Manage Your Highest Risk User Groups
New Watchlists allow security practitioners to organize users of similar risk levels into groups based on their employment milestones, attributes and other risk factors.
Learn More
Missed an update? No problem. View our monthly product enhancements, release notes, use cases and additional Incydr resources now in one centralized location.
New Watchlists allow security practitioners to organize users of similar risk levels into groups based on their employment milestones, attributes and other risk factors.
Learn More
Kick-off system alerts and user management workflows to protect data by monitoring your high-risk employees.
Go To Support Article
This article provides detailed descriptions of all file event metadata captured by Incydr. File event metadata appears in many places, including Forensic Search, Cases, Alerts, and the Code42 API.
Go To Support Article
To better assess the risk when users take risky actions like sharing a file publicly, you can request temporary access from Box, Google Drive, or OneDrive to view an exfiltrated file's contents.
Go To Support Article
Use this dashboard to quickly identify when unusual activity is happening so that you can investigate further.
Go To Support Article
Gain full visibility into untrusted file movement with the Risk Exposure and Risks Trends Dashboards.
Learn More
From the User Profile, you can review the file activity of an employee, helping you to quickly identify suspicious file movement, review endpoint and cloud services activity and see previous activity.
Go To Support Article
Help us improve your product experience! Leave a Gartner review and get $25 or make a donation to a charity of your choice!
Leave ReviewThe All Users list shows you the risk indicators associated with a user's file events and more details about their most recent file activity.
Go To Support Article
Code42 customer, FinancialForce, was able to align on security business objectives and build a successful Insider Risk Management program by gaining executive buy-in. See how they did it.
Watch Video
Help close the gap and learn how to conduct an Insider Risk investigation with Code42’s empathetic approach to investigations.
Read Article
Remote users have access to tools and applications that cause blindspots for security teams. Code42 recommends investigating and containing the threat in a way that’s proportionate to the threat’s sev
Read Article
Learn how security leaders can build user-centric security programs that reduce employee stress & enhance adherence.
Read Report
Reimagine Data Security for the Way We Work Today.
Register Now
Code42 Deputy CISO, Nathan Hunstad will discuss, How Insider Risk Management Enables Data Security by Uniting Security Employees
Register Now
View the latest Incydr product enhancements and updates
Read Release NotesBrowse previous Code42 Insider Insights
View More