- Company (that provides the nominated product / solution / service): Code42
- Website: http://www.code42.com
- Company size (employees): 100 to 499
- Country: United States
- Type of solution: Cloud/SaaS
- Approximate number of users worldwide: 540
What other awards did this nomination receive in the previous 12 months?
● Golden Bridge Award: Innovations in Technology for Security Software
● Info Security PG’s Global Excellence Awards: Security Products and Solutions for the Enterprise
● Info Security PG’s Global Excellence Awards: Security
● Cyber Defense Magazine InfoSec Award: Hot Company: Insider Threat Detection;
● Cyber Defense Magazine InfoSec Award: Hot Company: Endpoint Security
● SC Awards Europe: Best Data Leakage Prevention Solution
● Fortress Cyber Security Awards: Threat Detection
● SC Awards: Best Data Leakage Prevention Solution
In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:
● Challenging traditional DLP
When it comes to data security, most businesses are focused on traditional DLP strategies known for locking down and blocking access to regulated data. Gone are days where you can build walls to prevent data from exiting your organization. Just consider that 50% of breaches between 2012 and 2017 involved inside actors.
Security can no longer be defined by what you can prevent, but by how fast you can respond to threats and reduce risk to your business. Today’s progressive businesses are more cloud-based; workforces are more mobile; and productivity is dependent on data collaboration, access and movement. That’s why Code42 takes a different approach to data security — one that is focused on protection and recovery versus prevention.
● Providing File Visibility
Visibility to every version of every file is the most significant difference between the Code42 Next-Gen Data Loss Protection solution and competitive legacy DLP solutions. This unmatched visibility and non-discriminatory file access is why Code42 Next-Gen Data Loss Protection does not require policies in order to protect data like legacy DLP. By setting simple activity alerts, security teams can easily begin their searches to understand which of all of its files are at risk of misuse, loss or theft.
● Delivering ROI
When a leader in the hospitality/vacation ownership industry used Code42’s Next-Gen Data Loss Protection solution, it saved $1.33 million, saw nearly 300% ROI over 3 years with a payback period of 3 months.
When two international consultants sued a Code42 client, Code42’s file monitoring capabilities showed that the consultants deleted several files, helping the company disprove the consultants’ accusations. The global manufacturing conglomerate saved millions in a lawsuit.
Code42’s file monitoring capabilities helped a full-service mechanical contractor — with ten plants — detect 90 gigabytes of sales data leaving its network via an external drive.
Code42 is challenging the status quo in the Data Loss Prevention (DLP) market and is at the forefront of conversations to redefine the category to Data Loss Protection. It’s first step in shifting the DLP paradigm was launching the Code42 Next-Gen Data Loss Protection solution.
Code42 Next-Gen Data Loss Protection offers a simpler, quicker way to secure an organization’s endpoint and cloud data from loss, leak, misuse and theft. Unlike traditional DLP, Code42 Next-Gen Data Loss Protection is based in the cloud and frees security teams to safeguard data without complex policy management, lengthy deployments or restrictive rules that block user access to data and hinder user productivity and collaboration.
Code42 Next-Gen DLP delivers these core capabilities through a single, centralized view:
Collection: Automatically collects and stores every version of every file across all endpoints, and indexes all file activity metadata across endpoints and cloud services.
Monitoring: Helps identify file exfiltration, providing visibility into files being moved by users to external hard drives and USB thumb drives or shared via cloud services, including Microsoft OneDrive and Google Drive.
Investigation: Quickly triages and prioritizes data threats by searching file activity across all endpoints and cloud services in seconds, even when endpoints are offline; and rapidly retrieves actual files — one file, multiple files or all files on a device — to determine the sensitivity of data at risk.
Preservation: Allows configuration to retain files for any number of employees, for as long as the files are needed to satisfy security investigations and data retention requirements related to compliance or litigation.
Recovery: Rapidly retrieves one file, multiple files or all files on a device even when the device is offline, or in the event files are deleted, corrupted or ransomed.