Minneapolis, MN — Nov 26, 2019 — /BackupReview.info/ —

  • Advances its insider risk solution with the first in a series of new detection capabilities.
  • Cuts the time it takes to detect and respond to insider risk tied to departing employees.
  • Offers unprecedented visibility to corporate files leaked to personal cloud and email accounts through web browsers.

Code42, the leader in insider risk detection and response, announced it has advanced its data security solution with the first in a series of new capabilities designed to help companies defend against the rising tide of insider threats. Focused on departing employees, these enhancements give security teams the ability to quickly detect and pinpoint high risk file activity before and after employees resign.

With Code42, security teams can see when employees move product roadmaps, customer lists and other sensitive files to thumb drives and personal email. The advanced solution also offers unprecedented visibility to the destination of files leaked via web browsers, making it easy to track when company files are uploaded to personal cloud accounts. Armed with these insights, security teams can take action before employees walk out the door with trade secrets and the damage is done.

“Too many organizations are flying blind to data theft when employees quit and depart,” said Joe Payne, Code42 president and CEO. “Our new insider risk detection capabilities are a game changer for security teams. They deliver signal, not noise, through a focused and prescriptive process so security teams can quickly find a needle in the haystack of potential insider threat events. These high-fidelity insights into data risk save already over-loaded security teams precious investigation time.”

Code42’s new insider risk detection capabilities:

  • Protect IP and mitigate data risk during the employee off-boarding process.
  • Surface a departing employee’s file exfiltration activities, using web browsers, email, removable media, personal and cloud sync accounts, and other app uploads.
  • Investigate and assess a departing employee’s historical file exfiltration activity in 1-, 7-, 30- and 90-day increments.
  • Offer the ability to view exfiltrated files to quickly determine the severity of the behavior and escalate the response.
  • Detect mass deletions on laptops or the cloud and provide the ability to recover impacted files.
  • Customize alerts about high-risk file movements from resignation to departure date.

As data has become more portable, companies have become more vulnerable to insider risk — https://www.code42.com/go/insider-threat-detection-capabilities-success-plus/#learn

According to the Code42 2019 Data Exposure Report ( https://on.code42.com/go/2019-data-exposure-report-g/ ) , 63% of employees admit to bringing data from past employers to their new jobs. In fact, information security leaders admitted that half of their data breaches in the previous 18 months were driven by employees. The breaches occurred despite the fact that 69% of the organizations had a data loss prevention solution in place.

View a video demonstration of Code42’s latest insider risk detection capabilities — https://www.code42.com/go/insider-threat-detection-capabilities-success-plus/#demo

About Code42
Code42, the global leader in cloud-based endpoint data security and recovery, protects more than 47,000 organizations worldwide. Code42 enables IT and security teams to centrally manage and protect critical data for some of the most recognized brands in business and education. From monitoring endpoint data movement and use, to meeting data privacy regulations, to simply and rapidly recovering from data incidents no matter the cause, Code42 is central to any organization’s data security strategy. Code42 is headquartered in Minneapolis, Minn., and backed by Accel Partners, JMI Equity, NEA and Split Rock Partners. For more information, visit www.code42.com

Contact:
Code42
Gerri Dyrek
844-333-4242
Vice President Corporate Marketing
gerri.dyrek@code42.com
www.code42.com

Source: Code 42

 

 

 

Tags: , ,