Risk Settings Reference
This article explains how individual risk indicators contribute to the overall risk severity of a file event.
Go To Support Article
Missed an update? No problem. View our monthly product enhancements, release notes, use cases and additional Incydr resources now in one centralized location.
This article explains how individual risk indicators contribute to the overall risk severity of a file event.
Go To Support Article
Inventory cloud events by taking an inventory of the drives in that environment and then discovering all in-scope drives and inventories all of their files.
Read Article
Gain full visibility into untrusted file movement with the Risk Exposure and Risks Trends Dashboards.
Learn More
This article lists release notes for Code42 APIs.
Read Article
Employees whose roles, behaviors, and access increase risk to the company can be monitored more closely for concerning file activity with watchlists.
Go To Support Article
Use this dashboard to quickly identify when unusual activity is happening so that you can investigate further.
Go To Support Article
Use the Data Preferences settings for Trusted activity to define domains, URLs, Slack workspaces, and cloud accounts you trust.
Go To Support Article
Help us improve your product experience! Leave a Gartner review and get $25 or make a donation to a charity of your choice!
Leave ReviewNew DLP Market Guide is clear – you need Insider Risk Management The threat from insiders to your most valuable data continues to dominate the news and no doubt many of you are thinking about how...
Read Blog
Reimagine Data Security for the Way We Work Today.
Register Now
Get ahead of accidental data exfiltration with Instructor Proactive lessons and provide your employees with the skills to manage data property.
Read Article
Cases help you manage and respond to investigations with tools that collect, organize, and retain user file activity. This tutorial explains how to create, update, and close cases.
Go To Support Article
Incydr Context Flows enhance Incydr’s signal by ingesting user attributes, such as employment milestones, departure or elevated access credentials from corporate IAM, PAM and HCM systems.
Read Article
New Watchlists allow security practitioners to organize users of similar risk levels into groups based on their employment milestones, attributes and other risk factors.
Learn More
SnapFinance implemented an Incydr Context Flow to help identify and manage their highest risk users and protect their crown jewels - data.
Watch Video
Register for our complimentary workshop to explore the insider threat of the departing employee and how Code42 Incydr can help protect against intellectual property leak, loss and theft.
Register Now
Brutal truth: most organizations don’t have a specific and consistent workflow to account for data exposure risks surrounding widespread workforce changes like layoffs, furloughs and reductions in...
Read Blog
How security teams are addressing the gaps in their policy-based tools in regards to threat intelligence, data risk and incident response.
Read Report