Code42 IncydrMimecast
|
LeaksIDG-71
|
|||||
Related Products
|
||||||
About
Incydr gives you the visibility, context and control needed to stop data leak and IP theft. Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization, without the need for policies, proxies, or plugins. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices. Incydr prioritizes file activity based on 120+ contextual Incydr Risk Indicators (IRIs). This prioritization works on day 1 without any configuration. Incydr’s risk-scoring logic is use case-driven and transparent to administrators. Incydr uses Watchlists to programmatically protect data from employees who are most likely to leak or steal files, such as departing employees. Incydr delivers a complete range of technical and administrative response controls to support the full spectrum of insider events.
|
About
Protect most sensitive documents with an invisible fingerprint against being leaked in public during printing, taking snapshots or photos. Track leak source in no time. LeaksID is a cloud-based tool that is built upon a unique proprietary algorithm. It allows adding an invisible markup to document copy once you want to share it securely with third parties. If the print out, a snapshot or a photo of a confidential document ever disclosed in public, you'd be able to identify who exactly is responsible for it. You could never guess who leaked your personal documents or data, when sharing them with someone, especially if they are your closest friends or relatives. Even if you've set enough user permissions or use password-protected PDFs, someone could simply take a photo of your friend's screen while passing by. With LeaksID, you continue to work as before, while taking more control of the document workflow and being able to identify the leak source in minutes with high accuracy.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Enterprises and individuals in search of a solution to detect and respond to cyber threats and risks
|
Audience
For individuals that need an app to protect important documents from leakage
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationMimecast
Founded: 2003
United Kingdom
www.mimecast.com/products/code42-incydr/
|
Company InformationG-71
United States
leaksid.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
|||||
Integrations
Axonius
Box
Cortex XDR
CrowdStrike Container Security
Daylight
Exabeam
Google Drive
Jira
Microsoft 365
Microsoft OneDrive
|
Integrations
Axonius
Box
Cortex XDR
CrowdStrike Container Security
Daylight
Exabeam
Google Drive
Jira
Microsoft 365
Microsoft OneDrive
|
|||||
|
|
|