Driving Innovation for CrashPlan for Small Business

When we announced our exclusive focus on businesses of all sizes, there were (understandably) a lot of questions about what this means for the future of CrashPlan for Small Business. For those of you who aren’t familiar, CrashPlan for Small Business is our unlimited, automated, and secure cloud backup product designed for emerging businesses with less than 200 employees (including freelancers, home-based businesses, and more).

I understand why those questions came up. We routinely see IT consultants advising this segment to use CrashPlan for Home, and businesses opting for it instead of CrashPlan for Small Business. As a whole, CrashPlan for Home has largely been seen as interchangeable for business and personal use. But CrashPlan for Home and CrashPlan for Small Business are two different products. Expectations of businesses and home users continue to diverge. Businesses, small and large, are worried about things like the cost of doing business, privacy of employee data, and management of data for regulatory compliance (for instance, HIPAA data). These features simply aren’t needed by home users. This is where Code42’s ability to focus exclusively on needs of businesses will benefit our CrashPlan for Small Business customers. That’s because these are the types of problems we’ve been working on for our larger business customers, and we’re now able to apply those investments toward CrashPlan for Small Business.

We’ve already made several dedicated investments in CrashPlan for Small Business that will be ready to debut in 2017 and 2018. For example, we are:

  • Exploring the ability to make it possible for customers to purchase Code42 products more easily without necessarily having to go through a month-long trial (which is required today).
  • Working to introduce a new streamlined user experience for the CrashPlan for Small Business client to simplify common tasks like getting files from your backup or replacing an existing device.

These are just a couple of examples of investments that will lead to even greater innovations in the coming months and years. For those of you now using or considering using CrashPlan for Small Business, let me share some details on what enhancements you can expect.

Device migration

The process for updating computers or replacing lost or stolen laptops can be quite a struggle for most of us. You may not be sure that you’ve got all the data. Plus, you might spend several hours getting all your files from your old computer to a new computer. It’s common to spend half a day, or sometimes a whole day, getting to your new computer set up just right will all your files.

Code42 has long offered a device adoption feature in the CrashPlan client to help users with this process. We received a lot of feedback from customers that the device adoption feature is hard to understand and use. So last year, we introduced a refreshed device replacement workflow as part of the CrashPlan client that we delivered to our larger enterprise customers, and made several improvements in that workflow since. Several of our customers like Getty Images, Jones Lang Lasalle, and Schneider Electric use this updated capability.

CrashPlan for Small Business Device Replacement

When we introduce the new user experience in CrashPlan for Small Business in the near future, you will be able to take advantage of this new, simplified device replacement feature as well. You will spend less time figuring out how to get your files from your old computer to your new one, and it will be easier for you to replace your old computer with the new one.

Security & compliance

Health Insurance Portability and Accountability Act (HIPAA)
Many small and emerging businesses have a need to manage their backup data in a HIPAA compliant manner. If you’re in the healthcare services sector or a law firm, then you know what I’m talking about. Such businesses need technology vendors with whom they can have a Business Associate Agreement (BAA).

Today, Code42 offers the ability to execute a BAA only to our larger enterprise customers – CrashPlan for Small Business customers don’t have this option. As a result, many small businesses opt to purchase our product aimed at larger enterprises. This introduces added complexity to their IT operations, and can add to cost of doing business. Over the last couple of years, Code42 has invested more in the compliance and security aspects of our core platform, and in our internal company processes to make it easier for our enterprise customers to manage their data in a HIPAA-compliant manner. In the near future, we’re planning to introduce the ability to sign a HIPPA BAA for CrashPlan for Small Business customers.

Code42 Security Center
A key feature we’ve rolled out in 2017 for Code42 Enterprise is Code42 Security Center. This feature helps companies figure out if a departing employee has taken sensitive company data with him by copying it to a thumb drive or a personal Dropbox or Google Drive folder. We are exploring the potential of making this application available for small businesses.

