Code42 Insider Threat Ecosystem

Data security solutions for the collaborative enterprise

A growing network

The Code42 insider threat ecosystem is a growing network of strategic partnerships and technology integrations that enable organizations to speed insider risk detection and response. Our direct integrations with corporate cloud, email and SaaS applications power Code42’s risk prioritization and signal capabilities, which can then be used to automate or streamline incident response processes related to insider data risk.

Filters
  • Partner Type
    • Cloud Collaboration
    • Email DLP
    • Identity and Access Management
    • Workflow Automation
    • Orchestration and Automation
    • SOC Analytics
  • Incydr integrates with corporate cloud services including Box to detect when employees use the service to share files from computers and cloud applications. Learn more
  • Incydr integrates with Palo Alto Networks Cortex XSOAR to accelerate insider threat incident response and automate remediation procedures for potential data exfiltration across computers, email, cloud and SaaS apps. Learn more
  • google-drive
    Incydr integrates with corporate cloud services including Google Drive to detect when employees use the service to share files from computers and cloud applications. Learn more
  • Incydr integrates with IBM Resilient to automate tasks within insider threat response workflows, and speed investigations for insider threat scenarios such as departing employees exfiltrating data. Learn more
  • Incydr integrates with LogRhythm via a command-line interface (CLI) to send file exfiltration events and alert information into custom dashboards for correlation and triage. Learn more
  • Incydr integrates with corporate cloud services including OneDrive to detect when employees use the service to share files from computers and cloud applications. Learn more
  • Incydr integrates with Okta to provision additional user attributes including department, manager, and employment type to enhance monitoring of users more likely to put data at risk, such as contractors or departing employees. Learn more
  • Incydr integrates with Ping Identity to provision additional user attributes including department, manager, and employment type to enhance monitoring of users more likely to put data at risk, such as contractors or departing employees. Learn more
  • Incydr integrates with Splunk to deliver valuable data exfiltration alert information to custom dashboards for correlation and triage within the Splunk Security Operations Suite. Learn more
  • SplunkPhantom_logo
    Incydr integrates with Splunk Phantom to automate incident response workflows and provide fast access to file events and metadata across physical and cloud environments within a single platform. Learn more
  • Incydr integrates with Sumo Logic via a command-line interface (CLI) to send file exfiltration events and alert information into custom dashboards for correlation and triage. Learn more

Maximize the value of your existing security tech stack

Code42’s open API allows security teams to create custom reports, perform automated actions or integrate with existing systems within your organization to establish or strengthen your insider threat program.

Integrate with any SIEM
Correlate and analyze Code42 insider risk data in any SIEM via a command-line interface integration.

Streamline insider threat workflows
Build custom integrations into HR or other ticketing systems leveraging py42 commands accessible in Github.

Access to security services
We can provide consulting and technical resources to guide you through the integration process and enrich the value of your security stack.

Interested in becoming a partner?

Fill out the form below if you're interested in becoming a partner or simply want to learn more about Code42's Insider Threat Ecosystem.

By completing and submitting this form, you confirm that you agree to the storing and processing of your personal data by Code42 as described in our Privacy Statement.