Schneider Electric Achieves Multiple Benefits with Code42

Schneider Electric Sweden, an energy management company, lives or dies based on the success of their team of well-traveled consultants. And their consultants’ success is directly tied to the sensitive data that travels with them wherever they go. In fact, Schneider estimates the value of the data on a consultant’s laptop to be $150,000.

Because of the importance of this data–and the dire business consequences of it being lost, stolen or simply unavailable–Schneider decided to upgrade their backup and recovery solution to Code42.

The change was easy to justify. Schneider implemented the Code42 solution and it has already paid off for them in substantial ways:

  • Laptop upgrades in one sixth the time
  • Over 7,000 hours of employee downtime saved
  • Successful recovery from a WannaCry ransomware attack

Check out the full case study to learn more about how Schneider Electric keeps their most precious resource–their consultants–as productive as possible.

Digital Transformation Requires a New Kind of Castle

Digital Transformation Requires a New Kind of Castle

Why don’t we build castles anymore? The answer, of course, is that we do—they just look a lot different. In fact, thinking about how and why castles have evolved can tell us a lot about how we can improve our approach to securing the enterprise “kingdom.”

The first medieval castles were a lot like first-generation enterprise networks: giant walls surrounding centralized assets. Nearly all the value of the kingdom could be held within the walls (data, productivity, etc.). A single drawbridge (the firewall) was connected to the outside world. Turrets gave better visibility to threats coming from the outside. It was a simpler time: With most value contained within the walls and little need to connect outside, it was much easier to build up a hardy perimeter. But these castles were also big targets, with a huge attack surface and lot of value to be taken. Moreover, there was little in the way of internal security. If attackers breached the perimeter, they had their run of the kingdom.

Gunpowder changed everything

Then someone came along and invented gunpowder. Firepower is a lot like malware, ransomware and social engineering tactics. Suddenly you can shoot over castle walls or even through walls. The response in medieval times was to build more walls—to create castles within castles. We did the same in the digital enterprise world, adding VLANs, secondary firewalls, app-specific encryption and other “walls” around specific internal assets.

That’s where most organizations are today – still structured around the idea of the secure perimeter. We secure the thing that holds the value—the network, the server, the app, the endpoint device—but not the value itself (the data). We hone our sights on external threats, missing the threats that are already inside the castle walls.

The digital castles of tomorrow

It’s increasingly clear that a perimeter-based approach doesn’t suit the modern kingdom. You’re never going to completely stop all breaches, and tougher walls will end up locking your own people out and stifling value creation. So, what does a forward-thinking data security strategy look like? Here are four key features we’ll see in the digital enterprise “castles” of tomorrow:

  • There will be perimeter—but it will be porous. There will always be boundaries, but we’ll only rely on the perimeter to stop the most obvious and basic attacks—and we’ll ensure it doesn’t thwart our users’ productivity.
  • Smaller targets—less attack surface. Data security strategies will start at the most granular level which is at the user’s endpoint device. By making the targets small and many, it makes it more expensive (and less fruitful) to attack them.
  • Turrets that look inward. As threats increasingly come from within, we’ll turn our lookout towers around. We’ll use data visibility tools to see where our data lives and when it moves, and get better at recognizing when something doesn’t look right.
  • Securing the value itself. Instead of securing the thing that holds the value, we’ll secure the value (the data) itself. That means finding ways to ensure that attackers can’t actually remove data, and/or that the enterprise never truly loses that data (and all its value).

To close out our medieval castle analogy, the next-generation digital “kingdom” won’t have giant walls to protect our gold. We’ll use data visibility tools to know the second a gold coin moves somewhere it shouldn’t, and we’ll use data recovery tools to ensure we can always yank that gold coin back, no matter where someone tries to take it.

A GDPR Strategy That Accelerates Digital Transformation

A GDPR Strategy That Accelerates Digital Transformation

The approaching GDPR deadline is creating a fascinating disconnect in many organizations. While data security teams focus on locking down information to achieve compliance, business leaders are preaching the gospel of digital transformation—prioritizing the free(er) flow of information. But if it seems like GDPR and digital transformation are at odds, think again. In fact, with the right strategy in place, GDPR should accelerate your digital transformation.

The key to “privacy by design”

Here’s the pattern emerging in most GDPR compliance strategies: Servers, internal networks and on-premises apps get almost all the attention. The majority of companies are considering cloud apps and storage, as well. But “privacy by design” needs to extend beyond your most critical assets that you’re already protecting—probably the least vulnerable facets of your digital ecosystem. Ironically, most GDPR plans aren’t considering the most vulnerable and most dynamic element: the endpoint (and its user).

Taking the long view on GDPR compliance (and digital transformation)

Gartner estimates that half of organizations impacted by GDPR won’t achieve compliance by the May 25 deadline. But even if you’re among the compliant half, your digital enterprise environment is constantly evolving. You can’t afford to inhibit this change. Building a giant wall around your most critical assets would stifle your digital transformation—and put your organization at a serious competitive disadvantage.

