Incident Response Officer at a educational organization with 1,001-5,000 employees
Real User
Top 20
2023-03-23T18:11:00Z
Mar 23, 2023
If you come with the perception that this solution uses the same policies that are used in traditional DLP products, you might find Code42 doesn't work for you. You have to adapt to their philosophy, which is a more open-ended solution. If you're looking at getting granular about a particular type of data, it becomes harder to put custom variables in there. Code42 is more open-ended and identifies or discovers data that is going out rather than having someone build a policy to filter for it. If you're willing to look at DLP and data leakage from a different perspective then I'd go with 42. I rate this solution eight out of 10.
Director, Cybersecurity Consulting at a tech services company with 51-200 employees
Real User
2022-06-16T18:52:10Z
Jun 16, 2022
The very first thing you should do is make sure that you know exactly what you're looking for. There's a whole bunch of stuff out there. Data loss prevention or data loss protection is a big category. It can cover a lot of ground, but you have to make sure that you know what you want, and you have to prioritize that list. We call it a value-based prioritized roadmap. You have to know what you want and what's critical for you at that point in time. Don't try and do everything all at once. Give yourself the top three things that you want to accomplish within a certain timeframe and work toward those. Spend your time on those. Don't get off track because it is easy to get off track with new features and all that. You should just stick to the plan and work it through. So, definitely make sure that you have a priority list of what functionality and what services you're actually interested in. I would rate it a solid ten out of ten. We've been very happy with it. It covers a lot of space and is very scalable. They have good people to work with. It is a little pricey, but you get what you pay for. We find it a pretty straightforward application to work with. We've been able to leverage it to help improve our policies. It is a good tool.
We're just a customer. We don't have a business relationship with the product. I'm not sure as to which version of the solution we're using at this time. It's just an all-around good product to have in your organization. The product works best for smaller companies. However, larger ones may be able to benefit as well. On a scale from one to ten, I'd rate this solution at a perfect ten. We've been very happy with it and it hasn't given us any problems.
Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization – without the need for policies, proxies or plugins. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices.
Incydr prioritizes file activity based on 120+ contextual Incydr Risk Indicators (IRIs). This...
If you come with the perception that this solution uses the same policies that are used in traditional DLP products, you might find Code42 doesn't work for you. You have to adapt to their philosophy, which is a more open-ended solution. If you're looking at getting granular about a particular type of data, it becomes harder to put custom variables in there. Code42 is more open-ended and identifies or discovers data that is going out rather than having someone build a policy to filter for it. If you're willing to look at DLP and data leakage from a different perspective then I'd go with 42. I rate this solution eight out of 10.
The very first thing you should do is make sure that you know exactly what you're looking for. There's a whole bunch of stuff out there. Data loss prevention or data loss protection is a big category. It can cover a lot of ground, but you have to make sure that you know what you want, and you have to prioritize that list. We call it a value-based prioritized roadmap. You have to know what you want and what's critical for you at that point in time. Don't try and do everything all at once. Give yourself the top three things that you want to accomplish within a certain timeframe and work toward those. Spend your time on those. Don't get off track because it is easy to get off track with new features and all that. You should just stick to the plan and work it through. So, definitely make sure that you have a priority list of what functionality and what services you're actually interested in. I would rate it a solid ten out of ten. We've been very happy with it. It covers a lot of space and is very scalable. They have good people to work with. It is a little pricey, but you get what you pay for. We find it a pretty straightforward application to work with. We've been able to leverage it to help improve our policies. It is a good tool.
We're just a customer. We don't have a business relationship with the product. I'm not sure as to which version of the solution we're using at this time. It's just an all-around good product to have in your organization. The product works best for smaller companies. However, larger ones may be able to benefit as well. On a scale from one to ten, I'd rate this solution at a perfect ten. We've been very happy with it and it hasn't given us any problems.