Code42 Unveils Insider Risk Management Framework to Stop Data Leaks Without Blocking Collaboration


First-of-its-kind guidance arms enterprises with the technical requirements, integrations and workflows needed to reduce Insider Risk amid the shift to a hybrid workforce

Code42, the Insider Risk Management leader, today published guidance for enterprises with remote and hybrid workforces to build an effective Insider Risk Management (IRM) program. The first of its kind, Code42’s Insider Risk Management framework provides a practical guide for deterring Insider Risk without disrupting legitimate business. It includes a technical roadmap for enterprises using myriad collaboration tools that are rethinking the functionalities and capabilities they need to effectively improve their organization’s risk posture when it comes to data leaks, loss and theft from insiders.

Insider Risk, not to be confused with insider threat, is any data exposure event – security, compliance or competitive in nature – that jeopardizes the financial, reputational or operational well-being of a company and its employees, customers and partners. Today, organizations need a new paradigm for data security and a better approach to mitigate Insider Risk. Gartner has termed this Insider Risk Management. Code42’s new IRM framework comes on the heels of the company’s designation as a Representative Vendor in the December 2020 Gartner “Market Guide for Insider Risk Management Solutions” report.

“Remote and hybrid work demand technologies that make it easy to collaborate and move files. Security teams’ traditional response – to block data movement – runs counter to what leaders and employees demand,” said Joe Payne, president and CEO, Code42. “To break the deadlock, organizations need to look to Insider Risk Management. It wraps a layer of security around collaboration tech while allowing employees to share files without being disrupted. Drawing on our deep IRM experience, we developed this IRM framework to guide companies as they secure their collaborative work models and trade secrets.”

For more such updates follow us on Google News ITsecuritywire News.