Increased globalization

Currently, the majority of CrashPlan for Small Business customers reside in the U.S. While we also have a strong and growing base globally, including in the U.K., Australia, New Zealand and more, those customers have to purchase CrashPlan for Small Business in US Dollars. The data Code42 manages for those customers also resides in Code42’s secure U.S. data centers. For our customers in other parts of the world, this can lead to poor experience with restore speeds, and with the purchase process. We have had many requests from our non-U.S. customers and prospects to be able to purchase CrashPlan for Small Business using local currency, and to have the data reside in their regions.

Based on this feedback, we will expanding our CrashPlan for Small Business features to allow transactions in non-U.S. currencies, and to allow data storage in Code42’s secure data centers around the globe. We will start first with Europe and the U.K., and then work to expand to other regions based on customer need and demand.

These are just a few of the exciting new capabilities we’re working on for CrashPlan for Small Businesses. As we work on all these improvements, we’re also very keen to get direct feedback from our CrashPlan for Small Business customers. To help with this, we have formed a new internal CrashPlan for Small Business Customer Council, which is designed to meet with customers, consider their feedback, and adjust our product development roadmap.

Looking ahead

I am truly excited about all the new capabilities we’re developing for our business customers. We’re working hard to deliver high-quality products that will delight you and will continue to “just work” for you! Thank you for taking the time to read this blog post. Thank you also for considering Code42, and CrashPlan for Small Business for your business needs.

Product Spotlight: Code42 6.0 Platform Launch

Turn endpoint data into valuable security insights, lock user access to data that may be compromised, and experience a simpler, faster platform.

We are pleased to announce that Code42’s 6.0 platform is generally available today! This latest version introduces several new features and upgrades, including:

  • Security Center, which provides the ability to create thresholds for user data activity and configure automatic notifications.
  • Access Lock, which enables administrators to prevent unauthorized access to all content on a device.
  • Refreshed administration console design.
  • A simplified process for managing legal holds.
  • New subscription options called product plans enable administrators to customize which features are available in their Code42 environment.

Security Center:

Starting in the 5-series, Code42 began making significant strides towards solving some of today’s most pressing security concerns for our customers. With Security Center, Code42 provides enterprises with proactive alerts to detect and mitigate insider threat incidents. Leveraging Code42’s multiple-purpose single agent, this app tracks user behavioral patterns based on profile settings, letting you track when data movements exceed established thresholds. Specifically, this allows you to focus on data exfiltration to removable media and cloud storage folders.

Access Lock:

A new feature added by popular demand, Access Lock allows customers to place a device-level lock on users that may be compromising data. Access Lock was built as an immediate action step to the alerts that may be triggered by Security Center. Unlike conventional Remote Wipe approaches, the Code42 approach is unique in that we prevent access to all data on the device, not just the data tagged for backup!


In addition to the introduction of new features, 6.0 also comes with a number of exciting platform updates to significantly speed up and ease your Code42 experience. These updates span the Code42 dashboard experience, Cold Storage management, license subscription management and Legal Hold enhancements.

Get started today

Take advantage of these and other 6.0 features by upgrading to version 6.0 of the Code42 platform. View the release notes for more details, and upgrade now.

Why Local Deduplication Is the Key to Faster Restores

Why Local Deduplication Is the Key to Faster Restores

Scan through the Code42 blog and you could sum things up by saying, “Back up your data, back up your data, back up your data.” It’s true that backing up all of your endpoint data is the critical and foundational step in a modern data security strategy (and something most companies still don’t get right). But data recovery is where the rubber meets the road. Faster restores mean you get your files back sooner, minimize downtime and get back to business faster.

What if we told you there was one simple way to make your restores up to nine times faster—and that many enterprise backup solutions still choose NOT to use this approach?

The old way: minimize storage with global data deduplication

Most businesses are accustomed to worrying about minimizing data storage to control costs. Global data deduplication was designed to address this concern, creating one giant data store containing a single copy of each unique block of data across all users in the enterprise. Restores with global dedupe can be painfully slow—it takes a long time to scan one enormous data store to locate all the unique pieces of data needed for a given user’s device restore. But hey, slow restores are worth it because you’re paying a lot less for storage, right?

Wrong. Today the cloud makes flexible data storage incredibly affordable. That’s why Code42 offers truly unlimited backup storage for our customers. So if your backup provider is still touting the benefits of global dedupe, it might be time to ask, “Benefits to whom?”

