TechNOLOGY INtegration
Incydr™ + Abnormal Security
See, prioritize, and prevent exfiltration activity from potentially compromised users
Type
Integration
Category
Email Security
Data Directionality
Into Incydr
Supported By
Code42
How the integration works
Incydr receives lists of both VIP and non-VIP employees who have experienced email attacks. These employees, detected by Abnormal, are regularly and automatically sent to Code42 Incydr and added to Watchlists. Once added to a Watchlist, you can apply preventative controls, which allows for heightened monitoring and controls to be put in place in the event data exfiltration later occurs from these potentially compromised users.
Key features
- Watchlist management: Add users to Incydr Watchlists to monitor email attack recipients identified by Abnormal
- Exfiltration detection: Seamlessly manage VIP and non-VIP user groups to gain visibility into email, endpoint, and cloud exfiltration events for potentially compromised users
- Leverage full range of controls: Take preventative and corrective action on detected activities using the full range of Incydr’s response controls
Benefits of the integration
Streamlined user management
Ensure frequently attacked users are always monitored through Incydr’s Watchlists
Fast response and remediation
Leverage automated response controls to prevent data leak and theft as well as correct user behavior
Secure collaboration
Ensure users can work productively without putting data at risk
Additional resources
- Solution Brief: Code42 Incydr + Abnormal Security
- How Incydr™ Works: A Technical Overview of the Incydr Product Architecture
- Incydr Demo In Under 4 Minutes
Data SECURITY ASSESSMENT