Evolution16: The Start of Something Special

More than 200 customers helped kick off the Code42 Evolution16 customer conference with a welcome reception on the Boulevard Pool Deck of The Cosmopolitan last night, overlooking the famous Las Vegas strip.

Code42’s first customer conference features three days of learning, networking and fun. (We are in Las Vegas, after all.) The event includes a three-day education workshop series, deep-dive product sessions, customer-led panels and discussions, and an awards celebration for the Evolutionaries–the company’s first-ever awards that recognize innovation and best practices in endpoint security and data recovery.

As the conference progresses over the next two days we’ll be sharing our insights, customer success stories and a few exciting announcements. Join in on the Twitter conversation using #evolution16.

10 Reasons Endpoint Backup and File Server Backup Aren’t Synonymous

Recently, a Code42 enterprise customer told us that they chose to significantly expand their endpoint backup deployment after the responsibility for endpoints shifted from the Server Administrative Group to the Endpoint Administrative Group. This shift signaled very clearly that endpoint backup and file-server backup serve discrete purposes in IT. Their differences should not be debated, yet they are.

Certain misconceptions about where and how to manage end-user data continue to guide critical IT business decisions today. A member of our Code42 sales team white boarded his humorous but realistic take on the most common misperceptions:

Common misperceptions when considering endpoint backup and file server backup.

What a simple whiteboard tells us
Over time, file server backup has (mistakenly) become synonymous with endpoint backup. More recently, the widespread use of enterprise file sync & share (EFSS) solutions such as Dropbox and Box have also been conflated with endpoint data protection. As with any data protection strategy, backup tech is a non-issue until data is lost or compromised. From large enterprises to small or medium-sized businesses, measures must be taken to ensure the efficient protection of confidential data.

So as IT admins go about exploring tech that will protect endpoints, a logical starting point is to understand the fundamental differences between file server and endpoint backup solutions.

File Server or Modern Endpoint Backup? 10 considerations

In the end…
File server and endpoint backup have their place in the data security realm, but they are not synonymous. Better endpoint backups drive more comprehensive data security, and cloud-based backup also makes it easy to collect, protect and monitor both structured and unstructured data.

Entrust Datacard CISO on endpoint backup, then and now

Code42 is pleased to present a guest post from Mark Ruchie, vice president and chief information security officer for Entrust Datacard.

Today, endpoints are the easiest points of access to enterprise information. Thankfully, at Entrust Datacard, we have a modern endpoint strategy to help us manage our weakest links. When I think about our endpoint system today compared to what was available just a few years ago, the benefits are incredible:

Added protection because we can afford to back up everyone
Back when Internet bandwidth was limited and access expensive, most enterprises only backed up the computers of key executives. As cloud computing gained a foothold and bandwidth got bigger and faster, many of us added another tier of employees—typically sales reps, because they had sensitive client data, and designers and engineers, who had intellectual property on their laptops. Today, with ample, cheap bandwidth, we can afford to back up all employees for greater protection.

Increased productivity with self-serve restore
At one of my jobs a few years ago, 19 laptops in Australia were hit by ransomware, so we had to fly our IT guy from Singapore to rebuild them. There was the cost of the flight and his time, plus four days of lost productivity for all those employees. Today, with modern endpoint backup, employees can restore their own files to any iOS or Android device—at any time—without connecting through a VPN. And because their devices are automatically being backed up in real time, they can recapture all lost or stolen data.

Less disruption to end-users with self-serve tech refresh
At one of my jobs, we had to push active agents for multiple solutions onto 150,000 laptops—and upgrade those agents every 6 months. That meant employees were adversely impacted every time we upgraded. And while we’d only upgrade a few thousand laptops at a time, it still caused issues that further disrupted operations. Today, with modern endpoint backup, end users don’t have to leave their devices with IT. They can do their own tech refreshes in about one-fourth the time via on-screen instructions. And with the backup system running continuously in the background, no data is lost in the process.

Shorter dwell time with faster forensics
When you look at the most spectacular recent breaches—including Home Depot and Target—all were endpoint compromises. Before modern endpoint backup, we’d need to conduct a deep forensic investigation to figure out what happened. We had to push an agent to the laptop, take the device offline and spend days analyzing files. In fact, a hot topic at RSA the past few years has been big data analytic solutions, with data scientists combing through umpteen terabytes of data to solve cybercrimes. I estimated that it cost one bank more than $25 million for its data analytic solution and a 6-figure-a-year data scientist. That kind of price tag for one breach just isn’t reasonable for an average $1 billion company. Especially when a modern endpoint backup system allows you to quickly scan endpoints and find the source of the breach—reducing security incident response from days to hours, sometimes even minutes. That means we can significantly reduce our average dwell time to contain the breach faster. And legal can get access to the data themselves, making IT more productive.

Less breach impact with data attribution capability
When I worked for another company, we lost a lot of laptops to a cybercrime syndicate. We didn’t have an endpoint backup system, so we didn’t know what was on those laptops. We estimated between 35,000 and 55,000 files had been breached. To be compliant, we had to report the higher number, which meant sending out letters and paying $100 in credit monitoring to each of those 55,000 individuals. Understandably, many of them were upset and scared. We disrupted the lives of 20,000 individuals that we may not have needed to. With modern endpoint backup, I can go in and tell you with a high degree of certainty if the data on a stolen or breached device is reportable. Having that data attribution minimizes the financial and PR impact of a breach.

Looking back now, it’s almost unfathomable that we shipped an employee across the globe to restore devices or upgraded anti-virus agents manually. But then, it wasn’t that long ago that we we used fax machines, too.

 

Facebook Twitter Google LinkedIn YouTube