What are you looking for ?
Infinidat
Articles_top

Code42: Advanced Inside Threat Detection and Alerting for Endpoint Data Security and Visibility Solution

IT security teams who desire access to full history of data can trace it back to known entity who possessed it.

Code42 Software, Inc. announced Inside Threat Detection, to its enterprise data protection and security platform.

By generating proactive alerts when data use patterns associated with inside threats emerge, IT and InfoSec teams can quickly identify what specific files were moved from a device, by whom, when and where. Customers now have an all-in-one endpoint data protection and visibility solution that helps them spot risks sooner.

Our newest capabilities make everyday endpoint data protection more actionable. We’re helping our customers to monitor and detect voluntary or involuntary movement of proprietary data and sensitive company information,” said Joe Payne, president and CEO, Code42. “Customers that originally partnered with us for real-time data protection and recovery now look to Code42 to help solve their data visibility challenges. These latest developments in detecting insider threats deliver complete data visibility across the entire organization without slowing them down.

Company’s single multi-purpose agent ensures that data protection is continuous and automatic, while providing analytical capabilities around insider threat detection. With over 100,000 enterprise licenses deployed, IT and security teams can expand their use of Code42 to track and be alerted of suspicious file movements by employees. Future enhancements around file forensics and User Behavior Analytics (UBA) will introduce further automation, detection and analytical capabilities for IT and Security.

According to a report written by Joseph Blankenship, Forrester Research [1], “Because insiders have privileged access to data to do their jobs, it’s difficult for security pros to detect suspicious activity… Insiders accounted for 39% of data breaches in 2015 through accidental and malicious misuse of data.

HR, security teams and IT struggle with knowing what data departing employees take with them, share, or delete before they leave. Combine the ncreasing number of mobile users, devices, and cloud services and customers have the potential for IP leakage at mass scale, malicious or not.

Inside Threat can be used by IT and security teams to conduct deeper analysis to determine data movement. Business and IT decision makers can also set alert thresholds for size and amount of file movement, allowing them to customize and define indicators for anomalous or high-risk user behavior. Given the increasing risk of IP theft, IT security teams who desire access to the full history of their data can now trace it back to the last known entity who possessed it.

Until very recently, data security tools essentially functioned through their ability to block, hold and prevent,” said John Durant, CTO, Code42. “In striving to meet the day-to-day enterprise needs of business decision-makers, we have reached an inflection point in the security software industry that requires us to strike a much better balance in how we protect endpoint user data, while at the same time allowing them to get the job done.

[1] Hunting Insider Threats, Forrester Research, Inc., July 20, 2016

Articles_bottom
AIC
ATTO
OPEN-E