WHAT TO EXPECT
The Incydr™ Proof Of Value Experience
All you need to know about Incydr’s free trial
Thinking about starting a Proof of Value (POV) of Incydr? We make it quick and easy to get set up and see the ROI. Here’s what to expect.
Timeline
What to expect during the Incydr POV
Getting Started
Estimated time: 60 min
Your team members involved during kick-off include: Security Stakeholder, Desktop Deployment Engineer, Technical Decision Maker, Technical Sponsor
- POV experience overview
- Deploy agents to test machines
- Code42 team members involved during kick-off include: Account Executive (AE), Systems Engineer (SE), Professional Services Engineer
Test & Configure
Estimated time: 60-90 min
Your team members involved during Week 1 include: Technical Sponsor
- Deep-dive of Incydr detection, investigation & response capabilities
- Begin silent rollout
- Perform configurations, including trusted domains and alert rules
- Discussion: Watchlists, verify use cases
- Code42 team members involved during Week 1 include: Account Executive (AE), Systems Engineer (SE), Professional Services Engineer
Review Use Cases
Estimated time: 60-90 min
Your team members involved during Week 2 include: Technical Sponsor
- Complete silent rollout
- Operationalize Watchlists and cases
- Discussion: Refine trusted domains, validate use cases
- Code42 team members involved during Week 2 include: Account Executive (AE), Systems Engineer (SE), Professional Services Engineer
Discuss Preliminary Findings
Estimated time: 60-90 min
Your team members involved during Week 3 include: Technical Sponsor, Security Stakeholder
- Review Risk Detection findings
- Discussion: Current process and people pain points
- Code42 team members involved during Week 3 include: Account Executive (AE), Systems Engineer (SE)
Insider Risk Posture Review & Recommendations
Estimated time: 60 min
Your team members involved during Week 4 include: Technical Sponsor, Security Stakeholder, Technical Decision Maker, HR, Legal, IT
- Complete POV Experience
- Code42 to present Insider Risk Posture review and technical recommendations
- Code42 team members involved during Week 4 include: Account Executive (AE), Systems Engineer (SE), Code42 Executive
Frequently Asked Questions
Answers to all of your Incydr questions
Incydr Capabilities
Incydr monitors exfiltration events across cloud services such as Dropbox and Google Drive, removable media, Airdrop, browsers, Git, and other applications such as Salesforce and Slack.
Incydr alerts are completely customizable and oftentimes tailored to your specific needs. If you need assistance, please contact your Systems Engineer. Some common alerts include:
- Source Code Exfiltration
- Unsanctioned Cloud Exfiltration
- Compressed File Exfiltration
- Sensitive Keyword Exfiltration
Code42 offers workflow automation services to connect Incydr with your Human Resource Information System (HRIS). This integration will automatically populate Incydr Watchlists with the employees who meet the lens criteria. You can also manually add users to lenses by following these steps.
Incydr integrates with a range of tools such as Splunk, Okta, and Google Drive. We also have a robust and easy to use rest-based API for tools not in our ecosystem.
We are able to pull Department, Title, Manager, and Location from your Identity Management provider. To learn more, take a look at our support article on provisioning user attributes to Code42. Additionally, users can automatically be added to Watchlists based on information such as departure date through Incydr Flow automation with HR systems, PAM and IAM.
Incydr offers a variety of roles and permissions to ensure administrators only have access to what they need to do their jobs. For example, you can choose the administrators who should have access to various features (such as the Watchlists), and you can also control who is able to download and view file content from Forensic Search during an investigation. We recommend you assign roles and permissions based on your administration use cases. To find more information around the best role for your use case, please refer to this article. View this article for instructions on how to assign or remove a role.
Incydr can be installed on Windows, macOS and Linux using your desktop management software. Once installed, Incydr begins to silently monitor and collect files. For more information, take a look at our support article on how to prepare to deploy a Code42 app.
Although results vary based on the above, we typically see 0-4% CPU and approximately 50MB of memory usage when the agent is in its steady state. Check out our Incydr Agent FAQs to learn more.
Data Security
Check out our support article on Code42’s security architecture.
Take a look at our support article on how Code42 handles your subscription keys.
– Implementing an Insider Risk Management solution helps you comply with regulations governing who has access to what data — and when, where and how that data is exposed and/or exfiltrated. Here’s a document explaining how Incydr supports a variety of compliance standards.
– You can also rest assured that, as a company, Code42 utilizes industry standards and verification by independent auditors. We take a comprehensive approach to secure our products and solutions. Code42 maintains compliance certifications and attestations on our product and infrastructure to validate our robust security program. Additionally, Code42 ensures and monitors appropriate security assurance obligations. Learn more.
Best-in-class support for your team
Get real-time answers and fixes for the occasional hiccups from knowledgeable staff.
Contact us your way
Reach out by web ticket or chat to get the help you need, however you need.
Here for you, at HQ
Code42’s support team, the “Customer Champions,” is always ready to provide a great experience.
Videos
Can’t wait to see inside the product?
These how-to videos provide a sneak peak into the product features and how it
detects, investigates and responds to data exfiltration.
Incydr Full Feature Demo
How Incydr Prioritizes Data Risk
Detecting Departing Employee Data Exfiltration
Understanding Incydr’s Response Controls
“Incydr’s setup is very simple, without developing any policies in advance.”
“Our cooperation with Code42 was very easy and comfortable. The trial was initiated very quickly. The setup is very simple, without developing any policies in advance. You can really start right away.”
Read Our 5-star Reviews