The better way: maximize restore speeds with local deduplication

Freed from the need to minimize the overall size of data backups, businesses can now take full advantage of local data deduplication to maximize restore speeds. Local dedupe creates user-specific data stores, making it quick and easy for the backup application to locate a user’s files and data in a restore scenario. Just how much faster? One independent study showed that Code42’s restores using local deduplication were five to nine times faster than restores using global deduplication. That’s no small advantage. And with the cost of downtime and lost productivity rising, every minute truly counts.

Want to get your data back faster? Read our latest white paper “Get Your Data Back Faster: Why Enterprises Should Choose Local Deduplication for Endpoint Data Backup” to see how local data deduplication and unlimited data storage give you powerful business continuity advantages.

User Adoption: 5 Ways to Get and Keep Your Users on Code42

Welcome to the Code42 family! Now that you have made the decision to protect all of your endpoint data, how do you communicate this great new tool to your users and get it into their hands? I recently presented a webinar about user adoption, which is a topic I feel strongly about. As a member of our Customer Success team, I have worked on many of our very large enterprise deployments. I sometimes see customers in IT departments that love and value the product, but run into roadblocks when trying to get their users on board. Some of the ways to get and keep your users on Code42 are shared below and in the webinar.

First, I recommend making sure your users understand why you purchased Code42 in the first place. I walk though real stories on how Code42 can help users, such as never needing to worry about ransomware, lost files, failed hard drives, or losing data when migrating to a new laptop.

Another recommendation is to communicate your specific use cases to your users by creating email campaigns or internal marketing events and advertising Code42 to your users. Our user adoption kit is a great place to start for assets to help with your internal campaign! This will get the word out about the application and how much of a productivity booster it can really be.

Lastly, it’s imperative that the application can be deployed to your users in the least disruptive way possible. I review the different deployment strategies and the new usability of the latest Code42 client to help assist with this.

Throughout the webinar, I show a couple demos, uncover a few “gotchas” and share tips and tricks to help your users adopt quicker. I hope you enjoy it!

Code42 Tackles the “People” Problem with Security Center

The people in your organization are a problem. Sounds controversial, doesn’t it? Any time you mention the word “problem” preceded or followed by “people,” you’re asking for backlash of some kind. Yet in today’s modern enterprise, the “people” problem presents more challenges than you’d think. Also known as insider threat, this issue currently costs the average company $4.3 million a year. Unfortunately, this is a growing trend that promises to only get worse.

After all, people with credentials who work within your walls tend to have a good understanding of what data is available, what it’s worth and how it’s protected. This makes it difficult for enterprises to defend against a variety of scenarios, such as a terminated employee transporting valuable data out the door or disgruntled employees looking to turn a profit—or just inflict damage—by sending data to competitors.

Not surprisingly, many of Code42’s customers told us statements such as:

  • “I don’t know which departing employee might be taking sensitive data.”
  • “I don’t know which critical employees might be leaking sensitive data.”
  • “I can’t track how data moves through my organization.”

Enter Security Center, a powerful web app announced today at our Evolution17 customer conference. Security Center provides enterprises with proactive alerts to detect and mitigate insider threat incidents. Leveraging Code42’s multiple-purpose single agent, this app tracks user behavioral patterns based on profile settings, letting you track when data movements exceed established thresholds. Specifically, this allows you to focus on data exfiltration to removable media and cloud storage folders. With Security Center, IT is immediately notified when user behaviors that may include suspicious file transfers occur so follow up action can be taken. And with the included Access Lock feature, IT admins can go a step further and lock a user out of a device if there is a perceived threat. By locking down a device rather than remotely wiping it, users’ access to their files can be immediately restored if the activity that caused the alert turns out to be legitimate.

Security Center is the start to a very important Code42 journey. It signals the beginning of tackling the very important “people” problem that continues to plague today’s mobile driven enterprise. Over time, significant investments into file forensics and user behavior analytics (UBA) leveraging machine learning will allow customers to access even more advanced information about who ever had access to confidential data, and to further predict who is most likely to exfiltrate and leak data. The future is truly exciting!

