Detect risk to high value data

Keep it safe, keep it secret

Start 60-day trial

High-Value Data Leak Use Case

USE CASE

A popular TV Network takes precautionary measures to ensure their season finale is not compromised prior to the unveiling. The storyline below shows how IncydrTM can help detect sensitive data leaving your organization.

USE CASE

123 Networks makes one of the top-rated shows on TV

It can’t afford to have the season finale leaked before its release date.

USE CASE

The production team must collaborate on large video files to complete the finale

Security adds the team members to an alert profile.

USE CASE

Security receives an alert 10 days before the episode release date

Chris just moved a large file to an external hard drive.

USE CASE

Security opens the file named S6_E23_0024f.mp4

A quick glance shows it’s a 43 minute video of the season finale.

USE CASE

Security sends Chris a legal notice

The letter requires the return of the hard drive, with the vendor name and exact serial number, and threatens legal action should the episode leak.

USE CASE

A popular TV Network takes precautionary measures to ensure their season finale is not compromised prior to the unveiling. The storyline below shows how IncydrTM can help detect sensitive data leaving your organization.

USE CASE

123 Networks makes one of the top-rated shows on TV

It can’t afford to have the season finale leaked before its release date.

The security team has Incydr installed on all computers to monitor users with privileged access.

USE CASE

The production team must collaborate on large video files to complete the finale

Security adds the team members to an alert profile.

Easily add users to an alert template. You can customize alerts based on type of activity (removable media, web browsers/apps, cloud sync applications or file sharing) as well as by file size and count.

USE CASE

Security receives an alert 10 days before the episode release date

Chris just moved a large file to an external hard drive.

Receive email alerts based on your chosen alert settings. See what activity took place, when, and by whom. Follow the link to investigate activities that triggered the alert.

USE CASE

Security opens the file named S6_E23_0024f.mp4

A quick glance shows it’s a 43 minute video of the season finale.

Easily access file contents to quickly assess risk and determine the best course of action.

USE CASE

Security sends Chris a legal notice

The letter requires the return of the hard drive, with the vendor name and exact serial number, and threatens legal action should the episode leak.

Incydr gives you the information you need to take fast action when data exfiltration is detected.

Frequently Asked Questions

Learn more about protecting high-value data

What activities can you detect?

Incydr detects when users move files to removable media devices, web browsers, web applications and cloud sync folders, as well as when they share files externally via corporate OneDrive, Google Drive and Box environments. Learn more

How do I identify when employees take valuable data?

Customizable alerts can be set for near real-time notification of data exfiltration. Incydr also assigns categories to files in order to help you identify your most important data at a glance. Monitored categories include archive, audio, document, executable, image, PDF, presentation, script, source code, spreadsheet, video and virtual disk image. When you're alerted of risk, you can quickly access the file(s) in question to make an informed decision about whether it's acceptable for an employee to take.

What actions can I take if I detect data exfiltration?

Because insider threat includes a variety of scenarios, most security teams determine the appropriate course of action based on risk, intent and employee history. The first course of action is to protect the data by requiring files be returned or deleted. Other responses include escalating to management, taking disciplinary action through HR, or sending a legal notice to the employee.

Does Incydr use an endpoint agent?

Yes, Incydr uses a non-disruptive agent installed on Windows, Mac and Linux devices to monitor file activity as well as collect files and file metadata. Maximum CPU allowances can be set for when users are present and away from their devices. The agent can be hidden from users.

How Incydr Helps Manage Risk of Data Leak:

Gain visibility
  • Easily identify all users in an organization who have access to high-value files
  • Detect when critical project files are shared with unsanctioned domains
Detect risk
  • Detect USB, cloud sync apps, web uploads, file sharing and email attachments
  • Configure alerts based on user, vector type or file size, count or category
Investigate quickly
  • Identify relevant user attributes including title, department, manager and location
  • Quickly access file contents to assess risk of exposure
ABOUT THE PRODUCT

Integrations

Incydr integrates with top technologies to help correlate data risks, deliver actionable insights and improve the efficiency and effectiveness of customer workflows.

Learn more right arrow icon

When to Use Incydr

Odds are you're experiencing an insider threat right now. Here are the most common times when employees put data at risk:

Join more than 50,000 organizations using Code42

Get faster detection and response to data loss caused by insider threats.
Contact Sales