Average Ratings 2 Ratings
Average Ratings 0 Ratings
Description
Welcome to the realm of data security tailored for collaborative and remote enterprises. Ensure that approved collaboration tools like Slack and OneDrive are being used correctly. Identify unauthorized applications that could signal deficiencies in the available corporate tools or employee training. Achieve insight into file activities occurring off the corporate network, including uploads to the web and the use of cloud synchronization applications. Swiftly identify, probe, and address instances of data exfiltration carried out by remote workers. Stay informed with activity alerts that are triggered by specific file types, sizes, or quantities. Furthermore, utilize comprehensive user activity profiles to enhance the efficiency of investigations and responses, ensuring a robust security posture in a dynamic work environment.
Description
Incydr provides essential visibility, context, and control to effectively prevent data leaks and intellectual property theft. It enables the detection of file exfiltration through various channels, including web browsers, USB devices, cloud applications, email, file link sharing, Airdrop, and more. You can track how files are transferred and shared throughout your organization without requiring policies, proxies, or additional plugins. Incydr automatically recognizes when files exit your secure environment, making it easy to spot instances where files are sent to personal accounts or unmanaged devices. The system prioritizes file activities based on over 120 contextual Incydr Risk Indicators (IRIs), ensuring that this critical prioritization is operational from day one without any setup needed. Its risk-scoring methodology is use case-driven and offers transparency to administrators, allowing them to understand the rationale behind risk assessments. Additionally, Incydr employs Watchlists to proactively safeguard data from employees who may have a higher risk of leaking or stealing files, particularly those who are about to leave the company. Overall, Incydr equips organizations with a comprehensive suite of technical and administrative response controls to effectively address the full range of insider threats and incidents. This holistic approach ensures that your organization's data remains secure in an increasingly complex digital landscape.
API Access
Has API
API Access
Has API
Integrations
Axonius
Box
Cortex XDR
Microsoft OneDrive
Okta
Slack
Splunk SOAR
Tines
BambooHR
Code42 Incydr
Integrations
Axonius
Box
Cortex XDR
Microsoft OneDrive
Okta
Slack
Splunk SOAR
Tines
BambooHR
Code42 Incydr
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Code42
Founded
2001
Country
United States
Website
www.code42.com
Vendor Details
Company Name
Mimecast
Founded
2003
Country
United Kingdom
Website
www.mimecast.com/products/code42-incydr/
Product Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Loss Prevention
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Security Awareness Training
Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library