of these migrations, I point out the steps in the process that can be automated through the Code42 API.

Along with the approaches, I cover how to stay on top of devices that may have been orphaned from a migration process where the old device was not adopted. Throughout the webinar, I try to provide some helpful hints to help in your successful migration project, so I hope you will check it out today!

Facebook Twitter Google LinkedIn YouTube