Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Code42 Unveils Incydr: Detection and Response for Insider Threats

After forging a strategic partnership with Exabeam,  Code42 has announced the Code42 Incydr product, a new SaaS offering that protects organizations’ intellectual property, source code and trade secrets.

The SaaS solution is built to mitigate exposure from data exfiltration and directly addresses the gaps in security solutions for insider threats, the cause of 66% of breaches.

How big are the risks of “Insider Threat” in today’s world?

There are numerous sources of insider threat risks. The most common threats arise from Foreign intelligence used by your competitors who try to sabotage opportunities by denting your IT and Cloud security measures when you are least expecting it.

According to KPMG, insider threat risks are also witnessed as a blatant attack by ex-employees or laid off workforce who are either disgruntled with the management or are part of a larger group of social activists looking to avenge their firing.

Surfaces Data Exposure Trends

Telemetry data generated by Incydr between July 1 and August 31 reveals:

●  On average, a typical employee causes 20 file exposure events per day.

●  Nearly half (45%) of all file exposure events detected involve business files or source code, which are the most likely data types to trigger a high-value data leak incident.

●  Data exfiltration is not limited to the traditional work week. More than one-third of weekend file exposure events happened via removable media, a surprising – and suspicious – choice of vector for employees working from home.

Insider threat management frameworks have undergone a massive transformation in the last 6 months, largely due to the financial conditions around the world.

The business world has been redefined in 2020 as entire workforces are now widely distributed, and traditional network perimeters have further dissolved. The use of collaboration technologies has exploded to facilitate worker productivity and innovation. These transformative market forces have introduced pervasive and growing risks to corporate IP – the lifeblood of many organizations – with traditional security solutions often unable to prevent it from falling into the wrong hands.

Insider Threat is Ubiquitous 

“Insider risk is an inescapable, growing problem that has been underestimated, underfunded and under the radar for too long,” said Code42 President and CEO Joe Payne.

Related Posts
1 of 26,959

Joe added, “The pandemic and its impact on workforce collaboration is a catalyst for security teams to rethink how they address data protection without compromising collaboration. Incydr prioritizes risks to data and provides fast and easy event investigation and response capabilities while paving a new path for companies to protect their trade secrets.”

Recommended AI News: Welltok Adds Two COVID-19 Testing and Screening Companies to Connect Partner Ecosystem

“For me, it’s about actionable intelligence. With the insights that Incydr provides, we are able to quickly and easily determine what is normal behavior and what is an indicator of insider risk,” said Dustin Fritz, senior security architect at UserTesting, a leading provider of on-demand human insights.

Dustin added, “We need to be able to trust our employees, but we also need to be able to have visibility into risky data behavior so we can inform, engage and educate, and, where necessary, be able to detect and respond to actual risks before they become an incident.”

End-to-End Insider Protection, From Monitoring to Response

Incydr delivers the detailed intelligence security teams need to identify and act on the greatest risks to their data. Unlike conventional DLP, CASB and UEBA tools that take singular views of risk, Incydr correlates rich context across three dimensions – files, vectors and users – to speed insider threat response.

Incydr features built-in case management functionality so security teams can efficiently compile, document and disseminate investigation details for formal insider risk incidents. With proper context on hand, organizations can remediate incidents through automated action, corrective conversation, additional training or litigation.

Recommended AI News: Cloud Equity Group Announces Portfolio Company Add-On Acquisition

Additional features of Incydr:

●  Delivers comprehensive visibility across computers, cloud and email: Is informed by direct integrations with corporate cloud and email services and an endpoint agent that continuously observes all on- and off-network employee file activity taking place on Mac, Windows and Linux endpoint devices, regardless of what is considered acceptable by security policy.

●  Differentiates between trusted and untrusted file activity: Surfaces file events happening across a variety of vectors, such as email, Dropbox, iCloud, USB, browser uploads, Slack and Airdrop. Filters out the noise of file movement to trusted vectors to surface only concerning activity.

●  Delivers high-fidelity risk signal: Prioritizes the file events that represent the most risk to data and warrant deeper investigation by security teams, such as file movement that takes place outside an employee’s normal work hours.

●  Provides efficient workflows to protect vulnerable data: Offers prescriptive workflows to quickly detect and respond when data is most vulnerable to threat, including during employee offboarding or remote work. Delivers company-wide visibility to identify gaps in security awareness, uncover shadow IT, and validate the efficacy of other security technologies.

●  Offers fast time to value: Deploys in as little as 48 hours and positively impacts an organization’s security posture within two weeks.

Recommended AI News: Umbraco Simplifies Website Creation and Content Management for Non-Developers

Leave A Reply

Your email address will not be published.