Hi [[ session.user.profile.firstName ]]

Defend Your Data from the Dark Side

Join Code42 for an on-demand webinar to learn how protecting endpoint data can give IT the ability to overcome nearly every situation the "dark side" can conjure. Specifically you'll hear how Code42 can help you:

• Protect every version of every file forever, with no limits on file size, type or number of files

• Shorten time to recovery and restore files to any device or iOS at any time

• Rapidly mitigate incidents by quickly identifying the data on compromised devices
Recorded Mar 23 2016 22 mins
Your place is confirmed,
we'll send you email reminders
Presented by
David Payne, VP Global Systems Engineering at Code42
Presentation preview: Defend Your Data from the Dark Side

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Take the “Ransom” Out of Ransomware: Harden Defenses and Assure Data Recovery Recorded: Oct 26 2016 48 mins
    John Kindervag Vice President, Principal Analyst, Forrester Research & Arek Sokol Systems Engineer, Code42
    Sponsored by Code42 - More than 45% of businesses were hit with ransomware attacks in the past year. Cybercriminals are rapidly evolving attack methodologies and issuing increasingly higher demands. With no end in sight, organizations are at significant risk for data loss. At the same time, IT security policies, anti-malware protection and end users that lack the ability to recognize sophisticated scams make ransomware inevitable.

    Join this live webcast and learn about the prevalence of ransomware in the enterprise and best practices for safeguarding your data against attackers.

    Viewers will learn:
    - Why ransomware is a burgeoning business and who is being targeted
    - Best practices & recommendations to reduce risk and assure continuous data protection and recovery
    - How modern endpoint backup protects your end-user data and enables rapid recovery without paying the ransom
  • Cybersecurity in 2016: Results from the Cyberthreat Defense Report Recorded: Apr 20 2016 47 mins
    Steve Piper, CEO at CyberEdge and Lane Roush, Systems Engineer at Code42
    The CyberEdge 2016 Cyberthreat Defense Report (CDR) provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a November 2015 survey of 1,000 IT security decision makers and practitioners, the CDR delivers insight IT security teams can use to compare their perceptions, priorities and security postures to that of their peers.

    Join Steve Piper, CEO at CyberEdge and Lane Roush, Systems Engineer at Code42 to review the results from the 2016 Cyberthreat Defense Report and:

    •Understand why 62 percent of organizations expect to be breached this year.
    •Learn which cyber threats are of the utmost concern to the enterprise in 2016.
    •Explore how Code42 CrashPlan endpoint backup helps safeguard your most important asset–data!
  • Defend Your Data from the Dark Side Recorded: Mar 23 2016 22 mins
    David Payne, VP Global Systems Engineering at Code42
    Join Code42 for an on-demand webinar to learn how protecting endpoint data can give IT the ability to overcome nearly every situation the "dark side" can conjure. Specifically you'll hear how Code42 can help you:

    • Protect every version of every file forever, with no limits on file size, type or number of files

    • Shorten time to recovery and restore files to any device or iOS at any time

    • Rapidly mitigate incidents by quickly identifying the data on compromised devices
  • Minimizing Data Threats: How to Protect Your Most Precious Resource Recorded: Mar 15 2016 25 mins
    David Lingenfelter, CSA Mobile Working Group Co-Chair
    According to Netskope, the average organization has 730 cloud apps in use, and 90.8% aren't enterprise-ready.* This puts the corporate data you're charged with securing at risk. And as workers continue to use consumer-grade cloud apps to share, access and create corporate data, it's clear that these threats aren't going away. So how can enterprise IT proactively mitigate these risks and protect the integrity of its most precious resource?

    Watch this on-demand webinar, featuring Co-Chair of the Cloud Security Alliance (CSA)'s Mobile Working Group David Lingenfelter, to learn:

    •Key considerations for minimizing the inherent risks embedded within mobile computing
    •Critical vulnerabilities associated with the introduction of IoT in the enterprise, and best practices for mitigation
    •How the CSA's Cloud Controls Matrix (CCM) provides enterprise IT with a framework for global, implementation-ready controls to prevent and manage cloud-centric information-security risks
Data-centric security for the enterprise
In an era of the inevitable breach, Endpoint Data Protection is an essential and fundamental cyber security investment. Key factors such as scalability and reliability are usually the main source of all security problems. Code 42 helps enterprises with these challenges by continuously backing up laptops and desktops to capture every version of every end-user file and gather them into a central repository that’s either on-premises or in a public cloud with encryption keys onsite. For you, this means you have full visibility into endpoint data so you can limit risk, meet data privacy and compliance regulations, and easily restore lost data —at any time—even out of the office.

Learn more at www.code42.com or follow us on our blog at: blog.code42.com!

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Defend Your Data from the Dark Side
  • Live at: Mar 23 2016 7:30 pm
  • Presented by: David Payne, VP Global Systems Engineering at Code42
  • From:
Your email has been sent.
or close