Insider Threat Ecosystem
An extensive platform of partnerships and integrations for fast, simple and comprehensive insider threat detection and response.
To help protect you from data loss, you can use the Code42 and Google Drive integration to monitor files moving to and from users' Google Drive. Learn more
To help protect you from data loss, you can use the Code42 and OneDrive integration to monitor files moving to and from users' Microsoft OneDrive for Business. Learn more
The Code42 and Box integration helps information security teams rapidly detect and respond to data loss, leak and theft through corporate Box environments, further mitigating situations of insider threat. Learn more
Code42 identifies files opened in Slack used for uploading and downloading files. Learn more
Code42 together with Splunk protects critical company intellectual property such as product plans, source code, etc. when employees quit. Learn more
Code42 Next-Gen Data Loss Protection delivers valuable data exfiltration information to Splunk which in turn powers the Splunk Security Operations Suite. Learn more
Help battle complex threats with the IBM Resilient Security Orchestration, Automation and Response (SOAR) Platform. The Resilient SOAR Platform enables your security team to integrate its security technologies and create powerful, agile workflows that can automate the response process. Learn more
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise and transform customers' experiences. With more than 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Learn more
Identity and access management is a critical component to adopting SaaS solutions like Code42. Together, Code42 and Ping Identity deliver a simplified yet powerful experience to provisioning, managing changing roles, etc. Learn more
Jamf is committed to enabling IT to empower end users and bring the legendary Apple experience to businesses, education and government organizations via its Jamf Pro and Jamf Now products, and the 70,000 members of Jamf Nation. Today, over 18,000 global customers rely on Jamf to manage more than 11 million Apple devices. Learn more
Zapproved LLC is the leading ediscovery software provider for managing corporate litigation readiness. Its Z-Discovery platform of intuitive and scalable solutions empowers corporate legal and compliance teams to seamlessly and defensibly manage the ediscovery process. Z-Discovery is SOC 2® Type 2 certified, the industry's highest rating for data security. With 99 percent retention, it cultivates ridiculously happy customer experiences year after year. Learn more
The Code42 app identifies files opened in Chrome used for uploading and downloading files. Learn more
The Code42 app identifies files opened in Safari used for uploading and downloading files. Learn more
When employees leave your organization, Code42 makes it simple to detect when they email sensitive files using Office 365 email. This helps information security teams rapidly detect, investigate and respond to data loss, leak and theft using corporate Office 365 email accounts, further mitigating risks associated with insider threat. Learn more
Collaboration with Industry Leaders
Code42 partners with leading security providers to deliver simple, fast detection, investigation & response to everyday data loss, leak and theft from insider threats.
Collect and Monitor
Automatically monitor all files across computers and cloud.
Detect and Investigate
Easily detect unusual use of USB, web browsers and cloud services.
Assess and Respond
Quickly investigate and respond to real risk.
Extend the possibilities of your Code42 deployment with pre-built automations.
Code42 Insider Threat Protection speeds up security investigations by allowing you to quickly triage and prioritize data threats. Use these investigation automations to perform Code42 searches via API.
Example automation usage:
- Investigate all file activity for a specified endpoint device.
- Find all locations of a file across an organization using a SHA256 or MD5 hash.
- Conduct a custom search from a JSON file or through a JSON payload.
Interested in becoming a partner?
Fill out the form below if you're interested in becoming a partner or simply want to learn more about Code42's Insider Threat Ecosystem.
By completing and submitting this form, you confirm that you agree to the storing and processing of your personal data by Code42 as described in our Privacy Statement.