Thank you for being a Code42 customer. This page is your go-to resource for the latest information about Incydr Basic, along with relevant resources to help you make the most of your deployment.
Code42 in 2'
Each month we continue to deliver next-level innovation to help you outpace and outsmart Insider Risk. There's a lot going on, and we do our best to cover what's new in 2 minutes or less with our monthly Code42 in 2' video series. Watch this month's video highlighting the newest product enhancements.
New Comprehensive Risk Prioritization Model
Incydr introduces a new numeric scoring framework to identify and prioritize Insider Risk. Based on over 60 individual risk indicators, Incydr highlights the file activity and user behaviors that create the greatest file exfiltration and exposure risk, helping you quickly identify and respond to the most critical risks to your data.
Feature Release Highlights
Apply trust to specific Slack workspaces
Incydr's Trusted activity settings now enable you to add Slack workspaces, in addition to domains. Trusting a Slack workspace prevents file activity there from appearing in security event dashboards, user profiles, and alerts. This helps focus your investigations on higher risk file activity.
Announcing Code42 Instructor
Our new product, Code42 Instructor, provides bite-sized employee education that security teams can share with specific users or groups to reduce insider risk. Lessons include proactive, situational, and responsive education content.
Cloud storage and email service data connectors now available for Incydr Gov
Incydr Gov adds cloud storage and email service data connectors to give a comprehensive, holistic view of insider risk in your organization. Now, government agencies and their partners have a FedRAMP-approved, end-to-end solution that detects risky file activity anywhere it occurs.
New Incydr Flows
Incydr Flows are no-code automated integrations that add context and accelerate response to Insider Risk. Response and Context Flows make it easy to automate response controls that are in alignment with your risk tolerance.
New risk indicators identify anomalous exfiltration activity
Two new risk indicators, First use of destination and Rare use of destination, highlight infrequent use of cloud storage destinations, browser uploads, and Airdrop destinations. These risk indicators help you identify new and noteworthy behavior, enabling you to more easily prioritize which file activity may require additional investigation.
Improved File Upload Risk Detection
In addition to Incydr's existing list of user-defined trusted domains, trust is now also automatically inferred for any cloud data connections configured for monitoring by Code42, allowing you to better identify untrusted activity in cloud services that use the same domain for both personal and corporate accounts.
New Microsoft Office 365 Data Connector
This native connector monitors all file attachments included on a sent email. Incydr ingests the data exposure, detected by the O365 email data connector, and correlates it with additional file, exfiltration vector and user context to surface Insider Risk Indicators (IRIs).
Create and Manage
Creating custom alerts in Incydr will provide you with context to file, vector and user data risk quickly in order to help prioritize response. Alert rules allow you to determine when and how you are notified by Incydr.
Did you know you can implement trusted domains within Code42 Incydr to get better risk signal?
Using trusted domains preferences in Incydr, you can filter out the noise of harmless activity to better surface personal and untrusted file events. Trusted activity is still monitored should you need to review it, but it won't trigger unnecessary alerts. or show in dashboards.
Try Incydr Advanced in your own environment
Incydr Advanced risk detection lenses can help increase your ability to detect and respond when employees put valuable data at risk and leverages the same agent you have deployed today. We'll set you up with a real-world pilot of Incydr that will provide insights into where and how data is leaving your organization.