Hi [[ session.user.profile.firstName ]]

Code42 CrashPlan

  • Date
  • Rating
  • Views
  • Take the “Ransom” Out of Ransomware: Harden Defenses and Assure Data Recovery Take the “Ransom” Out of Ransomware: Harden Defenses and Assure Data Recovery John Kindervag Vice President, Principal Analyst, Forrester Research & Arek Sokol Systems Engineer, Code42 Recorded: Oct 26 2016 48 mins
    Sponsored by Code42 - More than 45% of businesses were hit with ransomware attacks in the past year. Cybercriminals are rapidly evolving attack methodologies and issuing increasingly higher demands. With no end in sight, organizations are at significant risk for data loss. At the same time, IT security policies, anti-malware protection and end users that lack the ability to recognize sophisticated scams make ransomware inevitable.

    Join this live webcast and learn about the prevalence of ransomware in the enterprise and best practices for safeguarding your data against attackers.

    Viewers will learn:
    - Why ransomware is a burgeoning business and who is being targeted
    - Best practices & recommendations to reduce risk and assure continuous data protection and recovery
    - How modern endpoint backup protects your end-user data and enables rapid recovery without paying the ransom
  • Cybersecurity in 2016: Results from the Cyberthreat Defense Report Cybersecurity in 2016: Results from the Cyberthreat Defense Report Steve Piper, CEO at CyberEdge and Lane Roush, Systems Engineer at Code42 Recorded: Apr 20 2016 47 mins
    The CyberEdge 2016 Cyberthreat Defense Report (CDR) provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a November 2015 survey of 1,000 IT security decision makers and practitioners, the CDR delivers insight IT security teams can use to compare their perceptions, priorities and security postures to that of their peers.

    Join Steve Piper, CEO at CyberEdge and Lane Roush, Systems Engineer at Code42 to review the results from the 2016 Cyberthreat Defense Report and:

    •Understand why 62 percent of organizations expect to be breached this year.
    •Learn which cyber threats are of the utmost concern to the enterprise in 2016.
    •Explore how Code42 CrashPlan endpoint backup helps safeguard your most important asset–data!
  • Defend Your Data from the Dark Side Defend Your Data from the Dark Side David Payne, VP Global Systems Engineering at Code42 Recorded: Mar 23 2016 22 mins
    Join Code42 for an on-demand webinar to learn how protecting endpoint data can give IT the ability to overcome nearly every situation the "dark side" can conjure. Specifically you'll hear how Code42 can help you:

    • Protect every version of every file forever, with no limits on file size, type or number of files

    • Shorten time to recovery and restore files to any device or iOS at any time

    • Rapidly mitigate incidents by quickly identifying the data on compromised devices
  • Minimizing Data Threats: How to Protect Your Most Precious Resource Minimizing Data Threats: How to Protect Your Most Precious Resource David Lingenfelter, CSA Mobile Working Group Co-Chair Recorded: Mar 15 2016 25 mins
    According to Netskope, the average organization has 730 cloud apps in use, and 90.8% aren't enterprise-ready.* This puts the corporate data you're charged with securing at risk. And as workers continue to use consumer-grade cloud apps to share, access and create corporate data, it's clear that these threats aren't going away. So how can enterprise IT proactively mitigate these risks and protect the integrity of its most precious resource?

    Watch this on-demand webinar, featuring Co-Chair of the Cloud Security Alliance (CSA)'s Mobile Working Group David Lingenfelter, to learn:

    •Key considerations for minimizing the inherent risks embedded within mobile computing
    •Critical vulnerabilities associated with the introduction of IoT in the enterprise, and best practices for mitigation
    •How the CSA's Cloud Controls Matrix (CCM) provides enterprise IT with a framework for global, implementation-ready controls to prevent and manage cloud-centric information-security risks