SlideShare a Scribd company logo
1 of 25
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
The Code42 Story
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
Cloud Storage [EFSS] empowers
your business
Workforce
Productivity
Extended
Collaboration
Infrastructure
Modernization
Enhancing the digital
workplace: work anytime,
anywhere, from any device
Sharing, editing and
collaborating with
teammates
Moving shared network
drives to the cloud
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
And in today’s Knowledge Economy
…because you know employee ideas drive the business
You’ve likely even mandated its use…
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
Leaving much of your employee’s
ideas—your IP—on devices
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
YOUR BUSINESS RUNS ON IP
Intellectual property can comprise more than
80%of a company’s net value.
— Deloitte
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
What do you consider your
company’s IP?
THE OBVIOUS IP ASSETS:
o Patents
o Copyrights
o Trademarks
o Trade Secrets
This is the corporate IP that drives revenue.
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
But is that everything?
What about the IP your employees create and refine every day?
STRATEGY
• Growth Plans/M&A Activity
• Development Plans
• Product Roadmap Plans
INNOVATIONS
• Engineering Files
• Process Documentation
• Creative/Sales & Marketing
Content
OPERATIONS
• Customer Lists
• Employee Performance
Documentation
• Project Proposals
This is the IP that keeps your business running—and sets your business apart.
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
Where does IP
come from?
THE KNOWLEDGE WORKER
It’s not just about generating new ideas.
It’s what your employees do all day:
• Researching ideas
• Considering possibilities, opportunities
and prospects
• Defining project direction
• Refining, synergizing & iterating concepts
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
What does IP look like across your
company?
ENGINEERING SALES MARKETING
BUT ALSO
• Development process/strategy
• Product roadmap
• Customer Requirements
BUT ALSO
• Sales lifecycle/customer buying journey
• Sales playbooks & training materials
• Pitch decks
• Proposals & contracts
BUT ALSO
• Creative/brand assets (logos, art
files, photos, etc.)
• Prospect funnel/journey
• Marketing calendar/plans
•Source
code
•Algorith
ms
•Customer
lists
•Sales
strategy/
messagin
g
• Marketing
strategy
• Customer
lists
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
ENGINEERING SALES MARKETING
Losing IP puts business growth at risk.
IMPACT=
Time to Market
IMPACT=
Time to Revenue
IMPACT=
Time to Opportunity
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
Protecting the 3 Elements of your IP
Value
CONFIDENTIALITY
Comprehensive visibility
mitigates the risk of IP
theft or breach.
INTEGRITY
Backing up every version
of every file ensures the
enterprise can always recover
original IP.
AVAILABILITY
Automatic, continuous backup
gives all users uninterrupted
access
to all IP.
Securing the value of your IP—and your IP utility.
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
Growth is your #1 priority.
Securing it is ours.
Be certain.
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
Our Product
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
Code42 is Essential Data Protection,
Recovery, & Visibility
DATA PROTECTION
DATA RECOVERY
DATA VISIBILITY
BACKUP
LEGAL HOLD
SELF-SERVICE
RANSOMWARE
INSIDER
THREAT
MERGER &
ACQUISITION
DEVICE
MIGRATION
EVERY USER, EVERY
FILE, EVERYWHERE –
ALWAYS BOUNCE
BACK
MINIMIZING
BUSINESS
DISRUPTION
– MOVE FORWARD
FASTER
MITIGATING RISKS
TO GROWTH
- SPOT RISK SOONER
Securing the ideas that drive your growth
Be certain.
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
Our Core Value Prop
AUTOMATIC
PROTECTION
OF EVERY FILE
CONTINUOUSLY
TOTAL
RECOVERY
OF EVERY FILE
IN REAL-TIME
COMPLETE
VISIBILITY
OF EVERY FILE
AND FILE ACTIVITY
Every 15
minutes
Up to 9x faster All File Content
AT SCALE to 100,000s USERS
EVERY USER, EVERY FILE,
EVERYWHERE
ALWAYS BOUNCE BACK SPOT RISK SOONERMOVE FORWARD FASTER
FULL CLIENT RESTORE
5 TO 9x FASTER
PARTIAL CLIENT
RESTORE
2.5 TO 3x FASTER
SINGLE CLIENT RESTOR
2x FASTER
BACKUP
FREQUENCY
16x MORE
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
Make Everyday Workflows a lot Faster
& Easier
2x to 9x FASTER SINGLE
& BULK FILE RESTORES
FASTER TECH REFRESH &
DEVICE MIGRATION
SIMPLIFY & STREAMLINE
LEGAL HOLD
So fast and simple
end
users can do it
themselves
From 3 hours per
device
to just 30 minutes
Never take
possession
of an end user’s
device
MINIMIZE BUSINESS DISRUPTION
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
Mitigating Risk to Growth
MONITOR
IP
ACTIVITY
KNOW
IP RISKS
PREDICT
IP THREATS
MITIGATE RISKS TO YOUR IP - MITIGATE
RISKS TO GROWTH
SPOT RISK SOONER
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
Code42 Product Evolution
2015 2016 2017 2018
5.4
5.1
5.0
Legal hold module
Windows user profile migration
5.2
Site-based Bandwidth Mgmt.
Jump Upgrades to 5.x
Co-branding capabilities
6.05.3
Legal Hold updates
File Search app updates
TLS support
User data activity alerting
Remote device locking
Legal hold simplification
Enhanced Console
Restore performance
Custom installers
Okta integration
Next
Forensic Search
User Behavior AnalyticsUser data activity monitoring
File search and discovery
Self-service device replacement
Schedule-based bandwidth mgmt.
6.5
Client deployment policies
Customization templates
Admin console updates
Splunk integration
Zapproved integration
Windows 10 USMT Migration
Simplified compliance settings
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
Strategic Vision
19
Secure, 100% cloud-
based SaaS solution
Actionable intelligence
about data risk
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute 20
Secure, 100% Cloud-based SaaS
• AWS-based authority managed by Code42
• Encrypted data in Code42’s purpose-built data centers
• Full-featured – Data Protection, Data Recovery, Data Visibility
• Integrates with identity management system (AD, LDAP, SAML)
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute 21
Actionable Intelligence About End Use
• Know what departing employees are taking with them
• Receive alerts if user copy data to unsanctioned cloud folders
• Speed up investigations with fast access to end-user files and
metadata
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
Actionable Intelligence
Connect the dots to create
patterns of predictability
REPOR
TAre 100% of
our files files
(ideas)
protected &
recoverable?
Who has what
files and when,
where, and how
did they
move them off the
endpoint?
SEARCH
What users’ file
activity patterns
are indicative of a
threat to our
ideas?
ANALYZEMONITOR
Are our files
protected &
recoverable, and
are they are
moving off the
endpoint?
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
Insider Threat Detection
via Code42 Security Center
• Get alerts when users in
engage in risky activities
• Focus on data exfiltration via
removable media & cloud
storage folders
• Splunk Integration
6.0
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
2018 Themes
Recovery and Platform
– Reporting and Dashboard updates (e.g. Confirm-the-Code in the product)
– Restore and backup visibility and reporting (e.g. view and cancel active restore jobs)
– Asset management support (e.g. sync up deviceID with BigFix)
Security and Cloud
– UBA and Forensic Search updates (support more use cases)
– UBA and Forensic Search for other data stores (e.g. files in O365)
– Incremental cloud/SaaS offering updates
– On-premises-to-Cloud authority migration
© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute
Summary
end users create & store a
majority of your IP
IP fuels growth...
IP loss destroys growth
endpoint IP
is most vulnerable
you need endpoint
resiliency
resiliency for every user,
every file, everywhere
secure growth
with Code42.
1 32
5 64

More Related Content

What's hot

Working remotely? Learn how to collaborate and communicate effectively in the...
Working remotely? Learn how to collaborate and communicate effectively in the...Working remotely? Learn how to collaborate and communicate effectively in the...
Working remotely? Learn how to collaborate and communicate effectively in the...Cisco Webex
 
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureCisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureNetworkCollaborators
 
Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies Harry McLaren
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationNetworkCollaborators
 
Security at the Speed of Software - Twistlock
Security at the Speed of Software - TwistlockSecurity at the Speed of Software - Twistlock
Security at the Speed of Software - TwistlockAmazon Web Services
 
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines -  ben greenCisco Connect 2018 Philippines -  ben green
Cisco Connect 2018 Philippines - ben greenNetworkCollaborators
 
Cisco Collaboration-Spark Presentation
Cisco Collaboration-Spark PresentationCisco Collaboration-Spark Presentation
Cisco Collaboration-Spark PresentationSimplex
 
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...www.securitysystems.best
 
Building an Adoption Plan: Think Outside the Box (Part 1 of 2)
Building an Adoption Plan: Think Outside the Box (Part 1 of 2)Building an Adoption Plan: Think Outside the Box (Part 1 of 2)
Building an Adoption Plan: Think Outside the Box (Part 1 of 2)Cisco Canada
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseRobb Boyd
 
Launching Assassin's Creed with the Eagle Vision
Launching Assassin's Creed with the Eagle VisionLaunching Assassin's Creed with the Eagle Vision
Launching Assassin's Creed with the Eagle VisionSplunk
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationNetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXNetworkCollaborators
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Securescoopnewsgroup
 
Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3princescorpio
 
What we do at Abacus
What we do at AbacusWhat we do at Abacus
What we do at AbacusNovember014
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodeDevOps.com
 
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...Cloud Native Day Tel Aviv
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 

What's hot (20)

Working remotely? Learn how to collaborate and communicate effectively in the...
Working remotely? Learn how to collaborate and communicate effectively in the...Working remotely? Learn how to collaborate and communicate effectively in the...
Working remotely? Learn how to collaborate and communicate effectively in the...
 
Cisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the futureCisco Connect 2018 Philippines - The workplace of the future
Cisco Connect 2018 Philippines - The workplace of the future
 
Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
 
Security at the Speed of Software - Twistlock
Security at the Speed of Software - TwistlockSecurity at the Speed of Software - Twistlock
Security at the Speed of Software - Twistlock
 
Cisco Connect 2018 Philippines - ben green
Cisco Connect 2018 Philippines -  ben greenCisco Connect 2018 Philippines -  ben green
Cisco Connect 2018 Philippines - ben green
 
Cisco Collaboration-Spark Presentation
Cisco Collaboration-Spark PresentationCisco Collaboration-Spark Presentation
Cisco Collaboration-Spark Presentation
 
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
 
Building an Adoption Plan: Think Outside the Box (Part 1 of 2)
Building an Adoption Plan: Think Outside the Box (Part 1 of 2)Building an Adoption Plan: Think Outside the Box (Part 1 of 2)
Building an Adoption Plan: Think Outside the Box (Part 1 of 2)
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 
Launching Assassin's Creed with the Eagle Vision
Launching Assassin's Creed with the Eagle VisionLaunching Assassin's Creed with the Eagle Vision
Launching Assassin's Creed with the Eagle Vision
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Is Your Data Secure
Is Your Data SecureIs Your Data Secure
Is Your Data Secure
 
Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3Bitdefender Corporate July2011 V3
Bitdefender Corporate July2011 V3
 
What we do at Abacus
What we do at AbacusWhat we do at Abacus
What we do at Abacus
 
Preventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from CodePreventing Code Leaks & Other Critical Security Risks from Code
Preventing Code Leaks & Other Critical Security Risks from Code
 
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 

Similar to The Code42 Story

Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаCisco Russia
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018   we make it simpleCisco connect winnipeg 2018   we make it simple
Cisco connect winnipeg 2018 we make it simpleCisco Canada
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterSpanning Cloud Apps
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
Docker Federal Summit 2017 General Session
Docker Federal Summit 2017 General SessionDocker Federal Summit 2017 General Session
Docker Federal Summit 2017 General SessionDocker, Inc.
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security Cristian Garcia G.
 
