Real-time Recovery Is at the Core of Code42

Code42 provides your business with a variety of benefits, including increased productivity, risk mitigation, streamlined user workflows, and more – all in a single product that’s been proven to ultimately save you money. All of these benefits are all built off our core feature: real-time recovery of endpoint data. With Code42, you get your data back faster when data loss incidents strike – and strike they will. Accidental deletion, file corruption, hardware failure, or even widespread cyberattack – sooner or later you’ll have to deal with one or more of these issues.

We recently partnered with the talented team at creative agency Crash+Sues to create a series of videos about the core features of Code42, and we naturally kicked the project off by highlighting our recovery feature. We’re happy to share it with you today. Take a look to learn more about Real-time Recovery with Code42 – you may even be entertained in the process!

Evolving threats compel an about-face in data protection strategy

It’s time to flip our thinking about enterprise information security. For a long time, the starting point of our tech stacks has been the network. We employ a whole series of solutions on servers and networks—from monitoring and alerts to policies and procedures—to prevent a network breach. We then install some antivirus and malware detection tools on laptops and devices to catch anything that might infect the network through endpoints.

But this approach isn’t working. The bad guys are still getting in. We like to think we can just keep building a bigger wall, but motivated cybercriminals and insiders keep figuring out ways to jump over it or tunnel underneath it. How? By targeting users, not the network. Today, one-third of data compromises are caused by insiders, either maliciously and unwittingly.

Just because we have antivirus software or malware detection on our users’ devices doesn’t mean we’re protected. Those tools are only effective about 60% to 70% of the time at best. And with the increasing prevalence of BYOD, we can’t control everything on an employee’s device.

Even when we do control enterprise-issued devices, our security tools can’t prevent a laptop from being stolen. Or keep an employee from downloading client data onto a USB drive. Or stop a high-level employee from emailing sensitive data to a spear phisher posing as a co-worker.

We need to change our thinking. We need to admit that breaches are inevitable and be prepared to quickly recover and remediate. That means starting at the outside, with our increasingly vulnerable endpoints.

With a good endpoint backup system in place, one that’s backing up data in real time, you gain a window into all your data. You can see exactly where an attack started and what path it took. You can see what an employee who just gave his two weeks’ notice is doing with data. You can see if a stolen laptop has any sensitive data on it, so you know if it’s reportable or not.

By starting with endpoints, you eliminate blind spots. And isn’t that the ultimate goal of enterprise infosec?

To learn more about the starting point in the modern security stack watch the on-demand webinar.

Entrust Datacard CISO on endpoint backup, then and now

Code42 is pleased to present a guest post from Mark Ruchie, vice president and chief information security officer for Entrust Datacard.

Today, endpoints are the easiest points of access to enterprise information. Thankfully, at Entrust Datacard, we have a modern endpoint strategy to help us manage our weakest links. When I think about our endpoint system today compared to what was available just a few years ago, the benefits are incredible:

Added protection because we can afford to back up everyone
Back when Internet bandwidth was limited and access expensive, most enterprises only backed up the computers of key executives. As cloud computing gained a foothold and bandwidth got bigger and faster, many of us added another tier of employees—typically sales reps, because they had sensitive client data, and designers and engineers, who had intellectual property on their laptops. Today, with ample, cheap bandwidth, we can afford to back up all employees for greater protection.

Increased productivity with self-serve restore
At one of my jobs a few years ago, 19 laptops in Australia were hit by ransomware, so we had to fly our IT guy from Singapore to rebuild them. There was the cost of the flight and his time, plus four days of lost productivity for all those employees. Today, with modern endpoint backup, employees can restore their own files to any iOS or Android device—at any time—without connecting through a VPN. And because their devices are automatically being backed up in real time, they can recapture all lost or stolen data.

Less disruption to end-users with self-serve tech refresh
At one of my jobs, we had to push active agents for multiple solutions onto 150,000 laptops—and upgrade those agents every 6 months. That meant employees were adversely impacted every time we upgraded. And while we’d only upgrade a few thousand laptops at a time, it still caused issues that further disrupted operations. Today, with modern endpoint backup, end users don’t have to leave their devices with IT. They can do their own tech refreshes in about one-fourth the time via on-screen instructions. And with the backup system running continuously in the background, no data is lost in the process.

Shorter dwell time with faster forensics
When you look at the most spectacular recent breaches—including Home Depot and Target—all were endpoint compromises. Before modern endpoint backup, we’d need to conduct a deep forensic investigation to figure out what happened. We had to push an agent to the laptop, take the device offline and spend days analyzing files. In fact, a hot topic at RSA the past few years has been big data analytic solutions, with data scientists combing through umpteen terabytes of data to solve cybercrimes. I estimated that it cost one bank more than $25 million for its data analytic solution and a 6-figure-a-year data scientist. That kind of price tag for one breach just isn’t reasonable for an average $1 billion company. Especially when a modern endpoint backup system allows you to quickly scan endpoints and find the source of the breach—reducing security incident response from days to hours, sometimes even minutes. That means we can significantly reduce our average dwell time to contain the breach faster. And legal can get access to the data themselves, making IT more productive.

Less breach impact with data attribution capability
When I worked for another company, we lost a lot of laptops to a cybercrime syndicate. We didn’t have an endpoint backup system, so we didn’t know what was on those laptops. We estimated between 35,000 and 55,000 files had been breached. To be compliant, we had to report the higher number, which meant sending out letters and paying $100 in credit monitoring to each of those 55,000 individuals. Understandably, many of them were upset and scared. We disrupted the lives of 20,000 individuals that we may not have needed to. With modern endpoint backup, I can go in and tell you with a high degree of certainty if the data on a stolen or breached device is reportable. Having that data attribution minimizes the financial and PR impact of a breach.

Looking back now, it’s almost unfathomable that we shipped an employee across the globe to restore devices or upgraded anti-virus agents manually. But then, it wasn’t that long ago that we we used fax machines, too.


Facebook Twitter Google LinkedIn YouTube