Skip to content


Detect And Respond To Insider Risk With Incydr™

Incydr gives you the visibility, context and control needed to stop data leak and IP theft.

Protect data without
disrupting collaboration

Incydr helps you stop data leak and IP theft.

Understand your risk

Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization – without the need for policies, proxies or plugins. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices.

Detection Features

View Detection Features
Moving image that scrolls through Incydr's Risk Exposure Dashboard.
Moving image that highlights Incydr Risk Indicators that allow users to see high priority file movements.

Review only what matters

Incydr prioritizes file activity based on 120+ contextual Incydr Risk Indicators (IRIs). This prioritization works on day 1 without any configuration. Incydr’s risk scoring logic is use case-driven and transparent to administrators. Incydr uses Watchlists to programmatically protect data from employees who are most likely to leak or steal files, such as departing employees.

Investigation Features

View Investigation Features

Automate effective response

Incydr delivers a complete range of technical and administrative response controls to support the full spectrum of insider risk events. You can contain your insider threats before they do damage, automatically correct everyday mistakes, and block unacceptable activity for your highest risk users. 

Response Features

  • Integrated user microtraining 
  • Real-time blocking 
  • Revoke externally shared files 
  • Contain insider threat incidents and generate Cases
View Response Controls
Moving image displaying how an Incydr Flow can automatically contain, resolve and educate on risky file movement.

Drive secure work habits

Improving your Insider Risk posture requires a change in employee behavior. Code42 Instructor provides bite-sized training to employees, delivered when they need it. Use Instructor in tandem with Incydr to send responsive video lessons when employees put data at risk. You’ll ensure appropriate data governance and compliance with security standards and corporate policies as well as report on the positive impact of your Insider Risk Management program.

Education Features

  • Proactive Insider Risk lessons
  • Situational real-time Insider Risk lessons
  • Responsive Insider Risk lessons
Learn About Code42 Instructor

How Incydr Better Addresses Insider Risk

Customer Stories

How Incydr became an integral part of Snowflake’s security stack

“Without hesitation, Incydr, and how it fits into our overall strategy, is central to our security program. Using Incydr, we see particular patterns and behaviors that suggest a potential insider moving data to untrusted systems.” – Mario Duarte, VP of Security

Hear what others have to say

Gartner Peer Insights
Incydr sees all

Published 9/21/21

“The ability to see where all our data is going is invaluable. Tracking where our documents go is an eye opener. Web-based emails, social media, zip files, renaming of files to obscure contents. This was exactly what we needed and since this is tied into our desktop backup system it was a no brainer to deploy this product.”

Read Full Review
Easy to implement, configure, and use!

Published 6/3/21

“Service and support has been excellent. Knowledge-base documentation is well written and clear. It’s very easy to find what I need quickly. Information is presented in the dashboard in a very clear way, making things super easy to understand. Professional services has been very helpful.”

Read Full Review
One of the best tools I have experienced

Published 6/22/21

“The tool gives amazing monitoring to the endpoint and tracks the activity related to the file movement. The Investigate and filter part is really impressive and useful to triage the alert further and take the required actions based on the activity. The most Advanced Feature is downloading the file in real-time and making solid evidence to prove yourself.”

Read Full Review
Read All Reviews

GARTNER is a registered trademark and service mark, and PEER INSIGHTS, Gartner Peer Insights Logo, and the Gartner Peer Insights Customer First badge are trademarks and service marks, of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose. The Gartner Peer Insights Customer First program constitutes an organization’s commitment to solicit reviews from its customers using programmatic sourcing strategies and best practices. They neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates.