Skip to content

How It Works

Incydr™ Is A SaaS Solution With An Extensible Cloud Architecture

Graphic imagery for how Incydr works

Spend less time administrating and more time protecting data

Incydr allows security teams to gain control over the data leaving the organization and drive the secure work habits needed to decrease data risk in the future – even if the team is low on resources.

Cloud-native SaaS architecture

Deploy in hours, fully operational in days

No proxies or complex policies to manage

How Incydr works

  • Monitor all the places your data lives to identify when files move outside your trusted environment
  • Stop data loss from insiders such as departing employees and contractors
  • Automate response controls to correct user mistakes, block file activity, and contain insider threats 
See All Incydr Features

Cross-platform endpoint agent

  • Windows, Mac, Linux
  • 0-4% CPU, ≤ 50MB memory

Integrations

  • IAM & PAM
  • SOAR/XDR
  • SIEM
  • HRIS

Developer resources

  • Open API with published documentation
  • SDK & CLI

Incydr Exfiltration Detectors

  • Cloud: OneDrive, Google Drive, Box
  • Email: Office365, Gmail
  • Apps: Salesforce, Git

Tech that stands out

Monitor Git activity to detect when source code is pushed to unsanctioned cloud repositories.

Block unacceptable data movement for your highest risk users,without the burden, inaccuracy, and endpoint impact of content-based prevention.

Download and view the actual contents of exfiltrated files to verify their sensitivity and value. Retain files as evidence.

Native, non-disruptive agent with a history of day 1 support for new macOS versions.

Incydr uses the source of files to “classify” them without requiring data tagging or content inspection.

Get detailed event info on file uploads to web without proxies, browser plugins or TLS inspection.

Detect exports to personal devices and gain visibility into all data fields within the report.

Identify untrusted activity without policy management using Incydr’s Trust methodology. Even trusted activity is logged for reference.

Easily query a company-wide index of all metadata without strain on endpoints. The device doesn’t need to be online for investigation.

Did You Know?

There's a 1 in 3 chance your company loses IP when an employee quits. See if it's happening at your organization during the Incydr POV.

3 ways Incydr mitigates risk to data

Pinpoints Exposure

Defined and Inferred Trust capabilities automatically distinguish between trusted activity and data exposure.

Read White Paper
Prioritizes Risk

More than 120 Incydr Risk Indicators transparently score and prioritize risky file activity.

Read White Paper
Automates Response 

A complete range of response controls to support the full spectrum of insider events – from mistake to threat.

Read White Paper
Product Overview

How Incydr™ Works: A Technical Overview of the Incydr Product Architecture

Integrations

Powerful integrations to build your security ecosystem

SOAR

SOAR playbooks leverage Incydr’s context-driven alerts to automatically initiate right-sized response controls to contain, resolve and educate on data leak events via technologies like IAM, PAM and EDR/XDR.

Learn More

SIEM

Incydr sends prioritized alerts with contextual Incydr Risk Indicator intel to your SIEM, allowing you to streamline your SOC triage process through a central workflow. A single click brings you to Incydr for investigation and follow up.

Learn More

HRIS

Incydr Flows with HR Information Systems allow you to automatically add users to Watchlists based on user attributes and lifecycle milestones. For example, automatically add all departing employees to a Watchlist for enhanced monitoring before their departure.

Learn More

IAM

Incydr Flows with IAM platforms allow you to automatically add users to Watchlists as well as contain data exposure by removing user access to applications when data risk is detected.

Learn More

PAM

Incydr Flows with PAM platforms allow you to automatically add users to Watchlists as well as contain data exposure by removing user access to sensitive vaults when data risk is detected.

Learn More

Learn why the most innovative organizations use Code42 Incydr

Our products do the hard work for you – see and stop data leak and theft caused by employees.

Connect With Our Experts