
Overview
Incydr allows you to see and stop data leak and theft across endpoints, browsers and cloud. It prioritizes the highest risk employee activity using over 250 contextual Incydr Risk Indicators. Incydr offers a full range of response controls to educate, contain, or block users based on the offender and offense. With Incydr, organizations gain control over data leak and theft while driving secure work habits among employees to decrease risk to data in the future.
Get the visibility, context and controls needed to:
Detect data theft on day 1: Protect your source code, intellectual property, and other sensitive data. Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization without the need for policies or proxies. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices.
Tailor your response to the offender and offense: Take action with appropriate response controls to communicate, correct, block, and contain detected risk. Leverage Code42 Instructor to correct employees when data is shared inappropriately in order to prevent risky activity from becoming the norm. Block unacceptable activity in real time for your highest risk users. Integrate with your tech stack to quickly contain insider threats while security investigates.
Ally the business with security: Seamlessly integrate with cross functional systems such as messaging, HCM and ITMS systems. Incydr does not impact end user productivity so employees complain less about security getting in the way of work, and security teams can focus their time on bigger data risks.
To learn more about Incydr, visit www.code42.com/incydr/Â
For information on Incydr's pricing dimensions as listed below, visit https://www.code42.com/incydr-plans/Â
Contact us at https://www.code42.com/contact-sales-aws/Â
Customer story: Hear how Lyft uses Incydr to take the blinders off of high value data movement: https://www.code42.com/case-studies/lyft/Â
Over 65 Gartner Peer Reviews and a nearly 5 star rating: https://www.gartner.com/reviews/market/insider-risk-management-solutions/vendor/code42Â
Read the Gartner 2023 Market Guide for Data Loss Prevention Solutions: https://www.code42.com/resources/external-reports/market-guide-for-data-loss-prevention-2023Â
Our product is sold as a Private Offer through one of our Consulting Partners. To request a Private Offer, please Contact us at: https://www.code42.com/contact-sales-aws/ or email us at aws-marketplace@code42.com .
Highlights
- Cross platform endpoint agent: Windows, Mac, Linux to detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. 0 to 4% CPU, up to 100MB memory.
- API-based Exfiltration Detectors to monitor corporate cloud storage, email and business applications, including OneDrive, Google Drive, Box, Office 365 Email, Gmail and Salesforce.
- Integrations with SIEM, SOAR, EDR, IAM, PAM and more, plus open API and developer resources.
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Description | Cost/12 months |
---|---|---|
Horizon | Our most comprehensive plan, Premier plus support + Instructor | $1,000,000.00 |
Professional | Our most basic plan, includes 1 Cloud storage service and Base API | $1,000,000.00 |
Enterprise | Mid Level package, Includes premier support, full API access, and more | $1,000,000.00 |
Private Offer | Please contact us to request a Private Offer for accurate pricing. | $1,000,000.00 |
Vendor refund policy
Please See our website for more details on our refund policy www.code42.comÂ
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Support
Vendor support
Incydr Detailed product documentation on our self-service support site is available for help deploying, administering, and managing Incydr. Code42 Incydr Technical Support offers help in the way you need it: by web ticket, chat, or phone. Support Engineers are available 24/7 for urgent priority issues, and are based in US offices. https://support.code42.com/hc/en-usÂ
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.


Standard contract
Customer reviews
Great customization features with ability to set risk levels
What is our primary use case?
Data Leakage Protection on large scale environments. This can be to protect against leakage on endpoints and servers that consist of highly classified or propriety information. It can be added on as a control that integrates into the various egress solutions in the organization. As part of projects for general DLP I have used data classification to identify such silos and create identifiers or use predefined structured and unstructured data that flows through the environment. The most effective way to apply these controls is at tge point the data is accessed between differant parts of the organization.
How has it helped my organization?
Code42 allows you to create a policy using risk levels calculated on the basis of employees' behavior. It also provides the ability to customize the information for other solutions for automation. There are a large number of integrations with other solutions with a fully customizable API.Â
What is most valuable?
Code42 has a very extensive risk-scoring system. It has a default set of risk scores out of the box but gives the user more control over them by allowing you to set custom values. There are other products in the market that also do that but have limited features and divert their focus toward a larger number of search parameters. The advantage you would have with Code42 is that their solution allows for the risk factors to be customized further down to granular details. Yet another feature is that the solution has a small footprint on resources.Â
What needs improvement?
The solution has been designed for a different approach than the one followed by other DLP solutions in the market. Most of us who come from the mindset of filtering out incidents using a content-specific approach may find this solution limited. The next updates for the solution may benefit from using some of the features provided by older solutions in the market to allow for a deep dive. There is limited support for data at rest.
For how long have I used the solution?
We've been using this solution for a few years.
What do I think about the stability of the solution?
I haven't had any issues with stability.Â
How are customer service and support?
We have frequent contact with customer support. They have an instructor module that provides videos and an information package for users.
How was the initial setup?
Code42 has a relatively simple deployment with an all-in-one sort of feel. It's simpler than deploying a lot of the three-tier solutions in the market.Â
What other advice do I have?
If you come with the perception that this solution uses the same policies that are used in traditional DLP products, you might find Code42 doesn't work for you. You have to adapt to their philosophy, which is a more open-ended solution. If you're looking at getting granular about a particular type of data, it becomes harder to put custom variables in there.
Code42 is more open-ended and identifies or discovers data that is going out rather than having someone build a policy to filter for it. If you're willing to look at DLP and data leakage from a different perspective then I'd go with 42.Â
I rate this solution eight out of 10.