Upgrading with Code42: Make it Second Nature

While upgrading most software is second nature to most of us, we know that sometimes customers forget to upgrade, and it’s easy to fall a few versions behind. This is why we recently hosted a webinar for technical tips and tricks for upgrading the Code42 platform. This webinar was designed to make it easy to stay up to date, and includes a quick demo to put these tips into action.

Code42 is constantly evolving, enhancing existing features and adding new ones. In addition to the fun stuff, we’re constantly adding behind-the-scenes enhancements such as security patches and performance improvements. In the webinar, I discuss some best practices when performing upgrades. The upgrade process has been significantly streamlined and improved over the years, but there are still some very important tips to keep in mind.

For example, Code42 creates a database dump every night. This database dump contains your entire master server settings, such as users, LDAP configuration, encryption keys and much more. This database allows you to restore quickly in case something goes wrong during the upgrade. It is very important that you back this up in general, but manually dumping a copy right before performing an upgrade is critical. Our support article on recovering a server covers the process of restoring your master server if needed.

We’ve also got tips on controlling client upgrades to help with network issues in larger environments. These tips also apply to deploying the redesigned client included with the Code42 server 5.x upgrades. It is perfectly fine to have a mix of the legacy 4.x client and the newer 5.x client in your environment.

If you aren’t up to date in your Code42 environment and aren’t sure where to start, check out the webinar. We’re confident that you’ll find the information within it useful, but if you need any additional help, please remember to reach out to our technical support team or your CSM for additional help.

Data Migration: Moving Your Organization’s Crown Jewels

I recently hosted an on-demand webinar in which I covered the technical details on performing data migrations using Code42. In past webinars and blog posts, we’ve talk about the benefits of using Code42 for migration—in other words, the WHY. But what we haven’t covered in-depth is the HOW.

In this webinar, I walk through the three main approaches in performing migrations. They are the self-service, Do-It-For-Me (DIFM), and the Do-It-With-Me (DIWM). The self-service migration utilizes the self-service wizard in the client and allows the user to migrate their settings (as of the 5.4 client) and files themselves to their new device. The DIFM method involves IT performing the migration on behalf of the user. The user simply hands in their old device and is immediately given their new device. Finally, the DIWM method is a combination of the two. IT works directly with the user in migrating the data, typically through the self-service wizard. Each has its pros and cons depending upon resources, time, geography, automation, etc.

When it comes to Windows migrations, we now support the migration of a user’s profile along with their data (as of the 5.0 & 4.4 clients). A user profile includes things like wallpaper, folder options, taskbar settings, etc. To do that, Code42 leverages the Windows User State Migration Tool (USMT). Why did Code42 choose to use that instead of building it directly in? Well, USMT gives you the power and flexibility to migrate nearly anything and is built by Microsoft themselves. I go into detail on exactly how to set that up, what’s best practice, and how to troubleshoot errors.

For the Do-It-For-Me migration, I walk through all the steps in detail on how an IT professional can perform the migration without the user needing to be present—in other words, a completely white-glove approach. And for organizations that are tasked with hundreds or thousands of these migrations, I point out the steps in the process that can be automated through the Code42 API.

Along with the approaches, I cover how to stay on top of devices that may have been orphaned from a migration process where the old device was not adopted. Throughout the webinar, I try to provide some helpful hints to help in your successful migration project, so I hope you will check it out today!

Code42: Compliance Without the Headaches

The speed and breadth of regulatory change is a growing issue for businesses around the globe. The number of regulatory issues that require business compliance has been steadily increasing. Already, more than one-third of organizations spend at least an entire day each week tracking and analyzing regulatory change, according to a survey by ThomasReuters. What’s more, a majority of businesses expect the need for compliance management to grow at a time when a shortage of compliance personnel is forcing them to do more with less. Fortunately, Code42 helps you close that compliance gap with heightened visibility, easy compliance management, and the confidence that it already supports the standards and regulatory controls you care about.

