CIO Influence
CIO Influence News SaaS Security

Code42 Enhances Source Code Exfiltration Detection

Code42 Enhances Source Code Exfiltration Detection

Provides full visibility & prevents critical business intellectual property from leaving the organization

Code42 Software, the Insider Risk Management (IRM) leader, announced it has enhanced the Code42 Incydr data protection solution to identify both sources and destinations of source code to accurately detect exfiltration – ensuring security teams have full visibility into source code movement.

Read More About CIO InterviewCIO Influence Interview with Joe Ramieri, VP of North America at Instabase

“For many companies – especially in technology and life sciences – source code is the single most valuable IP. Yet, security teams face a daunting task in ensuring it doesn’t end up in the wrong hands”

Across industries, source code is ranked as one of the top three most important data types to protect. However, traditional data protection tools cannot track where source code is being exfiltrated from or where it’s moving to. This lack of visibility makes it difficult for organizations to identify whether the source code is open source or proprietary, or if insiders are moving it to untrusted repositories. Consequently, 87% of companies say more visibility is needed to protect source code from exfiltration.

“For many companies – especially in technology and life sciences – source code is the single most valuable IP. Yet, security teams face a daunting task in ensuring it doesn’t end up in the wrong hands,” said Joe Payne, CEO of Code42. “Incydr is the only data protection solution that monitors Git commands to properly identify the sources and destinations of source code as it’s moved. Given the high cost of data loss, this heightened level of detection could make a difference of millions of dollars on an organization’s bottom line.”

Latest CIO  Interview: CIO Influence Interview with Shirley Salzman, CEO and Co-Founder at SeeMetrics

In addition to detecting sources and destinations of proprietary source code movement, Incydr helps security teams quickly identify and remediate Insider Risk events. To save time and resources, organizations can establish untrusted and trusted repositories so that analysts are alerted only to suspicious movements of source code. Incydr can also deliver micro-trainings tailored to employees or contractors who are engaging in accidental but risky behaviors. These features enable security teams to safeguard their critical data.

Code42 Incydr data protection allows security teams to easily adjust their response to alerts by training users, containing threats, or blocking unacceptable user activity. With Incydr data protection, customers can automatically send tailored micro-trainings to correct employee mistakes in real-time, contain insider threats, and speed investigations via integrated controls with EDR and IAM products, case management, and access to file contents. This helps organizations drive down data loss, leak, and theft while also protecting their intellectual property and customer data.

Browse The Complete Interview About CIO : CIO Influence Interview with Michael Berthold, CEO at KNIME

 [To share your insights with us, please write to sghosh@martechseries.com] 

Related posts

SYSTECH Showcased CAREU UW1, UA1 Trackers and Intelli FleetWeb Software

Japan’s University of Hyogo Selects Hewlett Packard Enterprise to Build New Supercomputer to Tackle AI in Research Across Meteorology

CIO Influence News Desk

infodas Receives NITES Certification from the Cyber Security Agency of Singapore