Where GDPR and digital transformation come together: the movement of information

You can boil the many elements of GDPR down to two main objectives:

  1. Protect data from going somewhere it shouldn’t.
  2. Secure data wherever it goes.

GDPR doesn’t say information can’t move—just that you need to see that movement, so you can identify and respond to potential risk. That concept—gaining visibility to enable the free flow of information—is the definition of the “digital trust” that every analyst report and white paper declares as the foundation of digital transformation.

Is your GDPR strategy focused on movement?

To make a long story short, GDPR isn’t at odds with digital transformation—it’s complementary. Organizations are too focused on preventing data movement, taking a “secure the fortress” mentality. Instead, they need to start focusing their energy on seeing how and where data moves throughout the organization—from servers to cloud apps, cloud apps to user endpoints, etc. The tools and strategies that deliver this kind of visibility are not just key to achieving “privacy by design,” but also help your organization build the digital trust to allow information to flow more freely between your assets, your apps and your people.

Code42 customer success: North Highland

Code42 Customer Success Story: North Highland

Code42 provides your business with a variety of data security benefits, including increased productivity, risk mitigation, streamlined user workflows and more – all in a single product that’s been proven to ultimately save you money. While Code42 has a few primary use cases – backup and recovery, device migration, etc. – we’ve learned that our different customers use our solutions in different ways.

We’ve asked some of our customers to tell their stories of how Code42 has helped in their organizations. Today, Lincoln Higdon, director of information technology at professional services firm North Highland, explains how they use Code42 for backup and recovery, including how Code42 saved some very important data from coffee-related disaster. He has high praise for how Code42 has evolved along with his company’s needs and for how the Code42 platform consistently saves IT time and productivity. In the professional services industry, the old saying “time is money” is especially true. As a company that depends on billable hours, any downtime can literally harm the bottom line, the company’s reputation or both. Fortunately, with Code42, firms like North Highland can easily bounce back from data loss. Check out the video to hear Lincoln’s story.

A Code42 Customer Success Story: Qualcomm

A Code42 Customer Success Story: Qualcomm

Code42 provides your business with a variety of data security benefits, including increased productivity, risk mitigation, streamlined user workflows, and more – all in a single product that’s been proven to ultimately save you money. While Code42 has a few primary use cases – backup and recovery, device migration, etc. – we’ve learned that our different customers use our solutions in different ways.

We’ve asked some of our customers to tell their stories of how Code42 has helped in their organizations. Today, Qualcomm IT Engineer Ben Molesworth and Senior Manager of Information Technology Chris Millet discuss the multiple benefits their organization derives from the Code42 platform. In the video below, Ben and Chris discuss Code42’s data restore capabilities, how Code42 has cut their tech refresh process from eight hours per device to only thirty minutes, and how Code42 makes it easy to manage 30,000 users from a single admin console. See their stories in the video below.

42 Seconds with a Code42 Customer: Utex Industries

Code42 provides your business with a variety of data security benefits, including increased productivity, risk mitigation, streamlined user workflows, and more – all in a single product that’s been proven to ultimately save you money. While Code42 has a few primary use cases – backup and recovery, device migration, etc. – we’ve learned that our different customers use Code42 in different ways. To explore how customers use our product, we recently partnered with the talented team at creative agency Crash+Sues to create a series of animated videos featuring the voices and likenesses of actual Code42 users.

In our latest video, Jeff Hiner, systems administrator at Utex Industries, explains that the company suffered an insider breach when a company chemist decided to steal company files. While Utex was already a Code42 customer and had already purchased a license for Security Center, they hadn’t yet set it up. As a result, the had to conduct an investigation that was both expensive and time-consuming. Jeff tells the story in just 42 seconds. Watch it below.

Code42 Announces Expansion Plans for the Education Market

In every sector, changes in the data security landscape have forced IT teams to rethink their approach to protecting valuable and sensitive data. But few sectors face as many unique challenges as higher education. With highly distributed users bases and IT infrastructure that can vary by department, the decentralized landscape of higher ed can often lead to blind spots and security gaps. The sheer value of a university’s intellectual property (IP)—proprietary research and ideas—significantly increases the cost and expands the impact of data loss. In the face of these challenges, Code42 offers these institutions a proven solution to endpoint data protection and recovery.

Today, Code42 announced plans to expand its presence in the education market. We are deepening our commitment to higher ed and other academic markets by building out a dedicated vertical business unit that will include marketing and sales functions. Currently, Code42 serves more than 700 higher education institutions and K-12 schools across North America, as well as seven out of the eight Ivy League universities.

Faced with a growing number of cyberattacks, education institutions today have an acute need when it comes to protecting volumes of sensitive faculty, staff and research data. We are committed to helping these organizations successfully recover proprietary information after data incidents, such as ransomware attacks, hardware failures, and laptop loss and theft.

