Code42 Incydr Automates File Source Labeling to Elevate Events Involving Sensitive Business Data
Code42, the Insider Risk Management (IRM) leader, announced it has enhanced its Incydr Risk Indicators (IRIs) within the Code42 Incydr product to detect and label file downloads from corporate systems. By understanding the source system from which a file came, security analysts can better prioritize what data exfiltration presents the most risk to their organization. For example, if an employee were to download a customer list from their employer’s CRM (like Salesforce) and upload it to a personal email account (like Gmail), Incydr would detect the movement and flag the customer list as a CRM document exfiltration. Given the employer’s identification of Salesforce-originated downloads as sensitive data, Incydr gives the security team the context they need to act fast to protect the organization.
Latest Aithority Insights : Adobe Target Announces New AI-enriched Enhancements for Multi-channel Personalization
“That’s why this enhancement to Incydr is exciting. Now, Incydr better prioritizes data risk events by understanding the value of files based on their source. This increases the likelihood security teams investigate events that are truly risky for the organization, without burdening them with file classification projects.”
Incydr is an Insider Risk Management solution that provides the visibility, context and controls needed to stop data leak and IP theft. Organizations utilize Incydr to detect and respond to data exposure and exfiltration from corporate computers, cloud and email systems. It deploys in hours so security teams can address material risk to the business in a matter of days and drive the secure work habits needed to decrease how often employees put data at risk in the future.
While traditional methods of data classification require manual, time-consuming inventory or tagging processes, Incydr provides a more efficient way to classify data by automatically elevating risk scores for data exposure events related to files acquired from high-value systems. Today, high-value sources include systems such as business intelligence tools, cloud storage, source code repositories, coding tools, marketing tools, contract management, CRM tools, messaging applications, HR tools, productivity tools and financial services applications.
“When people inside your organization – people who are trusted with your source code, IP, personnel information and product plans – expose your valued data, security teams want to mitigate the loss as quickly as possible. Technology needs to do the heavy lifting to identify risk severity so security can be efficient and effective in their response,” said Dave Capuano, senior vice president, product management at Code42. “That’s why this enhancement to Incydr is exciting. Now, Incydr better prioritizes data risk events by understanding the value of files based on their source. This increases the likelihood security teams investigate events that are truly risky for the organization, without burdening them with file classification projects.”
Summary of benefits:
- Gain visibility and control of files being downloaded from high-value locations.
- Protect and classify your most sensitive data without having to tag or inventory data.
- Detect and respond to file exfiltration involving your most sensitive and business-critical data.
Learn more about Code42’s Insider Risk Management Offering
Code42 Instructor: Education-Led Insider Risk Response
Instructor™ improves Insider Risk awareness by focusing on the creation of holistic, security-oriented cultures. The solution delivers actionable, hyper-targeted and bite-sized lessons to end-users when they’re needed most, helping to change security behavior for the long term. The Instructor solution helps organizations rapidly mature their Insider Risk Management programs by incorporating data-driven Insider Risk behavioral guidance for end-users.
Combining the Power of Incydr and Instructor
Instructor works in tandem with Incydr, allowing security, compliance and education teams to immediately send corrective lessons triggered by employee actions that create risk for the business. For example, when Incydr flags file movement to an untrusted location, like an unauthorized cloud application, an Instructor video specifically explaining the correct activity is sent to educate the employee in real-time through the Incydr solution.
Code42 Services: Measure, Manage, Mitigate
We believe IRM technology is simpler and faster to deploy than other technologies, such as DLP and CASB, but it does require a strategy and mindset shift. Insider Risk Management isn’t only about data – it’s about a company’s employees and culture. Code42 IRM Services are designed to help organizations establish an efficient and effective IRM program rooted in transparency, training and technology. Code42’s services take a collaborative approach to helping organizations develop, operationalize, and mature an end-to-end IRM program.
WEB3 Gaming and NFT News : P2E.Game: The One-Stop Portal for WEB3 Gaming and NFT
[To share your insights with us, please write to firstname.lastname@example.org]