Menu

TechValidate Research on Code42

These pages present data that TechValidate has sourced via direct research with verified customers and users of Code42. TechValidate stands behind the authenticity of all published data. Learn more »



4,114 Customers Surveyed

34,566 Data Points Collected

167 Published TechFacts

18 Published Charts

41 Published Case Studies



Featured Research Collections for Code42

Curated collections and slideshows of TechValidate research data on Code42.



Selected Research Highlights


Agricultural Marketing Service says “Code42 decreases stress of deploying new devices”

Introduction

This case study of Agricultural Marketing Service is based on a November 2015 survey of CrashPlan customers by TechValidate, a 3rd-party research service.

“Code42 decreases the stress of deploying new laptops / desktops to users. The ability to image a new machine and move the user data from the old machine without interference, allows us to maintain overall user productivity.”

Challenges

  • Experienced data loss at the endpoint in the following forms before deploying Code42:
    • Hardware failure or damage
    • Data loss as part of migration effort
  • Replaced the following solutions with Code42:
    • Symantec DLO
    • Manual backups to USB or external drives
  • Has the following priorities for ensuring data stored on laptops and desktops meets security, legal and compliance requirements:
    • Ensuring data on desktops and laptops is accessible and discoverable
    • The ability to see what data existed on a device, who had it, when and where, in the event of an incident
    • Visibility of security threats or non-compliance via removable media or third-party cloud storage
    • Protection from threats caused by employee behavior
    • Securing the desktop or laptop without impacting user productivity

Use Case

  • Deployed Code42 via private cloud—data stored on-premises with Code42 appliances.
  • Has the following breakdown of operating systems running on the laptops / desktops at their organization:
    • PC: 100%
  • Has made Code42 mandatory for all employees.

Results

  • Reports the following about their employees’ adoption of technology:
    • Employee adoption of new technologies is a constant challenge
    • The problem is getting the user to download the software after it’s pushed using SCCM.
  • Uses Code42 in the following ways as part of their endpoint data security strategy:
    • Protect data before a data migration or encryption project
    • Secure data in the event of employee departures
    • Assist in legal holds and/or e-Discovery initiatives

Code42 Customer Testimonial

Remote device restores

A users machine was stolen. [We had to perform a] remote wipe of the machine and full data restore to the new laptop via the adopt mechanism. It worked like a charm.

John Price, IT Support Manager, SCOUT

Code42 Customer Research

65% of IT organizations surveyed deployed Code42 in less than a month

How quickly were you able to deploy Code42 and begin backing up your endpoints?

Less than a month
65%
1 to 2 months
21%
3 to 4 months
7%
5 to 6 months
2%
More than 6 months
5%

Code42 customers are more likely to run and support multiple operating systems

Breakdown of operating systems running on the laptops/desktops in of Code42 customers (Mac, PC, Linux, Other):

Organizations that run and support one operating system on employee endpoints: 39%
Organizations that support multiple operating systems on employee endpoints: 61%

Code42 Customer Testimonial

German media agency Cross Media says modern endpoint backup is…

Far more than backup and restore.

Georg Binek, System Architect, Cross Media

Wisconsin Public Schools Replace Retrospect with Code42 for Backing Up Macs

Introduction

This case study of Wisconsin Public Schools is based on a November 2015 survey of CrashPlan customers by TechValidate, a 3rd-party research service.

“We have used it for backup and restoring purposes.”

Challenges

  • Experienced data loss at the endpoint in the following forms before deploying Code42:
    • Lost or stolen devices
    • Hardware failure or damage
    • Accidental deletion
  • Replaced the following solution with Code42:
    • Retrospect
  • Has the following priorities for ensuring data stored on laptops and desktops meets security, legal and compliance requirements:
    • Ensuring data on desktops and laptops is accessible and discoverable
    • The ability to see what data existed on a device, who had it, when and where, in the event of an incident
    • Visibility of security threats or non-compliance via removable media or third-party cloud storage
    • Protection from threats caused by employee behavior
    • Securing the desktop or laptop without impacting user productivity

Use Case

  • Deployed Code42 via private cloud—data stored on-premises with your own hardware.
  • Has the following breakdown of operating systems running on the laptops / desktops at their organization:
    • Mac: 100%
  • Has made Code42 mandatory for all employees.

Results

  • Reports the following about their employees’ adoption of technology:
    • Their employees readily adopt technology rolled out by IT
  • Uses Code42 in the following ways as part of their endpoint data security strategy:
    • Protect data before a data migration or encryption project
    • Help to identify which data existed on a lost or stolen machine
    • Secure data in the event of employee departures


More to Explore



About Code42

Code42, the leader in cloud-based endpoint data security and recovery, protects more than 47,000 organizations worldwide. Code42 enables IT and security teams to centrally manage and protect critical data for some of the most recognized brands in business and education. From monitoring endpoint data movement and use to meeting data privacy regulations to simply and rapidly recovering from data incidents, Code42 is central to any organization’s data security strategy.

Code42 Website   Code42 Website