Code42’s data security and recovery solution is designed to help schools take a proactive approach to data protection. The solution automatically and continuously backs up data on laptops and desktops so staff and IT administrators can respond to and recover from cyber threats more quickly. Education institutions can use Code42’s data security solution to:

  • Recover data residing on endpoints within minutes of a ransomware or malware attack, or when a file is deleted or a computer is stolen or crashes;
  • Gather documents and records housed on multitudes of institutional endpoints in order to expedite responses to Freedom of Information Act requests;
  • Ensure that research data, which is generated as part of an educational grant and stored on desktops or laptops, complies with stringent security requirements and government regulations; and
  • Keep staff and faculty productive during hardware migrations and system upgrades by easily transferring profile settings and giving them full use of their new devices as data restores.

“We selected Code42’s solution because we love how easy it is to use,” said Jason Conklin, IT service desk coordinator at the University of Georgia. “Because of its secure, continuous back up to the cloud, my staff can go about their jobs knowing all of their information is protected. This approach to data security provides us a necessary and important safety net, which is required in our environment.”


Simplified Device Migration with Code42

Code42’s endpoint data security solution provides your business with a variety of benefits, including increased productivity, risk mitigation, streamlined user workflows and more – all in a single product that’s been proven to ultimately save you money. One way Code42 helps you cut costs is with our device migration feature – moving employees to upgraded devices has never been faster or easier.

With Code42, employee data is automatically backed up every 15 minutes by default. When it’s time to move an employee to a new computer, their data can be transferred to a new machine seamlessly – even before the employee has turned in the old machine. With Code42, gone are the days when device migration projects meant hours of lost productivity (and, in turn, lost revenue). According to Code42 customer Schneider Electric Sweden, Code42 cuts their tech refresh process from 24 hours down to three or four, saving roughly 7,000 hours in employee downtime per year. Think about how much money 7,000 wasted hours would cost your organization.

To learn more about how device migration with Code42 saves time and money, watch our latest feature video below.

GDPR 101: Are you Ready for GDPR?

The General Data Protection Regulation (GDPR), the new data privacy law in the European Union (EU), is almost upon us. Starting May 25, 2018, GDPR will give individuals in the EU control over their personal data, create uniform data protection rules across the EU member states, and dictate the way organizations approach data privacy. GDPR requires businesses to be able to prove their compliance. The possible fines for non-compliance are up to €20m or 4 percent of global annual sales, whichever is greater.

Does GDPR apply to your business?

GDPR applies to all organizations that conduct business in the EU, as well as any organization that:

  • Offers products and/or services to EU residents;
  • Monitors the behavior of EU residents; or
  • Handles the personal data of an EU resident.

Getting personal with GDPR

Under GDPR, residents of the EU are granted the rights to:

  • Be informed about the processing of their personal data: what is collected, where it is stored, and why;
  • Access their personal data, correct any inaccuracies, or have it deleted entirely;
  • Have their data transferred from one organization to another (data portability); and
  • Ask for the processing of their personal data to be postponed or stopped altogether.

Personal data under GDPR includes any information that can directly or indirectly identify an individual. This includes names, email addresses, web identifiers, and even IP addresses and/or device identifiers. GDPR also sets baseline data protection requirements for organizations that handle the personal data of EU residents, including:

  • Implementing technical and organizational measures to ensure personal data is protected;
  • Maintaining documentation to prove compliance with GDPR;
  • Providing timely data breach notifications to the EU supervisory authority and, in some cases, to affected individuals or customers;
  • Transferring personal data outside the EU only if the organization receiving the data has adequate safeguards to provide the level of protection afforded to individuals under GDPR; and
  • Requiring certain organizations to appoint a data protection officer to oversee GDPR compliance.

In short, businesses have a lot to consider for their GDPR preparation, and a relatively short time remaining to ensure that they are in compliance with the new regulation.

GDPR readiness

Code42 is a valuable tool for enabling GDPR compliance. Code42’s feature set already includes tools to help organizations focus on the three critical elements of GDPR compliance: data protection, visibility, and recovery. Looking for more information about how Code42 can help your business prepare for GDPR? We have several resources to help. Read the white paper The Path to Rapid GDPR Compliance or watch our on-demand GDPR webinar.

Still have questions? Reach out to your Code42 representative. We’ll be happy to help.

Protect your business from ransomware

Protect Your Business from Ransomware with Code42

Code42’s endpoint data security solution provides your business with a variety of benefits, including increased productivity, risk mitigation, streamlined user workflows, and more–all in a single product that’s been proven to ultimately save you money. With ransomware making huge headlines in 2017, one of the Code42 features that enterprises are most interested in is ransomware recovery.

Since Code42 backs up your data every 15 minutes by default, you can roll back to a point in time and access files you were working on before the ransomware attack–without ever paying the ransom. Ransomware recovery is one of the major ways a true endpoint backup solution beats file sync and share products for data backup. Sync and share products can’t restore to a particular point in time, but they can actually spread ransomware through an organization.

To learn more about how Code42 beats sync and share products for ransomware recovery, watch our latest feature video below.

Facebook Twitter Google LinkedIn YouTube