{"id":7268,"date":"2025-03-18T17:22:41","date_gmt":"2025-03-18T17:22:41","guid":{"rendered":"https:\/\/dssi.pt\/mimecast-product-incydr\/"},"modified":"2025-05-29T13:22:06","modified_gmt":"2025-05-29T13:22:06","slug":"mimecast-product-incydr","status":"publish","type":"page","link":"https:\/\/dssi.pt\/en\/mimecast-product-incydr\/","title":{"rendered":"Mimecast &#8211; Product &#8211; Incydr"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7268\" class=\"elementor elementor-7268 elementor-2292\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<header class=\"elementor-section elementor-top-section elementor-element elementor-element-a03270d elementor-section-height-min-height elementor-section-full_width elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"a03270d\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-aec0d02\" data-id=\"aec0d02\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c5b6479 elementor-widget elementor-widget-image\" data-id=\"c5b6479\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"590\" height=\"102\" src=\"https:\/\/dssi.pt\/wp-content\/uploads\/2025\/04\/Mimecast-1.png\" class=\"attachment-medium_large size-medium_large wp-image-7174\" alt=\"\" srcset=\"https:\/\/dssi.pt\/wp-content\/uploads\/2025\/04\/Mimecast-1.png 590w, https:\/\/dssi.pt\/wp-content\/uploads\/2025\/04\/Mimecast-1-300x52.png 300w\" sizes=\"(max-width: 590px) 100vw, 590px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8758f0 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"e8758f0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Incydr<\/b><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/header>\n\t\t<div class=\"elementor-element elementor-element-3a9b5b9 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"3a9b5b9\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb3b3f0 elementor-widget elementor-widget-spacer\" data-id=\"cb3b3f0\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4046a0 elementor-widget elementor-widget-spacer\" data-id=\"a4046a0\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-68f53dfc elementor-reverse-tablet elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"68f53dfc\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-771cba7b\" data-id=\"771cba7b\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c4f3ad6 elementor-widget elementor-widget-text-editor\" data-id=\"3c4f3ad6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Detect and respond to internal risks<\/h2><div><div><p><strong>What makes this solution different<\/strong><\/p><p><b>Incydr <\/b>is a product that identifies and responds to SaaS data risk, enabling security teams to effectively mitigate file exposure and exfiltration risks without disrupting legitimate collaboration.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d78db12 elementor-widget elementor-widget-text-editor\" data-id=\"d78db12\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><strong>Simplicity<\/strong><br><strong>Quickly discover your data security blind spots<\/strong><\/p>\n<p><b>Incydr <\/b>detects the exposure and exfiltration of files via the computer, <i>cloud <\/i>or email box, through an agent and direct integrations. It monitors all file activity (creation, deletion, modification and movement) regardless of what is considered acceptable or unacceptable according to security policy. This broad approach to monitoring reduces implementation and management time by eliminating the process of creating and refining rules. It also sheds light on the organization&#8217;s data security blind spots, showing activities that escape the radar of other security technologies, thus providing accurate information on its insider threat vulnerabilities.   <\/p>\n<p><strong>Signal<\/strong><br><strong>Cutting through the noise to find the real risk<\/strong><\/p>\n<p><b>Incydr <\/b>is a solution that is perceptive enough to know that there is a difference between everyday collaboration and events that pose a real risk. It filters out the noise of harmless activity, such as file sharing between trusted domains, to reveal only the threats that can harm your business. Incydr takes a multidimensional approach to internal risk, combining a rich context of files, vectors and users. This information appears alongside additional risk indicators to prioritize events that require immediate security investigation.   <\/p>\n<p><strong>Speed<\/strong><br><strong>Adopt a right-sized approach to insider threat response<\/strong><\/p>\n<p>Incydr provides rapid and necessary responses to substantiate insider threat investigations, and there is no one-size-fits-all response. Response actions should vary based on impact, employee history and intent. By knowing the facts, your organization can take a right-sized response. Whether it&#8217;s automated action, corrective conversation, additional training or even legal action.   <\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e9db4d elementor-widget elementor-widget-text-editor\" data-id=\"3e9db4d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"vc_custom_heading\">How Incydr protects your corporate data<\/h2><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p><strong>3 Dimensions of internal risk: Files, Vectors and Users  <\/strong><\/p><\/div><\/div><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p>Incydr allows you to detect and respond to data risks caused by people within your organization. This includes exposure and exfiltration activities on computers and via corporate <i>cloud<\/i> and email services. <\/p><p>Incydr&#8217;s ability to speed up detection and response to internal risk comes from monitoring all file activity, regardless of what is considered acceptable or unacceptable by security policy. Incydr records each file event and enriches it with context about the vector, file and user to determine what represents real risk. This allows Incydr not only to reduce alerts and investigation time, but also to remedy risk that goes unnoticed by traditional data security technologies.  <\/p><\/div><\/div><div> <\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-fd91e63 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"fd91e63\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d7a4f80 elementor-widget elementor-widget-spacer\" data-id=\"d7a4f80\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df6733c elementor-widget elementor-widget-spacer\" data-id=\"df6733c\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Incydr Detect and respond to internal risks What makes this solution different Incydr is a product that identifies and responds to SaaS data risk, enabling security teams to effectively mitigate file exposure and exfiltration risks without disrupting legitimate collaboration. SimplicityQuickly discover your data security blind spots Incydr detects the exposure and exfiltration of files via the computer, cloud or email box, through an agent and direct integrations. It monitors all file activity (creation, deletion, modification and movement) regardless of what is considered acceptable or unacceptable according to security policy. This broad approach to monitoring reduces implementation and management time by eliminating the process of creating and refining rules. It also sheds light on the organization&#8217;s data security blind spots, showing activities that escape the radar of other security technologies, thus providing accurate information on its insider threat vulnerabilities. SignalCutting through the noise to find the real risk Incydr is a solution that is perceptive enough to know that there is a difference between everyday collaboration and events that pose a real risk. It filters out the noise of harmless activity, such as file sharing between trusted domains, to reveal only the threats that can harm your business. Incydr takes a multidimensional approach to internal risk, combining a rich context of files, vectors and users. This information appears alongside additional risk indicators to prioritize events that require immediate security investigation. SpeedAdopt a right-sized approach to insider threat response Incydr provides rapid and necessary responses to substantiate insider threat investigations, and there is no one-size-fits-all response. Response actions should vary based on impact, employee history and intent. By knowing the facts, your organization can take a right-sized response. Whether it&#8217;s automated action, corrective conversation, additional training or even legal action. How Incydr protects your corporate data 3 Dimensions of internal risk: Files, Vectors and Users Incydr allows you to detect and respond to data risks caused by people within your organization. This includes exposure and exfiltration activities on computers and via corporate cloud and email services. Incydr&#8217;s ability to speed up detection and response to internal risk comes from monitoring all file activity, regardless of what is considered acceptable or unacceptable by security policy. Incydr records each file event and enriches it with context about the vector, file and user to determine what represents real risk. This allows Incydr not only to reduce alerts and investigation time, but also to remedy risk that goes unnoticed by traditional data security technologies.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-7268","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/dssi.pt\/en\/wp-json\/wp\/v2\/pages\/7268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dssi.pt\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dssi.pt\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dssi.pt\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dssi.pt\/en\/wp-json\/wp\/v2\/comments?post=7268"}],"version-history":[{"count":2,"href":"https:\/\/dssi.pt\/en\/wp-json\/wp\/v2\/pages\/7268\/revisions"}],"predecessor-version":[{"id":10142,"href":"https:\/\/dssi.pt\/en\/wp-json\/wp\/v2\/pages\/7268\/revisions\/10142"}],"wp:attachment":[{"href":"https:\/\/dssi.pt\/en\/wp-json\/wp\/v2\/media?parent=7268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}