What are you looking for ?
Advertise with us
RAIDON

Code42 SaaS Incydr Detection and Response for Insider Threats

Built to mitigate exposure from data exfiltration and directly addresses gaps in security solutions for insider threats, cause of 66% of breaches

Code42 Software, Inc. announced the Incydr product, a SaaS offering that protects organizations’ IP, source code and trade secrets.

Code 42 Incydr Scheme Intro

The SaaS solution is built to mitigate exposure from data exfiltration and directly addresses the gaps in security solutions for insider threats, the cause of 66% of breaches.

Insider risk is an inescapable, growing problem that has been underestimated, underfunded and under the radar for too long,” said Joe Payne, president and CEO. “The pandemic and its impact on workforce collaboration is a catalyst for security teams to rethink how they address data protection without compromising collaboration. Incydr prioritizes risks to data and provides fast and easy event investigation and response capabilities, while paving a new path for companies to protect their trade secrets.

The business world has been redefined in 2020 as entire workforces are now widely distributed, and traditional network perimeters have further dissolved. The use of collaboration technologies has exploded to facilitate worker productivity and innovation. These transformative market forces have introduced pervasive and growing risks to corporate IP – the lifeblood of many organizations – with traditional security solutions often unable to prevent it from falling into the wrong hands.

For me, it’s about actionable intelligence. With the insights that Incydr provides, we are able to quickly and easily determine what is normal behavior and what is an indicator of insider risk,” said Dustin Fritz, senior security architect, UserTesting, a provider of on-demand human insights. “We need to be able to trust our employees, but we also need to be able to have visibility into risky data behavior so we can inform, engage and educate, and, where necessary, be able to detect and respond to actual risks before they become an incident.

End-to-end insider protection, from monitoring to response
Incydr delivers the detailed intelligence security teams need to identify and act on the greatest risks to their data. Unlike conventional DLP, CASB and UEBA tools that take singular views of risk, it correlates rich context across three dimensions – files, vectors and users – to speed insider threat response.

It features built-in case management functionality so security teams can efficiently compile, document and disseminate investigation details for formal insider risk incidents. With proper context on hand, organizations can remediate incidents through automated action, corrective conversation, additional training or litigation.

Additional features of Incydr:

  • Delivers visibility across computers, cloud and email: Is informed by direct integrations with corporate cloud and email services and an endpoint agent that continuously observes all on- and off-network employee file activity taking place on Mac, Windows and Linux endpoint devices, regardless of what is considered acceptable by security policy.

  • Differentiates between trusted and untrusted file activity: Surfaces file events happening across a variety of vectors, such as email, Dropbox, iCloud, USB, browser uploads, Slack and Airdrop. Filters out the noise of file movement to trusted vectors to surface only concerning activity.

  • Delivers high-fidelity risk signal: Prioritizes the file events that represent the most risk to data and warrant deeper investigation by security teams, such as file movement that takes place outside an employee’s normal work hours.

  • Provides efficient workflows to protect vulnerable data: Offers prescriptive workflows to quickly detect and respond when data is most vulnerable to threat, including during employee offboarding or remote work. Delivers company-wide visibility to identify gaps in security awareness, uncover shadow IT, and validate the efficacy of other security technologies.

  • Offers fast time to value: Deploys in 48 hours and positively impacts an organization’s security posture within 2 weeks.

Surfaces data exposure trends
Telemetry data generated by Incydr between July 1 and August 31 reveals:

  • On average, a typical employee causes 20 file exposure events per day.

  • 45% of all file exposure events detected involve business files or source code, which are the most likely data types to trigger a high-value data leak incident.

  • Data exfiltration is not limited to the traditional work week. More than 1/3 of weekend file exposure events happened via removable media, a surprising – and suspicious – choice of vector for employees working from home.

Access Incydr for Free
Incydr is available and security teams can choose from 2 product plans: Incydr Basic and Incydr Advanced.

Organizations interested in trying Incydr can sign up now for a 30-day free trial (registration required).

Read also :
Code42 Joins Palo Alto Networks Cortex XSOAR Marketplace as Launch Partner
Enabling organizations to discover, share and consume security orchestration innovations from global ecosystem to scale up automation
August 12, 2020 | Press Release
Ignite Conference: Code42 Expand Capabilities to Protect Data From Insider Threats With Integration Into Cloud-Based Email Platforms
Security teams can gain increased visibility into where data is as well as when and how sensitive data is being exfiltrated to and from cloud-based email platforms, such as Microsoft Office 365 and Google G Suite.
November 19, 2019 | Press Release

Articles_bottom
ExaGrid
AIC
ATTOtarget="_blank"
OPEN-E