Complying with standards and procedures provides a lot of benefits. But, for many companies, it also poses a stressful and costly problem. Obtaining visibility into where there are gaps in compliance can be difficult. Passing a compliance audit can be one of the most taxing activities an IT administrator handles. Failing to pass an audit can mean lost accounts and time taken away from the day-to-day business. In the end, it’s a lot easier and less expensive to pass an audit than to face the distraction and red tape of trying to become compliant after the fact.

Taking the stress out of compliance with Code42

Code42 software reduces the time, stress, and financial burden of meeting a company’s compliance requirements. It also makes it easier to preserve information for legal holds and compliance audits. Consider the following benefits:

  • Complies with a broad range of standards. Code42 supports a wide range of compliance efforts. (Please see the full list below.) And in our latest 5.4 release, we’ve included a new single-click compliance setting feature that enables IT administrators to restrict access to data in accordance with requirements such as the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GLBA), and the Federal Information Security Management Act (FISMA). But, Code42 does more than just constrain data access to conform to standards. It also helps IT administrators become more educated. The compliance settings button prompts a guided wizard that sheds light on the implications of different settings, minimizing the back-and-forth communication required with the company’s legal team.
  • Offers 360° visibility into an organization’s data. With Code42, administrators can see who’s accessing data, where they’re storing it, and who’s attempting to decrypt it. For example, consider a hospital that needs to comply with HIPAA regulations governing the use of patient records. With Code42’s easy-to-use administrative console, IT admins can see who is opening patient health records and how they’re using them. They can see when an IT person is saving patient information to an external hard drive, for instance, or when a marketing employee is emailing a spreadsheet with patient information—allowing them to take immediate corrective action.
  • Reinforces companies’ data retention policies. Code42 automatically backs up every version of every file—continuously and without disrupting users—eliminating the need for manual data collection and re-collection. With Code42, IT admins can also see where individual employees are moving data, and whether any business departments or end-user devices are out of compliance.
  • Adheres to leading-edge encryption standards. With Code42, you can rest assured you are using the strongest, leading-edge standard encryption protocols in the industry today. It supports the Advanced Encryption Standard (AES), considered the standard for electronic data encryption and used by businesses worldwide. It also uses the Transport Layer Security (TLS), a cryptographic protocol that ensures privacy and data integrity between communicating computer applications.
  • Provides a thorough audit trail complete with file content. Unlike other backup software, which only provides the name of the file accessed, the computer used to access it, and the time and date, Code42 goes a step further by showing the actual content of the file. With the actual content in hand, administrators can definitively understand the exact information that’s been accessed.
  • Preserves in-place legal holds. With Code42, organizations can place users under legal hold and automatically lock data retention policies in real time without affecting existing backups or productivity. In addition, data under legal hold can be automatically sent to legal teams or eDiscovery systems.

Easy compliance at a low cost

Code42 can help organizations like yours keep pace with a rapidly changing regulatory environment, ensuring your compliance, while minimizing your costs. For more information, please see the Code42 “Security, Trust + Compliance” webpage.

Compliance Efforts Supported by Code42

Code42 complies with the following legal requirements, certifications, and programs in public and hybrid cloud deployments. For private deployments, customers need to check whether Code42 is meeting these obligations.

  • ISO 27001:2013
  • Privacy Shield
  • Cloud Security Alliance Registry

Depending on how you use Code42 within your private deployments, it can assist in any of the following compliance areas:

  • ITAR
  • GLBA
  • US DOD
  • SOX
  • PCI
  • US Export Controls
  • ISO 27001:2013
  • Privacy Shield
  • Cloud Security Alliance Registry

What They’re Not Telling You About Global Deduplication

When it comes to endpoint backup, is global deduplication a valuable differentiator?

Not if data security and recovery are your primary objectives.

Backup vendors that promote global deduplication say it minimizes the amount of data that must be stored and provides faster upload speeds. What they don’t say is how data security and recovery are sacrificed to achieve these “benefits.”

Here’s a key difference: with local deduplication, data redundancy is evaluated and removed on the endpoint before data is backed up. Files are stored in the cloud by the user and are easily located and restored to any device. With global deduplication, all data is sent to the cloud, but only one instance of a data block is stored.

