Manage Watchlists
Watchlists help you more closely monitor the file activity of higher-risk users. This article explains how to use, create, delete watchlists, and how to add and remove users from a specific watchlist.
Go To Support Article
Missed an update? No problem. View our monthly product enhancements, release notes, use cases and additional Incydr resources now in one centralized location.
Watchlists help you more closely monitor the file activity of higher-risk users. This article explains how to use, create, delete watchlists, and how to add and remove users from a specific watchlist.
Go To Support Article
New Watchlists allow security practitioners to organize users of similar risk levels into groups based on their employment milestones, attributes and other risk factors.
Learn More
How security conducts employee investigations needs to change. All too often, security investigations are an attempt to get an employee to admit to suspected wrongdoing. Times have changed....
Read Article
Change user behavior and educate new and departing employees to become more risk-aware when dealing with company data.
View All Instructor Lessons
Enable trusted domain activity to define domains and Slack workspaces you trust, and even scope trusted activity to individual apps.
Go To Support Article
Error - something went wrong!
Subscribe to Code42 Insider Insights and enjoy a cup of coffee on us!
You will receive your egift in 24 hours!
Reimagine Data Security for the Way We Work Today.
Register Now
Use Forensic Search to gain a clearer understanding of file activity throughout the organization.
Go To Support Article
As they grew globally, without a physical perimeter, they realized they needed better visibility into data movement between users, applications and devices in their environment.
Read Case Study
Incydr Context Flows enhance Incydr’s signal by ingesting user attributes, such as employment milestones, departure or elevated access credentials from corporate IAM, PAM and HCM systems.
Read Article
Help us improve your product experience! Leave a Gartner review and get $25 or make a donation to a charity of your choice!
Leave ReviewFirst things first, dealing with risks presented by internal users requires a different approach than those from external threats. While this likely isn’t news to some of you, it does need to...
Read Article
Code42's Empathetic Investigations™ allow security teams to contain threats to data in a way that’s proportional to the threat’s severity and build trust within the organization.
Read Article
The biggest threats to your data are often hiding behind practices that seem secure. Here are 5 threats you should be tracking now.
Read Article
Jadee Hanson, CISO & CIO at Code42 discusses how the new micro trends in cybersecurity make Insider Risk Management crucial for security stacks.
Listen to Podcast
Help employees make smarter and safer decisions to keep data secure by containing threats while responding in an appropriate manner with Code42’s Approach to Empathetic Investigations.
Read Article
The Great Resignation has caused an enormous increase in departing employees and data exfiltration events. Respond to these incidents in a proportional way.
View Infographic
What’s common to Cartier, Pfizer, Block, Tesla and Apple in the past several months? They have all had high-profile insider data exfiltration or IP theft events. Now add Yahoo to this “not so...
Read Article
View the latest Incydr product enhancements and updates
Read Release NotesBrowse previous Code42 Insider Insights
View MorePerpetrators’ move is disappointing, but Apple faces a solvable problem How do companies put new technology in the market and gain a competitive edge? They build it, buy it, or partner to get it....
Read Article