Code42 Incydr

Code42 Incydr

Mimecast
+
+

Related Products

  • Curtain LogTrace File Activity Monitoring
    4 Ratings
    Visit Website
  • Safetica
    401 Ratings
    Visit Website
  • Curtain MonGuard Screen Watermark
    7 Ratings
    Visit Website
  • Globalscape Enhanced File Transfer (EFT)
    85 Ratings
    Visit Website
  • Cerberus FTP Server
    159 Ratings
    Visit Website
  • gPanel
    64 Ratings
    Visit Website
  • MASV
    71 Ratings
    Visit Website
  • Synchredible
    13 Ratings
    Visit Website
  • JSCAPE MFT Server
    187 Ratings
    Visit Website
  • MOVEit
    617 Ratings
    Visit Website

About

Incydr gives you the visibility, context and control needed to stop data leak and IP theft. Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization, without the need for policies, proxies, or plugins. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices. Incydr prioritizes file activity based on 120+ contextual Incydr Risk Indicators (IRIs). This prioritization works on day 1 without any configuration. Incydr’s risk-scoring logic is use case-driven and transparent to administrators. Incydr uses Watchlists to programmatically protect data from employees who are most likely to leak or steal files, such as departing employees. Incydr delivers a complete range of technical and administrative response controls to support the full spectrum of insider events.

About

Discover risks, educate employees, enforce policies and prevent data loss with Reveal. Your people, users and data are dynamic: constantly changing and moving. In the hybrid world of work people create, manipulate and share data dynamically, across endless channels. The opportunities for data leaks are infinite and your people are the main target— securing your organization starts with securing your people. Reveal Cloud is cloud-native, so it is simple to buy, install, and use. You get automated protection from day 1 with out-of-the-box policies and machine learning, with smart remediation that works even if computers are disconnected from the network. The lightweight agent makes sure your data and employees are protected at all times without slowing you down. Continuous monitoring provides visibility into user behavior, data access, and system use. Security operators can search on file, USB device, connection, browser, application events, and more.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises and individuals in search of a solution to detect and respond to cyber threats and risks

Audience

Companies that want to protect their data

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Mimecast
Founded: 2003
United Kingdom
www.mimecast.com/products/code42-incydr/

Company Information

Next DLP
Founded: 2016
United Kingdom
www.nextdlp.com/platform

Alternatives

Cogility Cogynt

Cogility Cogynt

Cogility Software

Alternatives

eAuditor Cloud

eAuditor Cloud

BTC Sp. z o.o.

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Loss Prevention Features

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Endpoint Detection and Response (EDR) Features

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Integrations

Axonius
CrowdStrike Container Security
CyberArk Endpoint Privilege Manager
Daylight
Exabeam
Gmail
Google Drive
LogRhythm SIEM
Microsoft 365
Microsoft OneDrive
Microsoft Sentinel
Microsoft Teams
Okta
Ping Identity
SentinelOne Singularity
ServiceNow
Splunk Cloud Platform
Splunk SOAR
Tines

Integrations

Axonius
CrowdStrike Container Security
CyberArk Endpoint Privilege Manager
Daylight
Exabeam
Gmail
Google Drive
LogRhythm SIEM
Microsoft 365
Microsoft OneDrive
Microsoft Sentinel
Microsoft Teams
Okta
Ping Identity
SentinelOne Singularity
ServiceNow
Splunk Cloud Platform
Splunk SOAR
Tines
Claim Code42 Incydr and update features and information
Claim Code42 Incydr and update features and information
Claim Next DLP and update features and information
Claim Next DLP and update features and information