The Data Security Sandwich: A Recipe for Innovation

Big Data is one of the most overused buzzwords of the decade. The reality is that you know there’s huge potential value in your data. You’re collecting more than you know what to do with. The real challenge is finding or developing tools to extract that value and achieve that potential.

The ultimate data security sandwich

One of our new customers recently asked me why we combined our Code42 Backup + Restore and Code42 Forensic File Search solutions into a single agent. To me, it’s like explaining the appeal of the sandwich: You’ve got great bread. You’ve got great meat. You’ve got great cheese. Sure, you could enjoy them separately; but putting them together creates something far better.

Think about the data sitting on your users’ endpoints. Code42 Backup + Restore takes all that data and—through the magic of comprehensive backup and speedy restore—gives you the ability to support data protection, ensure business continuity and drive business resiliency. Code42 Forensic File Search takes that same data and gives you complete visibility. You can understand what your data looks like—how it’s created, where it lives and how it moves. You can understand its value—and track the movement of that value. You can further support data protection and compliance, while speeding and simplifying recovery and remediation.

Sure, you can use one product without the other—but then you’re not making the most of your users’ data.

A recipe for innovation

There’s probably no food item that has seen more variation and innovation than the sandwich. Likewise, (as always) our customers are much smarter than we are, and they’re already finding smart new ways to innovate by combining our two products:

  • Improving backup and simplifying data classification: Organizations keep looking for ways to understand the value of the ideas and files in their organization, get visibility into where they are stored, and find ways to classify data types and usage. With Code42 Forensic File Search, this classification becomes a lot easier. Today, we’re seeing organizations that have expanded their usage of Code42 with Code42 Forensic File Search ask questions about what files are not in their backups, and they are then using our scripts via APIs to add them. In addition, the query capabilities of Code42 Forensic File Search make it much easier to classify the value of data based on the type of intellectual property they are creating. Clearer visibility makes life easier.
  • Implementing data privacy and achieving GDPR compliance: By the time this blog goes live, GDPR will officially be in effect—can you believe it? A realistic view of data is the core of being able to respond and comply with GDPR. Organizations are already looking to use Code42 Forensic File Search to meet the GDPR’s “right to be forgotten” mandate—ensuring they can find files on their network and eliminate them—as well as ensuring compliance with the “business need” to collect information. In a world where we continue to see file decentralization, having a single lens to find files across an organization and systematically eliminate them is the only way to ensure an organization has successfully eliminated private information of customers.
  • Stronger security: Code42 Forensic File Search is being used for everything—and I mean everything—under the sun. The other day I learned that one of our customers was getting the MD5 hashes of new malware on a scheduled basis, and then looking across their organization for these new hashes as they were added to AV feeds, so they could ensure no existing instances existed. Quite creative! But here’s an even better example of how these two tools are better together: Code42 customers have already instrumented the Code42 Forensic File Search capabilities back into their Backup + Restore solution—and tied them to the Restore APIs as well. These organizations have taken the alerts fired from detection capabilities, pulled those back into SIEM systems, and created secure incidents in IT Service Management (ITSM) systems. They’ve added Code42 to the workflow to identify infected machines using Code42 Forensic File Search, and then used Code42 restore capabilities to pull the suspect file into a sandbox environment for a security researcher to examine. Now that’s synergistic value.

Aligning the needs of your business and your users

One last story on how companies are viewing the combined value of these two solutions: Last week, while talking with a very progressive CISO, he stopped me and said, “Rob, if I’m going to monitor my users more, I’d like to give them value back.” He explained that while Code42 Forensic File Search was his primary use case, his IT team decided to purchase the Code42 Backup + Restore capabilities too because “we wanted to give the users something back” for the visibility they gave to IT. It was a great sentiment, and his users responded with excitement. His users get the peace of mind of working continuously, without fear of losing their work or their data—and he and his team get the visibility they need to secure their business.

Are you making the most of your users’ data?

If you’re like me, all this sandwich talk means an early lunch. But before you go, ask yourself a simple question: Are you making the most of your users’ endpoint data? Or are you leaving some of that potential value unrealized?

Accelerating Incident Response with Forensic File Search

A streamlined incident response process depends on collaboration between security and IT teams. However, in many organizations, these teams often work in silos, with separate technologies, priorities and resources. With Code42 Forensic File Search, security and IT teams can come together with a unified incident response process.

By submitting this form, you agree to Code42’s Privacy Policy.

Facebook Twitter Google LinkedIn YouTube