Code42 announces new integrations into cloud-based email platforms

Code42, the leader in data loss protection, announced it continues to expand its capabilities to protect data from insider threats with new integrations into cloud-based email platforms.

Through the integrations, security teams can gain increased visibility into where data is as well as when and how sensitive data is being exfiltrated to and from cloud-based email platforms, such as Microsoft Office 365 and Google G Suite.

Now with Code42, information security teams can rapidly detect, investigate and respond to data loss, leak and theft happening across endpoints, cloud and email.

These new capabilities help to further mitigate risks associated with insider threat. According to the 2019 Code42 Data Exposure Report, 63% of employees admitted to bringing files – customer lists, source code and product designs – from their former job to their new employer, highlighting the dangers of insider threat.

Further, 43% of business decision-makers use personal email to share files and collaborate with peers, demonstrating email’s ubiquity in the file-sharing landscape.

“Having visibility into cloud-based email gives security teams a more comprehensive view of the vectors through which data loss occurs – particularly when employees quit and data is at an elevated risk of theft,” says Rob Juncker, Code42 SVP of product, research, operations and development.

“Organizations can now more easily and rapidly detect and investigate suspicious data movement through one of the most widely-used data exfiltration vectors, cloud-based email.

“These capabilities can turn hours of investigative work into a task of a few minutes and yield a level of granularity into file contents and detail that security teams have been unable to achieve until now.”

With the new integrations into cloud-based email platforms, information security teams can take a deeper investigative journey into file-level details when an attempted exfiltration via email is flagged.

Organizations can gather details around the compromised email such as sender, attachments and recipient, as well as investigate the content of the file and its history prior to the attempted exfiltration.

More about

Don't miss