Skip to content

Incydr™ Proof Of Value Guide

Your go-to resources for everything related to the Incydr POV.

What to expect during your Incydr POV

The Incydr Proof of Value takes the traditional proof of concept up a notch. This 4 week product experience will not only demonstrate Incydr’s visibility, context, and controls but will also validate how the use of Incydr will tangibly improve your organization’s Insider Risk posture.

Get Started

Estimated time: 60 min

  • POV experience overview
  • Deploy agents to test machines
  • Code42 team members involved during kick-off include: Account Executive (AE), Systems Engineer (SE), Professional Services Engineer
  • Your team members involved during kick-off include: Security Stakeholder, Desktop Deployment Engineer, Technical Decision Maker, Technical Sponsor
Helpful materials for Day 1

Detect data theft on day 1 via cloud and endpoint exfiltration

Tailor your response to the offender and offense

Ally the business with security to protect IP

Stop data theft with Code42 Incydr

How-to videos

Data Exposure Dashboard

The Data Exposure Dashboard provides an overview of all exposure and exfiltration activity, both on the endpoint and in the cloud.

Watchlists: Departing Employees

Monitoring departing employees is an essential part of the offboarding process. Utilize the Departing Employees Watchlist to review file activity.

Watchlists: High Risk Employees

Discover how to review file activity in the High Risk Employees Watchlist and quickly identify suspicious file movement.

Forensic Search allows you to investigate all file event activity detected by Incydr. 

Cases

Cases provide a way to compile, document, and disseminate investigation details.

Use Case: Removable Media

Removable media is a common exfiltration vector. See how Incydr provides visibility of removable media misuse.

Use Case: Concealed File Exfiltration

File mismatches occur when a file’s extension doesn’t match the file’s content. Incydr flags these and protects against concealed file exfiltration.

Data Preferences: Trusted Domains

Learn how to identify specific domains and IP addresses and filter the noise of trusted activity, such as sharing files between trusted domains.

How-to support articles

Review Suspicious File Activity

Incydr offers a wide variety of options to help you quickly identify suspicious or unexpected file activity.

Forensic Search

Forensic Search provides detailed visibility about files and enables security teams to monitor and investigate suspicious file activity.

Cases

Cases helps you manage and respond to security investigations with tools that collect, organize, and retain user file activity.

Data Preferences

Data Preferences settings enable you to exclude file activity from IP addresses and domains you trust from dashboard visualizations, alerts, and search results in Forensic Search.

User Profile

User Profile allows you to view suspicious file movement, endpoint and cloud services activity, and file activity for the previous 90 days of a specific user.

Risk Exposure Dashboard

The Risk Exposure dashboard provides a look into the different types of file activity occurring across your Incydr environment, including high risk and departing employees as well as employees that have the most file activity.

Departing Employees

Review the file activity of employees leaving your company.

Set Up Alerts

Alerts let you know when important data may be leaving your company.

Integrations

Code42 offers a variety of integrations to enable you to leverage Incydr features and data in other systems.

Frequently asked questions

Incydr capabilities

Data security

Resources

Helpful Incydr resources for your POV experience

Ready to deploy Incydr? What you need to know

Accelerate your Incydr rollout

Complete your deployment and configuration basics in under 20 hours with Incydr ProStart.

Learn More

Incydr’s Professional Services

Accelerate your time to value with deployment services. Our experts will assist with a new deployment or a health check when upgrading.

Learn More

Optimize your configuration

Capture file activity that signals Insider Risk. Attend curated workshops to enhance your use of lenses, dashboards, alerts and integrations.

Learn More

Hear what others have to say

Gartner Peer Insights
Incydr sees all

Published 9/21/21

“The ability to see where all our data is going is invaluable. Tracking where our documents go is an eye opener. Web-based emails, social media, zip files, renaming of files to obscure contents. This was exactly what we needed and since this is tied into our desktop backup system it was a no brainer to deploy this product.”

Read Full Review
Easy to implement, configure, and use!

Published 6/3/21

“Service and support has been excellent. Knowledge-base documentation is well written and clear. It’s very easy to find what I need quickly. Information is presented in the dashboard in a very clear way, making things super easy to understand. Professional services has been very helpful.”

Read Full Review
One of the best tools I have experienced

Published 6/22/21

“The tool gives amazing monitoring to the endpoint and tracks the activity related to the file movement. The Investigate and filter part is really impressive and useful to triage the alert further and take the required actions based on the activity. The most Advanced Feature is downloading the file in real-time and making solid evidence to prove yourself.”

Read Full Review
Read All Reviews

GARTNER is a registered trademark and service mark, and PEER INSIGHTS, Gartner Peer Insights Logo, and the Gartner Peer Insights Customer First badge are trademarks and service marks, of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose. The Gartner Peer Insights Customer First program constitutes an organization’s commitment to solicit reviews from its customers using programmatic sourcing strategies and best practices. They neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates.