As is the case with many startups, the applications Alector requires to fulfill its mission are purchased, owned, and used by people in the business. When the company first started out, the business bought whatever was needed to complete its work — without IT oversight.
When Craig Guinasso joined Alector as the Sr. Director of Technology and Cybersecurity, the first thing he did was take ownership of those applications to provide sorely needed oversight. One thing he realized was the backup solution in place, Code42, wasn’t working — it didn’t always capture backups. In addition, the Code42 solution generated a huge amount of tickets for Alector’s four-person IT team, because the required agent made the processors spin out of control.
Guinasso faced more challenges when it came to the company’s data. As a seasoned cybersecurity veteran, he wanted to know what products were on Alector’s network, what they were doing, who owned them, and who to contact if there was an issue. Also, he needed to know if the data was being backed up. Due to data sprawl, knowing where data resided was a challenge.