Security and Compliance Documents

How Code42 Helps Companies Meet Their Compliance Requirements

Issue link: https://www.code42.com/resources/i/1425647

Contents of this Issue

Navigation

Page 1 of 1

About Code42 Code42 is the leader in Insider Risk Management. Native to the cloud, the Code42® Incydr™ solution rapidly detects data loss and speeds incident response without inhibiting employee productivity. With Code42, security professionals can protect corporate data and reduce insider threats while fostering an open and collaborative culture for employees. More than 50,000 organizations worldwide, including the most recognized brands in business and education, rely on Code42 to safeguard their ideas. For more information, visit code42.com. Gartner Peer Insights 50+ Verified Security Reviews 4.9 out of 5 stars OVERVIEW COMPLIANCE REQUIREMENTS Incydr Key Compliance Features: While security regulations may differ in scope and complexity, they all build off of basic information security best practices. It's in these foundational controls that Incydr provides the greatest support in reaching your compliance obligations: Insider Risk Management Detect when users move files to removable media, web browsers/ applications and cloud sync folders Identify files that are shared externally via corporate OneDrive, Google Drive and Box accounts Define alert criteria based on user, data exfiltration vector and file count or size Monitor and alert on use of removable media and portable storage devices Detection and Response to Incidents Security teams can review event activity in seconds, even when user devices are offline File activity is automatically indexed and made searchable to reduce the time it takes to detect and respond to insider risk events File Preservation of Exfiltrated Files Incydr protects the confidentiality, integrity and availability of your data by preserving exact copies of files that can be accessed and restored Malware Protection Incydr provides malicious code protection mechanisms on user endpoints Endpoint file preservation provides point-in-time recovery from malicious software Encryption Incydr protects the confidentiality and integrity of transmitted information and information at rest Communications between the Incydr endpoint app and the storage servers are encrypted using AES 256-bit encryption Exfiltrated files and their respective metadata are AES 256-bit encrypted on the endpoint and remain encrypted in storage servers Audit/Logging Incydr allows organizations to log file activity on user endpoints Incydr generates audit records with event information such as: • Type • Date/time • Location • Source • Outcome • File involved • Identity of any individuals or subjects associated with the event Incident Management Incydr provides file activity and the ability to view endpoint files to support after-the-fact investigations of security incidents Incydr allows for detailed analysis of user files movement activity on a device Code42 is committed to helping organizations reach their compliance obligations. If you have additional questions about how Incydr can assist with your organizational compliance needs, please contact your sales representative today. © 2022 Code42 Software, Inc. All rights reserved. | OV_Compliance_Requirements_Code42

Articles in this issue

Links on this page

Archives of this issue

view archives of Security and Compliance Documents - How Code42 Helps Companies Meet Their Compliance Requirements