Insider Threat Ecosystem

Enterprise collaboration needs collaborative solutions

Meet our partners, or become one

Filters
  • Partner Type
    • Browser
    • Cloud Collaboration
    • Email
    • Identity and Access Management
    • IT Service and Workflow Management
    • Operating System
    • Orchestration and Automation
    • Security Analytics
  • google-drive
    To help protect you from data loss, you can use the Code42 and Google Drive integration to monitor files moving to and from users' Google Drive. Learn more
  • To help protect you from data loss, you can use the Code42 and OneDrive integration to monitor files moving to and from users' Microsoft OneDrive for Business. Learn more
  • The Code42 and Box integration helps information security teams rapidly detect and respond to data loss, leak and theft through corporate Box environments, further mitigating situations of insider threat. Learn more
  • Code42 identifies files opened in Slack used for uploading and downloading files. Learn more
  • Code42 together with Splunk protects critical company intellectual property such as product plans, source code, etc. when employees quit. Learn more
  • SplunkPhantom_logo
    Code42 Next-Gen Data Loss Protection delivers valuable data exfiltration information to Splunk which in turn powers the Splunk Security Operations Suite. Learn more
  • Help battle complex threats with the IBM Resilient Security Orchestration, Automation and Response (SOAR) Platform. The Resilient SOAR Platform enables your security team to integrate its security technologies and create powerful, agile workflows that can automate the response process. Learn more
  • Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise and transform customers' experiences. With more than 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Learn more
  • Identity and access management is a critical component to adopting SaaS solutions like Code42. Together, Code42 and Ping Identity deliver a simplified yet powerful experience to provisioning, managing changing roles, etc. Learn more
  • Jamf is committed to enabling IT to empower end users and bring the legendary Apple experience to businesses, education and government organizations via its Jamf Pro and Jamf Now products, and the 70,000 members of Jamf Nation. Today, over 18,000 global customers rely on Jamf to manage more than 11 million Apple devices. Learn more
  • Zapproved LLC is the leading ediscovery software provider for managing corporate litigation readiness. Its Z-Discovery platform of intuitive and scalable solutions empowers corporate legal and compliance teams to seamlessly and defensibly manage the ediscovery process. Z-Discovery is SOC 2® Type 2 certified, the industry's highest rating for data security. With 99 percent retention, it cultivates ridiculously happy customer experiences year after year. Learn more
  • The Code42 app identifies files opened in Chrome used for uploading and downloading files. Learn more
  • The Code42 app identifies files opened in Safari used for uploading and downloading files. Learn more
  • The Code42 app for Mac captures file activity and contents on user devices in real time, helping you track user behavior to identify potential data leaks or insider threat. We are Insider Threat Protection for Macs. Learn more.
  • The Code42 app for Windows captures file activity and contents on user devices in real time, helping you track user behavior to identify potential data leaks or insider threat. Learn more

Collaboration with Industry Leaders

Code42 partners with leading security providers to deliver simple, fast detection, investigation & response to everyday data loss, leak and theft from insider threats.

Graphic showing a laptop with Mac and Windows icons on the screen surrounded by Chrome, Slack, Box, DropBox, Google Drive and other cloud sync applications.

Collect and Monitor
Automatically monitor all files across computers and cloud.

Graphic of laptop showing an alert message indicating unusual file movement.

Detect and Investigate
Easily detect unusual use of USB, web browsers and cloud services.

Graphic with magnifying glass, document, legal scales and download icon representing the investigation into data movement and the potential for legal action.

Assess and Respond
Quickly investigate and respond to real risk.

Automations

Extend the possibilities of your Code42 deployment with pre-built automations.

Code42 Insider Threat Protection speeds up security investigations by allowing you to quickly triage and prioritize data threats. Use these investigation automations to perform Code42 searches via API.

Example automation usage:

  • Investigate all file activity for a specified endpoint device.
  • Find all locations of a file across an organization using a SHA256 or MD5 hash.
  • Conduct a custom search from a JSON file or through a JSON payload.

Interested in becoming a partner?

Fill out the form below if you're interested in becoming a partner or simply want to learn more about Code42's Insider Threat Ecosystem.

By completing and submitting this form, you confirm that you agree to the storing and processing of your personal data by Code42 as described in our Privacy Statement.