Database as code in Devops - DBを10分間で1000個構築するDB仮想化テクノロジーとは?(Adam)
Database as code in Devops - DBを10分間で1000個構築するDB仮想化テクノロジーとは?(Adam)Database as code in Devops - DBを10分間で1000個構築するDB仮想化テクノロジーとは?(Adam)
Database as code in Devops - DBを10分間で1000個構築するDB仮想化テクノロジーとは?(Adam)Insight Technology, Inc.
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
Getting Demo & POV Ready
Getting Demo & POV ReadyGetting Demo & POV Ready
Getting Demo & POV ReadyThousandEyes
 
Cisco & red hat open stack solutions
Cisco & red hat open stack solutionsCisco & red hat open stack solutions
Cisco & red hat open stack solutionsLora O'Haver
 
A Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public CloudA Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public CloudZNetLive
 
Professional Services for Cyber Recovery .pptx
Professional Services for Cyber Recovery .pptxProfessional Services for Cyber Recovery .pptx
Professional Services for Cyber Recovery .pptxssusercc05cf
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsLiving Online
 
Getting ready for Infrastructure Transformation with hyper-converged
Getting ready for Infrastructure Transformation with hyper-convergedGetting ready for Infrastructure Transformation with hyper-converged
Getting ready for Infrastructure Transformation with hyper-convergedSynapse360
 
Synectiks Microservice Platform
Synectiks Microservice PlatformSynectiks Microservice Platform
Synectiks Microservice PlatformPapu Bhattacharya
 
Proposte ORACLE per la modernizzazione dello sviluppo applicativo
Proposte ORACLE per la modernizzazione dello sviluppo applicativoProposte ORACLE per la modernizzazione dello sviluppo applicativo
Proposte ORACLE per la modernizzazione dello sviluppo applicativoJürgen Ambrosi
 
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateWhy Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateDelphix
 
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...Cloudera, Inc.
 

Similar to The Code42 Story (20)

Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018   we make it simpleCisco connect winnipeg 2018   we make it simple
Cisco connect winnipeg 2018 we make it simple
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Docker Federal Summit 2017 General Session
Docker Federal Summit 2017 General SessionDocker Federal Summit 2017 General Session
Docker Federal Summit 2017 General Session
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
Database as code in Devops - DBを10分間で1000個構築するDB仮想化テクノロジーとは?(Adam)
Database as code in Devops - DBを10分間で1000個構築するDB仮想化テクノロジーとは?(Adam)Database as code in Devops - DBを10分間で1000個構築するDB仮想化テクノロジーとは?(Adam)
Database as code in Devops - DBを10分間で1000個構築するDB仮想化テクノロジーとは?(Adam)
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Getting Demo & POV Ready
Getting Demo & POV ReadyGetting Demo & POV Ready
Getting Demo & POV Ready
 
Cisco & red hat open stack solutions
Cisco & red hat open stack solutionsCisco & red hat open stack solutions
Cisco & red hat open stack solutions
 
A Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public CloudA Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public Cloud
 
Professional Services for Cyber Recovery .pptx
Professional Services for Cyber Recovery .pptxProfessional Services for Cyber Recovery .pptx
Professional Services for Cyber Recovery .pptx
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA Systems
 
Getting ready for Infrastructure Transformation with hyper-converged
Getting ready for Infrastructure Transformation with hyper-convergedGetting ready for Infrastructure Transformation with hyper-converged
Getting ready for Infrastructure Transformation with hyper-converged
 
Synectiks Microservice Platform
Synectiks Microservice PlatformSynectiks Microservice Platform
Synectiks Microservice Platform
 
Proposte ORACLE per la modernizzazione dello sviluppo applicativo
Proposte ORACLE per la modernizzazione dello sviluppo applicativoProposte ORACLE per la modernizzazione dello sviluppo applicativo
Proposte ORACLE per la modernizzazione dello sviluppo applicativo
 
Why Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major UpdateWhy Your Approach To Data Governance Needs a Major Update
Why Your Approach To Data Governance Needs a Major Update
 
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
 

Recently uploaded

Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 

Recently uploaded (20)

Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 

The Code42 Story

  • 1. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute The Code42 Story
  • 2. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute Cloud Storage [EFSS] empowers your business Workforce Productivity Extended Collaboration Infrastructure Modernization Enhancing the digital workplace: work anytime, anywhere, from any device Sharing, editing and collaborating with teammates Moving shared network drives to the cloud
  • 3. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute And in today’s Knowledge Economy …because you know employee ideas drive the business You’ve likely even mandated its use…
  • 4. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute Leaving much of your employee’s ideas—your IP—on devices
  • 5. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute YOUR BUSINESS RUNS ON IP Intellectual property can comprise more than 80%of a company’s net value. — Deloitte
  • 6. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute What do you consider your company’s IP? THE OBVIOUS IP ASSETS: o Patents o Copyrights o Trademarks o Trade Secrets This is the corporate IP that drives revenue.
  • 7. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute But is that everything? What about the IP your employees create and refine every day? STRATEGY • Growth Plans/M&A Activity • Development Plans • Product Roadmap Plans INNOVATIONS • Engineering Files • Process Documentation • Creative/Sales & Marketing Content OPERATIONS • Customer Lists • Employee Performance Documentation • Project Proposals This is the IP that keeps your business running—and sets your business apart.
  • 8. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute Where does IP come from? THE KNOWLEDGE WORKER It’s not just about generating new ideas. It’s what your employees do all day: • Researching ideas • Considering possibilities, opportunities and prospects • Defining project direction • Refining, synergizing & iterating concepts
  • 9. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute What does IP look like across your company? ENGINEERING SALES MARKETING BUT ALSO • Development process/strategy • Product roadmap • Customer Requirements BUT ALSO • Sales lifecycle/customer buying journey • Sales playbooks & training materials • Pitch decks • Proposals & contracts BUT ALSO • Creative/brand assets (logos, art files, photos, etc.) • Prospect funnel/journey • Marketing calendar/plans •Source code •Algorith ms •Customer lists •Sales strategy/ messagin g • Marketing strategy • Customer lists
  • 10. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute ENGINEERING SALES MARKETING Losing IP puts business growth at risk. IMPACT= Time to Market IMPACT= Time to Revenue IMPACT= Time to Opportunity
  • 11. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute Protecting the 3 Elements of your IP Value CONFIDENTIALITY Comprehensive visibility mitigates the risk of IP theft or breach. INTEGRITY Backing up every version of every file ensures the enterprise can always recover original IP. AVAILABILITY Automatic, continuous backup gives all users uninterrupted access to all IP. Securing the value of your IP—and your IP utility.
  • 12. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute Growth is your #1 priority. Securing it is ours. Be certain.
  • 13. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute Our Product
  • 14. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute Code42 is Essential Data Protection, Recovery, & Visibility DATA PROTECTION DATA RECOVERY DATA VISIBILITY BACKUP LEGAL HOLD SELF-SERVICE RANSOMWARE INSIDER THREAT MERGER & ACQUISITION DEVICE MIGRATION EVERY USER, EVERY FILE, EVERYWHERE – ALWAYS BOUNCE BACK MINIMIZING BUSINESS DISRUPTION – MOVE FORWARD FASTER MITIGATING RISKS TO GROWTH - SPOT RISK SOONER Securing the ideas that drive your growth Be certain.
  • 15. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute Our Core Value Prop AUTOMATIC PROTECTION OF EVERY FILE CONTINUOUSLY TOTAL RECOVERY OF EVERY FILE IN REAL-TIME COMPLETE VISIBILITY OF EVERY FILE AND FILE ACTIVITY Every 15 minutes Up to 9x faster All File Content AT SCALE to 100,000s USERS EVERY USER, EVERY FILE, EVERYWHERE ALWAYS BOUNCE BACK SPOT RISK SOONERMOVE FORWARD FASTER FULL CLIENT RESTORE 5 TO 9x FASTER PARTIAL CLIENT RESTORE 2.5 TO 3x FASTER SINGLE CLIENT RESTOR 2x FASTER BACKUP FREQUENCY 16x MORE
  • 16. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute Make Everyday Workflows a lot Faster & Easier 2x to 9x FASTER SINGLE & BULK FILE RESTORES FASTER TECH REFRESH & DEVICE MIGRATION SIMPLIFY & STREAMLINE LEGAL HOLD So fast and simple end users can do it themselves From 3 hours per device to just 30 minutes Never take possession of an end user’s device MINIMIZE BUSINESS DISRUPTION
  • 17. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute Mitigating Risk to Growth MONITOR IP ACTIVITY KNOW IP RISKS PREDICT IP THREATS MITIGATE RISKS TO YOUR IP - MITIGATE RISKS TO GROWTH SPOT RISK SOONER
  • 18. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute Code42 Product Evolution 2015 2016 2017 2018 5.4 5.1 5.0 Legal hold module Windows user profile migration 5.2 Site-based Bandwidth Mgmt. Jump Upgrades to 5.x Co-branding capabilities 6.05.3 Legal Hold updates File Search app updates TLS support User data activity alerting Remote device locking Legal hold simplification Enhanced Console Restore performance Custom installers Okta integration Next Forensic Search User Behavior AnalyticsUser data activity monitoring File search and discovery Self-service device replacement Schedule-based bandwidth mgmt. 6.5 Client deployment policies Customization templates Admin console updates Splunk integration Zapproved integration Windows 10 USMT Migration Simplified compliance settings
  • 19. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute Strategic Vision 19 Secure, 100% cloud- based SaaS solution Actionable intelligence about data risk
  • 20. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute 20 Secure, 100% Cloud-based SaaS • AWS-based authority managed by Code42 • Encrypted data in Code42’s purpose-built data centers • Full-featured – Data Protection, Data Recovery, Data Visibility • Integrates with identity management system (AD, LDAP, SAML)
  • 21. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute 21 Actionable Intelligence About End Use • Know what departing employees are taking with them • Receive alerts if user copy data to unsanctioned cloud folders • Speed up investigations with fast access to end-user files and metadata
  • 22. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute Actionable Intelligence Connect the dots to create patterns of predictability REPOR TAre 100% of our files files (ideas) protected & recoverable? Who has what files and when, where, and how did they move them off the endpoint? SEARCH What users’ file activity patterns are indicative of a threat to our ideas? ANALYZEMONITOR Are our files protected & recoverable, and are they are moving off the endpoint?
  • 23. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute Insider Threat Detection via Code42 Security Center • Get alerts when users in engage in risky activities • Focus on data exfiltration via removable media & cloud storage folders • Splunk Integration 6.0
  • 24. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute 2018 Themes Recovery and Platform – Reporting and Dashboard updates (e.g. Confirm-the-Code in the product) – Restore and backup visibility and reporting (e.g. view and cancel active restore jobs) – Asset management support (e.g. sync up deviceID with BigFix) Security and Cloud – UBA and Forensic Search updates (support more use cases) – UBA and Forensic Search for other data stores (e.g. files in O365) – Incremental cloud/SaaS offering updates – On-premises-to-Cloud authority migration
  • 25. © 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute Summary end users create & store a majority of your IP IP fuels growth... IP loss destroys growth endpoint IP is most vulnerable you need endpoint resiliency resiliency for every user, every file, everywhere secure growth with Code42. 1 32 5 64

