Code42 Touts Insider Threat Detection
November 8, 2019
continues to expand its capabilities to protect data from insider
threats with new integrations into cloud-based email platforms. Through
the integrations, security teams can gain increased visibility into
where data is as well as when and how sensitive data is being
exfiltrated to and from cloud-based email platforms, such as MicrosoftⓇ
Office 365Ⓡ and Google G Suite. Now with Code42, information security
teams can rapidly detect, investigate and respond to data loss, leak and
theft happening across endpoints, cloud and email.
These new capabilities help to further mitigate risks associated with
insider threat. According to the 2019 Code42 Data Exposure Report, 63%
of employees admitted to bringing files – customer lists, source code
and product designs – from their former job to their new employer,
highlighting the dangers of insider threat. Further, 43% of business
decision-makers use personal email to share files and collaborate with
peers, demonstrating email’s ubiquity in the file-sharing landscape.
visibility into cloud-based email gives security teams a more
comprehensive view of the vectors through which data loss occurs –
particularly when employees quit and data is at an elevated risk of
theft,” says Rob Juncker, Code42 SVP of product, research, operations
and development. “Organizations can now more easily and rapidly detect
and investigate suspicious data movement through one of the most
widely-used data exfiltration vectors, cloud-based email. These
capabilities can turn hours of investigative work into a task of a few
minutes and yield a level of granularity into file contents and detail
that security teams have been unable to achieve until now.”
With the new integrations into cloud-based email platforms, information
security teams can take a deeper investigative journey into file-level
details when an attempted exfiltration via email is flagged.
Organizations can gather details around the compromised email such as
sender, attachments and recipient, as well as investigate the content of
the file and its history prior to the attempted exfiltration.