They tell you: “You’ll store less data!”

It’s true that global deduplication reduces the number of files in your data store, but that’s not always a good thing. At first blush, storing less data sounds like a benefit, especially if you’re paying for endpoint backup based on data volume. But other than potential cost savings, how does storing less data actually benefit your organization?

Not as much as you think.

For most organizations, the bulk of the files removed by the global deduplication process will be unstructured data such as documents, spreadsheets and presentations—files that are not typically big to begin with—making storage savings resulting from global dedupe minimal. The files that gobble up the bulk of your data storage are those that are unlikely to be floating around in duplicate—such as databases, video and design source files, etc.

What they don’t tell you: Storing less data doesn’t actually benefit your organization. Smaller data stores benefit the solution provider. Why? Data storage costs money and endpoint backup providers pay for huge amounts of data storage and bandwidth every month. By limiting the data stored to one copy of each unique file, the solution provider can get away with storing less data for all of its customers, resulting in smaller procurement costs each month—for them.

Vendors that offer global dedupe also fail to mention that it puts an organization at risk of losing data because (essentially) all the eggs are in one basket. When one file or data block is used by many users but saved just once, (e.g., the HR handbook for a global enterprise, sales pitch decks or customer contact lists) all users will experience the same file loss or corruption if the single instance of the file is corrupted in the cloud.

They tell you: “It uploads data faster.”

First, let’s define “faster.” The question is, faster than what? Admittedly, there’s a marginal difference in upload speeds between global and local deduplication, but it’s a lot like comparing a Ferrari and a Maserati. If a Ferrari tops out at 217 miles per hour and a Maserati tops out at 185 miles per hour, clearly the Ferrari wins. It’s technically faster, but considering that the maximum legal speed on most freeways is 70-75 miles per hour, the additional speed on both vehicles is a moot point. Both cars are wickedly fast but a person is not likely to get to drive either at its top speed, so what does matter? The fact is, it doesn’t.

The same can be said about the speed “gains” achieved by utilizing global deduplication over local deduplication. Quality endpoint backup solutions will provide fast data uploads regardless of whether they use global deduplication or local deduplication. There’s a good chance that there will be no detectable difference in speed between the two methods because upload speed is limited by bandwidth. And even if you could detect a difference in upload speed, what does that matter? What’s important is the speed of recovery, and on that matter, local deduplication is the clear winner.

What they don’t tell you: Global deduplication comes at a cost: restore speeds will be orders of magnitude slower than restoration of data that has been locally deduplicated. Here’s why: with global deduplication, all of your data is stored in one place and only one copy of a unique file is stored in the cloud regardless of how many people save a copy. Rather than store multiples of the same file, endpoint backup that utilizes global deduplication maps each user to the single stored instance. As the data store grows in size, it becomes harder for the backup solution to quickly locate and restore a file mapped to a user in the giant data set.

Imagine that the data store is like a library. Mapping is like the Dewey Decimal System, only the mapped books are stored as giant book piles rather than by topic or author. When the library is small, it’s relatively easy to scan the book spines for the Dewey Decimal numbers. However, as the library collection (that is, book piles) gets larger, finding a single book becomes more time consuming and resource intensive.

Data storage under the global deduplication framework is like the library example above. Unique files or data blocks are indexed as they come into the data store and are not grouped by user. When the data store is small, it’s relatively easy for the system to locate all of the data blocks mapped to one user when a restore is necessary. As the data store grows in size, the process of locating all of the data blocks takes longer. This slows down the restore process and forces the end user to wait at the most critical point in the process—when he or she needs to get files back in order to continue working. With local deduplication, the system goes straight to the unique data store and performs a restore from the most recent clean backup. As a result, local deduplication restores are five to nine times faster than with global deduplication.

The real security story: What you’re not being told about global deduplication doesn’t stop there. Two-factor encryption doesn’t mean what you think it does. Frankly, an encryption key coupled with an administrator password is NOT two-factor encryption. It’s not even two-factor authentication. It’s simply a password layered over a regular encryption key. Should someone with the encryption key compromise the password, he or she will have immediate access to all of your data.


