Protect your trade secrets from loss and leak

Monitor file activity to quickly detect and respond to data loss caused by insider threats.

USE CASE

123 Networks makes one of the top-rated shows on TV

It can’t afford to have the season finale leaked before its release date.

USE CASE

The production team must collaborate on large video files to complete the finale

Security adds the team members to an alert profile.

USE CASE

Security receives an alert 10 days before the episode release date

Chris just moved a large file to an external hard drive.

USE CASE

Security opens the file named S6_E23_0024f.mp4

A quick glance shows it’s a 43 minute video of the season finale.

USE CASE

Security sends Chris a legal notice

The letter requires the return of the hard drive, with the vendor name and exact serial number, and threatens legal action should the episode leak.

USE CASE

123 Networks makes one of the top-rated shows on TV

It can’t afford to have the season finale leaked before its release date.

The security team has Code42 installed on all computers to monitor users with privileged access.

USE CASE

The production team must collaborate on large video files to complete the finale

Security adds the team members to an alert profile.

Easily add users to an alert template. You can customize alerts based on type of activity (removable media, web browsers/apps, cloud sync applications or file sharing) as well as by file size and count.

USE CASE

Security receives an alert 10 days before the episode release date

Chris just moved a large file to an external hard drive.

Receive email alerts based on your chosen alert settings. See what activity took place, when, and by whom. Follow the link to investigate activities that triggered the alert.

USE CASE

Security opens the file named S6_E23_0024f.mp4

A quick glance shows it’s a 43 minute video of the season finale.

Easily access file contents to quickly assess risk and determine the best course of action.

USE CASE

Security sends Chris a legal notice

The letter requires the return of the hard drive, with the vendor name and exact serial number, and threatens legal action should the episode leak.

Code42 gives you the information you need to take fast action when data exfiltration is detected.

Frequently Asked Questions

Learn more about protecting high-value data

What activities can you detect?

Code42 Next-Gen DLP detects when users move files to removable media devices, web browsers, web applications and cloud sync folders, as well as when they share files externally via corporate OneDrive, Google Drive and Box environments. Learn more

How do I identify when employees take valuable data?

Customizable alerts can be set for near real-time notification of data exfiltration. Code42 also assigns categories to files in order to help you identify your most important data at a glance. Monitored categories include archive, audio, document, executable, image, PDF, presentation, script, source code, spreadsheet, video and virtual disk image. When you're alerted of risk, you can quickly access the file(s) in question to make an informed decision about whether it's acceptable for an employee to take.

What actions can I take if I detect data exfiltration?

Because insider threat includes a variety of scenarios, most security teams determine the appropriate course of action based on risk, intent and employee history. The first course of action is to protect the data by requiring files be returned or deleted. Other responses include escalating to management, taking disciplinary action through HR, or sending a legal notice to the employee.

Does Code42 use an endpoint agent?

Yes, Code42 uses a non-disruptive agent installed on Windows, Mac and Linux devices to monitor file activity as well as collect files and file metadata. Maximum CPU allowances can be set for when users are present and away from their devices. The agent can be hidden from users.

Detect and respond to data loss faster using:

Historical breadth
  • Monitor every time files are moved to removable media devices, web browsers/applications and cloud accounts, without the need for policies
  • Maintain 90 days of historical user activity to identify abnormalities and replay events during investigations
Forensic depth
  • Review detailed information on files, devices, cloud destinations and data exposure events
  • Identify trends and abnormalities in data movement using dashboards for common exfiltration vectors
File Access
  • Access file contents to determine their sensitivity and value
  • Restore files that have been deleted by employees
ABOUT THE PRODUCT

Integrations

Code42 integrates with top technologies to help correlate data risks, deliver actionable insights and improve the efficiency and effectiveness of customer workflows. Learn more

Logos of companies that integrate with Code42.

When to Use Code42

Odds are you're experiencing an insider threat right now. Here are the most common times when employees put data at risk:

Join more than 50,000 organizations using Code42

Get faster detection and response to data loss caused by insider threats.