Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • SOCRadar Extended Threat Intelligence Reviews & Ratings
    90 Ratings
    Company Website
  • Curtain LogTrace File Activity Monitoring Reviews & Ratings
    4 Ratings
    Company Website
  • Jscrambler Reviews & Ratings
    33 Ratings
    Company Website
  • Curtain MonGuard Screen Watermark Reviews & Ratings
    7 Ratings
    Company Website
  • LogicalDOC Reviews & Ratings
    124 Ratings
    Company Website
  • Safetica Reviews & Ratings
    401 Ratings
    Company Website
  • UnForm Reviews & Ratings
    18 Ratings
    Company Website
  • Interfacing Integrated Management System (IMS) Reviews & Ratings
    71 Ratings
    Company Website
  • isoTracker Quality Management Reviews & Ratings
    16 Ratings
    Company Website
  • SBS Quality Management Software Reviews & Ratings
    7 Ratings
    Company Website

What is LeaksID?

Protect your most sensitive documents with an undetectable fingerprint to thwart unauthorized access during printing or photography. This groundbreaking method facilitates quick identification of where the leak originated. LeaksID is a cloud-based service that utilizes a unique algorithm to incorporate an unseen marker into documents when securely sharing them with external entities. If a printout or photo of a confidential document is made public, you will be able to identify the individual accountable for the leak. Determining the source of a leak can be challenging, especially when sharing with trusted friends or family members. Even with rigorous user permissions or password-secured files, there is always the risk that someone might take a snapshot of your screen inadvertently. With LeaksID, you can seamlessly continue your regular workflow while improving your document oversight, allowing for precise leak detection within minutes. This enhanced level of oversight delivers reassurance, ensuring your delicate information is significantly more safeguarded against possible breaches, while also allowing for a more proactive approach to information security.

What is Code42 Incydr?

Incydr delivers crucial insights, context, and governance to effectively avert data breaches and protect intellectual property. It facilitates the identification of file exfiltration across a variety of platforms, such as web browsers, USB devices, cloud services, email, file sharing links, Airdrop, and beyond. You can monitor the movement and sharing of files within your organization without the need for specific policies, proxies, or extra plugins. Incydr automatically identifies when files leave your protected environment, making it simple to detect cases where files are transmitted to personal accounts or unregulated devices. The system evaluates file activities using over 120 specific Incydr Risk Indicators (IRIs), guaranteeing that this essential prioritization is functional from the outset without requiring any preliminary configuration. Its risk assessment approach is tailored to various use cases and provides clarity to administrators, helping them comprehend the reasoning behind each risk evaluation. Furthermore, Incydr utilizes Watchlists to actively defend data against employees who may pose a higher risk of leaking or misappropriating files, particularly those nearing departure from the organization. This multifaceted strategy empowers organizations with a robust set of technical and administrative measures to effectively combat the spectrum of insider threats and incidents. Ultimately, Incydr's comprehensive framework ensures that your organization's sensitive information remains protected in an ever-evolving digital environment, adapting to new threats as they arise.

Media

Media

Integrations Supported

Axonius
BambooHR
Code42
CrowdStrike Container Security
CyberArk Endpoint Privilege Manager
Daylight
Gmail
Google Drive
Jira
LogRhythm SIEM
Microsoft 365
Microsoft Teams
Okta
Ping Identity
ServiceNow
Slack
Splunk SOAR
Tines
Workday Extend

Integrations Supported

Axonius
BambooHR
Code42
CrowdStrike Container Security
CyberArk Endpoint Privilege Manager
Daylight
Gmail
Google Drive
Jira
LogRhythm SIEM
Microsoft 365
Microsoft Teams
Okta
Ping Identity
ServiceNow
Slack
Splunk SOAR
Tines
Workday Extend

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

G-71

Company Location

United States

Company Website

leaksid.com

Company Facts

Organization Name

Mimecast

Date Founded

2003

Company Location

United Kingdom

Company Website

www.mimecast.com/products/code42-incydr/

Categories and Features

Document Control

Archiving & Retention
Automated Routing
Change Management
Compliance Management
Electronic Signature
Escalation Management
Periodic Review
Version Control

Popular Alternatives

Imatag Reviews & Ratings

Imatag

IMATAG

Popular Alternatives

Cogility Cogynt Reviews & Ratings

Cogility Cogynt

Cogility Software
Code42 Incydr Reviews & Ratings

Code42 Incydr

Mimecast