Code42, the Insider Risk Management leader, today announced the FedRAMP Authorized Code42® Incydr™ Gov solution has added new data exfiltration detectors for cloud and email systems. In addition to detecting data exfiltration from endpoints, now security teams can detect, investigate and respond to insider risk activities, including monitoring unauthorized file movement, spillage and sharing from and within cloud and email systems. The new data exfiltration detectors give security teams full visibility when files are shared, downloaded, or emailed to untrusted destinations on OneDrive, Google Drive, Box, Office 365 and Gmail, whether those insider risk events take place on a computer, in the cloud or over email.
With the growing adoption of cloud and use of collaboration tools across federal agencies, there are exponentially more ways for insiders to exfiltrate data. What’s more, many federal agencies’ insider risk programs are built around traditional tools like data loss prevention (DLP) products that weren’t designed to handle the modern reality of ultra-portable data and widespread cloud-based collaboration and file sharing. With research indicating that on average, every employee commits 13 data exposure events every day, federal organizations need clearer visibility to data spillage and prioritization of the riskiest file events happening both on and off their networks.
“Our research shows that nearly three-quarters (71%) of security teams lack complete visibility to sensitive data movement, according to IT security leaders,” said Jason Greenwood, Code42 Vice President, Federal. “Our new data exfiltration detectors help federal agencies execute against Zero Trust data security strategies, give crucial visibility into data that is being mishandled or shared from agency systems, and further protect some of the most sensitive information in the country against Insider Risk.”
Mitigating Data Exfiltration Across Federal Cloud and Email Systems
With the cloud and email data exfiltration detectors now available for purchase with Incydr Gov, federal agency security teams can now see when email attachments from federal email systems are sent to untrusted recipients, files are shared to untrusted locations, and links are shared too broadly from federal cloud storage systems. Incydr Gov’s new capabilities further protect federal agencies against Insider Risk by allowing security teams to:
- Employ Zero Trust data security strategies
- Gain visibility into file exfiltration and spillage
- Detect when files are shared with untrusted users without installation or management of proxies
- Avoid alert fatigue stemming from false positive Insider Risk notifications
- Eliminate manual investigation time
- Quickly trigger response controls due to fast, accurate detection of unsanctioned activity
Availability: The new data exfiltration detectors for cloud and email systems are currently available to new and existing Incydr Gov customers as part of the Code42 Incydr Gov product in the FedRAMP Marketplace.
About the Code42 Incydr Gov Product
The Code42 Incydr Gov product is a FedRAMP Authorized Software as a Service (SaaS) solution that manages insider risk by protecting agencies’ critical data, strategic files and intellectual property from exposure, spillage and exfiltration risk created by employee and contractor departures and actions, bolsters litigation against data theft and secures remote and collaborative work for employees and contractors. The Code42 Incydr Gov product allows security teams to effectively mitigate data exposure risks without disrupting users’ legitimate collaboration as well as illuminates an organization’s data security blind spots by showing activities that fly under the radar of other security technologies.