Code42 (acquired by Mimecast)
Code42 (acquired by Mimecast)
  • 83
  • 16 312
Source Code Unsafe Sharing
A responsive video for when a developer uses an unapproved repository.
zhlédnutí: 50

Video

Using Instructor as a Response Control
zhlédnutí 30Před 5 měsíci
Using Instructor as a Response Control
Incydr Full Feature Demo
zhlédnutí 353Před 8 měsíci
Incydr Full Feature Demo
Protect Data Without Slowing Collaboration
zhlédnutí 578Před rokem
Your team is moving fast, but your data should stay secure. Code42 lets you see what files are leaving when - so your company's customer lists, strategic plans and IP stay safe.
Correct Risky Behavior from New Hires
zhlédnutí 41Před rokem
Code42 lets you see where and how employees are moving files - even if it's to their personal cloud - and correct risky behavior.
Common Data Security Mistakes to Avoid
zhlédnutí 48Před rokem
Common Data Security Mistakes to Avoid
How does Code42 help companies comply with security compliance requirements?
zhlédnutí 128Před rokem
How does Code42 help companies comply with security compliance requirements?
What is most challenging in measuring Insider Risk?
zhlédnutí 55Před rokem
What is most challenging in measuring Insider Risk?
Has education and awareness saved remediation cycles for the Insider Risk Management team?
zhlédnutí 23Před rokem
Has education and awareness saved remediation cycles for the Insider Risk Management team?
How has implementing Code42 Instructor helped lower risk within our organization?
zhlédnutí 32Před rokem
How has implementing Code42 Instructor helped lower risk within our organization?
What behaviors has Code42 Instructor changed within our organization?
zhlédnutí 22Před rokem
What behaviors has Code42 Instructor changed within our organization?
How is an Insider Risk investigation different from an external threat investigation?
zhlédnutí 47Před rokem
How is an Insider Risk investigation different from an external threat investigation?
How frequently are we reporting results to leadership?
zhlédnutí 20Před rokem
How frequently are we reporting results to leadership?
How do we define maturity in our Insider Risk Management program?
zhlédnutí 23Před rokem
How do we define maturity in our Insider Risk Management program?
What metrics are most important to GRC members?
zhlédnutí 60Před rokem
What metrics are most important to GRC members?
How does Code42 Incydr help measure Insider Risk?
zhlédnutí 109Před rokem
How does Code42 Incydr help measure Insider Risk?
What sort of workflows have we taken advantage of?
zhlédnutí 26Před 2 lety
What sort of workflows have we taken advantage of?
What is the most useful feature of Code42 Incydr and why?
zhlédnutí 369Před 2 lety
What is the most useful feature of Code42 Incydr and why?
Do we take advantage of any of the other watchlists?
zhlédnutí 22Před 2 lety
Do we take advantage of any of the other watchlists?
How do we manage new hire and departing employee watchlists?
zhlédnutí 32Před 2 lety
How do we manage new hire and departing employee watchlists?
How much tuning of Insider Risk Indicators (IRIs) have you had to do?
zhlédnutí 38Před 2 lety
How much tuning of Insider Risk Indicators (IRIs) have you had to do?
How much of your day is spent doing investigations?
zhlédnutí 36Před 2 lety
How much of your day is spent doing investigations?
What sort of barriers have you faced with implementation?
zhlédnutí 99Před 2 lety
What sort of barriers have you faced with implementation?
How has the Insider Risk Management Program at Code42 evolved since we started?
zhlédnutí 43Před 2 lety
How has the Insider Risk Management Program at Code42 evolved since we started?
Of all investigations, what percentage result in punitive actions?
zhlédnutí 57Před 2 lety
Of all investigations, what percentage result in punitive actions?
When performing an investigation, what are the top 3 areas you consistently look at in the console?
zhlédnutí 77Před 2 lety
When performing an investigation, what are the top 3 areas you consistently look at in the console?
Of all Insider Risk investigations, what percentage is made up of infiltration / exfiltration?
zhlédnutí 74Před 2 lety
Of all Insider Risk investigations, what percentage is made up of infiltration / exfiltration?
What triggers an Insider Risk Investigation?
zhlédnutí 177Před 2 lety
What triggers an Insider Risk Investigation?
Joe Payne at RSAC22 - Protect Valuable Data as Employee Turnover Rages
zhlédnutí 52Před 2 lety
Joe Payne at RSAC22 - Protect Valuable Data as Employee Turnover Rages
Yahoo Lawsuit Alleges Trade Secret Theft
zhlédnutí 209Před 2 lety
Yahoo Lawsuit Alleges Trade Secret Theft

Komentáře