Code42 Incydr and Mindflow have partnered to enable users to automate their incident management and better protect their information systems.
Incydr Overview
Code42 Incydr is a SaaS providing internal threat detection and response. To that end, it leverages an endpoint agent and API integrations.
The agent runs on Windows, Mac, and Linux operating systems. It is used to detect file events, defined as file creation, modification, deletion, or movement, that are not assimilated to trusted activity.
The agent labels these events as exposure events when files are transferred to untrusted environments. Such environments can be removable media devices, uploaded to browsers, or accessed by monitored installed applications. Your trusted environment can be defined with the help of Incydr Flows, where your teams combine the platform with your IAM and PAM solutions to create Watchlists for the agent to monitor.
The agent should detect an exposure event, and it would securely send details about these exposure events, such as file metadata and the file itself, to the Code42 cloud to be indexed and analyzed.
Once analyzed, the information is notified to your teams via the web console. This data is retained for 30 to 90 days.
The agent sends the file, vector, and user information on detected events to the Code42 cloud to power Incydr’s detection, investigation, and response capabilities.
Besides detection, the platform provides ways to remediate these events via Incydr API integrations and Incydr SOAR playbooks.
Benefits
Enterprise-wide: Agent deployed on every device
Data exposure detection: the agent monitors Watchlists to detect and analyze every suspicious file event in your environment
Web-browser console: where your teams can be notified and check reports generated by every alert
Access to exfiltrated files: files exposed are saved and added to reports for your teams to be able to assess the sensitivity of the data exposed
Integrations ready: a catalog of integrations and workflows to enable your teams to implement remediation processes faster
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.