Determining whether a user is in possession of specific data is a painful enterprise IT challenge. In cases of insider threat, users may rename and edit files to avoid detection; and working files can be hard to identify after an employee leaves. Historically, the search process has been a bit like finding a needle in a haystack. Without a way to search user archives for file content and metadata, IT has to guess which files might contain the data in question and review each file manually.
Code42 CrashPlan 5.1 allows IT, Legal, and Security teams to search metadata and file content associated with a specific user or device. With this new feature, organizations can:
- Index and search user archives stored on-premises
- Quickly identify files that were created or modified within a given timeframe
- Apply full-text search to determine whether a user is in possession of data in question even if the file has been renamed
- Search for files under a specific data classification
- Easily download files of interest located via search
Departments across the enterprise benefit from the ability to index and search user files, for example:
- Risk and Compliance personnel can identify non-authorized users who are accessing restricted data.
- Legal can find files created or modified within a specific time period or files related to a specific case or topic and preserve and collect them during discovery.
- InfoSec can leverage search to locate where malicious files entered and appear on the network.
- Legal and InfoSec can search for files that may put the company and risk.
- IT can use search to locate files in a former user’s archive for remaining team members.
For more detailed information about how to leverage on-premises search with Code42 CrashPlan 5.1, visit Code42 CrashPlan 5.1 Documentation.
Forrester Study: The Total Economic Impact of Code42