Companies that deploy endpoint backup clearly care about the security of their data. They count on endpoint backup to reliably restore their data after a loss or breach. Given the vulnerabilities exposed by the global deduplication model, it is counterintuitive to sacrifice security and reliability in a backup model in favor of “benefits” that profit the seller or cannot be experienced by the buyer.

Customers Say It Best: Code42 Is Easy to Administer and Manage

In a recent meeting with a Code42 customer, an IT administrator responsible for implementing our software walked into the room, gave a member of our team a big hug, and said that Code42 was the single best rollout he’s ever completed in the company’s history. IT people aren’t known for being touchy-feely, yet this administrator was clearly thrilled. Why? Because the installation and configuration are easy, allowing just one administrator to roll out Code42 software to tens of thousands of users.

Today, Code42 enjoys industry-wide popularity, and the use of our software only continues to grow. Seven of the top 10 academic institutions protect their data using Code42, as do many of the top tech firms around the world. What’s more, we have the high renewal rates befitting of a market leader. One reason for this is that Code42 is extremely easy to administer and manage.

The growing complexity of endpoint administration 

For today’s IT admins, managing endpoint devices poses a huge challenge. IT staff are constantly battling issues such as hacking attempts and the misuse of company assets—and these challenges are only accelerating. Indeed, the number of security incidents across all industries rose by 38 percent in 2015, while intellectual property theft shot up by more than 100 percent across several sectors, according to the PwC’s global state of information security report.

Add to that the fact that the IT landscape is rapidly becoming more complex. The number of mergers and acquisitions is continuing to climb. The average millennial moves to a new job at least every three years. And the use of multiple operating systems is rapidly growing, with nearly three-quarters of today’s organizations embracing bring-your-own-device policies.

To manage all of this, organizations install numerous different pieces of software—including anti-virus, data loss prevention, identity access management, and encryption solutions, to name just a few. On top of that, they need yet another piece of software, one that serves as the bridge to rule them all. In a nutshell, managing endpoint security can be extremely laborious, often requiring a small army of people.

Code42 = simplified endpoint management

What exactly makes Code42 easy to administer and manage? Consider the following:

  • One admin for tens of thousands of users. Tight integration with Active Directory means that settings such as usernames, passwords, permissions, and security settings are automatically set up when an organization implements Code42. When employees move between departments within the company, the applicable settings for that department are automatically applied. In addition, companies can carefully select ad hoc point-solutions that appear to duplicate things Code42 does so much better. Reducing the clutter of desktop agents decreases costs and management complexity while boosting desktop performance.
  • A single dashboard from which to administer users across the company. Code42 gives IT admins full visibility into all protected devices and data in a single administrative console, enabling them to balance data security and control with end-user productivity. Whether the company has 100 or 100,000 end users, admins obtain 360-degree visibility into user activity, allowing them to track the file backup, storage, and sharing patterns of every individual across the company. Thanks to the recent Code42 5.4 platform release, IT admins can now more easily monitor bandwidth across locations while using new controls to manage compliance settings.
  • The same experience for users of Windows, Mac, and Linux. Code42 provides the same user interface, with the same consistent and logical set of tools, regardless of which operating system platform IT administrators use. It all works the same whether IT staff are on Windows, Macintosh, or Linux, meaning the learning curve is zero as IT administrators move between platforms.
  • The quick ability to get the information IT admins need. The administration console makes it easy for IT administrators to obtain quick answers to their questions. For example, are there end-user devices or whole departments that are out of compliance? How long has it been since devices have been backed up? How frequently are users backing up? How often are they restoring? How many Code42 licenses have been used? Which devices are inactive but still require their content to be stored? How much room are backups taking in the cloud? Administrators can find answers to these and many other important questions through slick reporting tools that help them understand user behavior across the organization. Also, after deployment and a period of usage, Code42 will perform system health checks to help customers learn best practices and better understand trends so they can make changes that optimize performance.

Our next version, Code42’s ninth consecutive on-time release, will be available in early 2017 and is full of innovations and improvements that make endpoint management even easier for administrators. Stay tuned for the exciting announcements to come! For more information, please contact us.