Editor's Notes

  1. Extended Collaboration   According to Gartner, this use case entails the publishing, sharing and syncing of files between two or more people and allows for commenting, notification, data protection, rights management and versioning capabilities.   There are 2 specific use cases that align to this category: Collaboration: Providing users with a place where collaboration like editing, task assignment and comments can take place Workflow: Adding or improving workflows via API or other integrations between sync & share vendors and other ecosystem partners such as DocuSign, Slack and SalesForce.     TAKEAWAY: This use case does not compete with the Code42 offering. Workforce Productivity   According to Gartner, this use cases focuses on enabling people to work and be productivity with files in a modern, mobilized environment that comprises different locations, devices and productivity tools.   Specifically, Gartner sees sync & share deployments take place as part of a workplace mobilization effort. Sync & share products offer increased productivity by untethering workers from the office, allowing them to be more responsive, and providing them access to up-to-date files.   TAKEWAY: This use case creates some tension between Code42 and sync & share. Code42 has talked about enabling workforce productivity by allowing users to work how they want (saving locally),. This value proposition is weakened by the additional data access that sync & share provides, and it’s likely confusing our buyer. and restoring files themselves when data loss happens     Infrastructure Modernization   According to Gartner, this use case applies to organizations that want to rationalize their legacy data infrastructure by replacing file servers and FTP servers and moving to the cloud, data residency and backup/recovery automation.   There are 5 sync & share use cases that align with this category. Replacement of file shares: Moving data that had been stored on on-premises file servers to cloud, using a TCO justification. Managed file transfer: Replacing ad hoc, person-to-person transfers via FTP, using ease of use as a justification. Replacing backup: Using sync & share as a “good enough” backup solution. Gartner states this may be viable for highly-budget conscious organizations but lacks full functionality and SLAs provided by backup vendors. Content extranet: Provide the ability to share content with suppliers, customers and contractors. Access to legacy document repositories: Replace repositories like SharePoint that can be difficult to access on mobile devices or outside of the corporate network.   TAKEWAY: This use case creates a lot of tension between Code42 and sync & share. 2 of these 5 use cases (replacing backup and replacing file shares) have been primary use cases for Code42. This use case is the largest reason we’ve had to explain technical differences between sync & share and endpoint backup. Digital Workplace and Enterprise Mobility --Digital workplace is a business strategy which requires technologies to help users accomplish tasks that are not well-defined and are not highly repeatable. --CIOs are being asked to carry out digital business transformation, not only by adopting modern applications, but also by building systems that support the customer-facing side of the business. --Before IT can properly carry out a digital workplace strategy, it must first embrace the digital habits and mobility of its own employees by providing them with the resources they need to perform business tasks on a variety of devices, and from any location or network. --EFSS is a required step to carrying out the digital workplace, and it’s one that business stakeholders put into motion through “Shadow IT” cloud services. By adopting corporate-sanctioned sync & share, IT is now taking ownership of the technology needed in the digital workplace. IT Transformation & Modernization --Although cloud is not a new trend, it’s been largely adopted through net-new cloud applications. Infrastructure and Operation professionals still rank “developing a cloud strategy” as a top 2017 initiative. --IT teams have only recently begun the process of moving existing on-premises technologies to the cloud. --EFSS is being sold as a way to modernize IT infrastructure and get rid of on-premises storage. Vendor Pressure --Microsoft is putting a lot of pressure on customers, trying to move them to the cloud office suites. --They have desirable pricing, bundling, and discounting tactics to incentivize their customers to adopt the cloud suite, and customers also know it’s an inevitable move. --By getting customers into Office 365, Microsoft is not only increasing EFSS adoption but becoming the default EFSS to be adopted. --While businesses know the move to Office 365 is inevitable, they still need to be able to justify the time and money required to make the move. OneDrive is one of the most tangible benefits provided by Office 365, so IT leaders and procurement professionals are using it as a primary budget justification, causing them to eliminate any redundant technologies. Analyst Influence --Analysts have stopped covering the endpoint backup market. The last Gartner Critical Capabilities report came out in the end of 2015, and Gartner has no plans to create a new one. Similarly, Forrester’s last report on endpoint backup was in 2014. Analysts say this is due to lack of inquiry requests and lack of report views. --Meanwhile, while endpoint backup lost dedicated analyst resources, the EFSS market grew by 41%. Digital workplace, mobility, and modernization trends triggered an increase in inquiry calls, allowing the space to gain analyst attention. --Because more analysts are paying attention to EFSS, it is also mentioned as a solution or recommendation in a variety of analyst strategy papers—something endpoint backup no longer gets because no analysts are thinking about the technology.
  2. What can we say about HR’s impact on growth? Impact = Decreased Human Capital
  3. The data we collect can help identify data exfiltration via removable media, common EFSS folders like Google drive, OneDrive, Dropbox and Box, and via browser uploads (for instance, if someone attaches a file to their personal Gmail account). In addition, we track what files a user restored and when. This can help identify if users are restoring files to take with them or for other purposes. Lastly, we have the ability to detect files that have potentially sensitive data patterns such as SSN or other PII which may expose the business to risk. All of this information can be consumed via our web app, and exported to CSV for further analysis. Or more commonly used in conjunction with a SIEM tool such as Splunk or Qradar.