How To Get Started
Step-by-step instructions for getting started with your Salesforce Exfiltration Detector. This video will cover key details and how to configure Salesforce and authorize the detector.
Watch Video
Your go-to resource center for everything you need to get started using the Salesforce Exfiltration Detector for Incydr.
Step-by-step instructions for getting started with your Salesforce Exfiltration Detector. This video will cover key details and how to configure Salesforce and authorize the detector.
Watch Video
Make sure you have all of the necessary configurations set up within your Salesforce environment in order to connect to Code42.
Go To Support Article
Watch Demo
Read Article
Protect confidential data like customer lists, sales performance forecasts, and pricing information by detecting and alerting when reports are downloaded from Salesforce to unmanaged devices.
See How It Works
Transparency – it is core to our approach to Insider Risk Management, so we felt it’s our responsibility to be transparent and share our own Insider Risk story and what we learned. 3 takeaways in...
Read Article
Automatically remove a user's access to specified corporate applications on trusted, non-trusted or mobile devices, in response to critical events.
Learn More
How can security teams tell the difference between files moving to their corporate account and files moving to a personal one when it involves the same application? Incydr's Trust methodology.
Read Product Overview
This technical white paper outlines the range of responses that Incydr enables and best practices for when to take which response.
Read White Paper
Ensure response actions are right-sized to the severity of every event.
Learn More