Code42 Pricing in Cybersecurity Software

Are you from this Company?
Code42
Likes
5 Buyers Negotiating

Summary

Code42 offers a conditional setting driven way to deal with hazard to information dependent on record. A numeric score is given to each insider risk indicators and these indicate the danger associated with any occasion. You may monitor activities of users that need your consideration. Since it is straightforward in regards with how risk is perceived, you can adjust the model to accommodate your own danger resilience where essential.

The major product offerings in the cybersecurity software are:
Products
   Incydr
   Incydr Gov
   Instructor
Solution
   Departing Employee Data Exfiltration
   Insider Threat Detection
   IP Theft Protection
   Data Loss Prevention
   Security Awareness Training

Code42 Pricing
Code42 pricing has not been disclosed by the vendor. However, it is in line with the competitors in the market. Users can contact the vendor for getting more details & competitive pricing.

Code42 Demo
To know better about Code42, the users can have a look at a website and go through the various features offered about it. For more information and demo, the users can request the website and get across the demo soon.

Features:

  • Detects data risk across computers, mails and clouds
  • Offers a risk exposure dashboard for a company wide view of suspicious file movement and sharing
  • Identifies and shows security awareness gaps such as policy violations
  • Spots remote activity effectively and inform when the risk is increased.
  • Quickly remediate critical events at all the tires like user, network or device level.

Discussions

Strengths
  • +7
    Customer-Friendly
  • +6
    Customer- Level of Support
  • +14
    Consulting
  • +7
    Risk & Threat Assessment
  • +5
    Support and Maintenance
  • +6
    Training and Education
  • +14
    Compliance Management
  • +10
    Remote Support
  • +13
    Security Monitoring
  • +9
    Application security
  • +10
    Cloud security
  • +7
    Network security
  • +13
    Directly
  • +9
    Cloud
  • +6
    Product Demos
  • +11
    Antivirus/Antimalware 
  • +8
    Data Loss Prevention (DLP)
  • +14
    Disaster Recovery 
  • +7
    Encryption 
  • +5
    Identity and Access Management (IAM)
Cautions
  • -11
    CIO
  • -9
    CISO
  • -10
    Licenses
  • -13
    Managed Services
  • -5
    Incident Response
  • -9
    On-Site Support
  • -6
    Others
  • -8
    Endpoint security
  • -11
    Wireless security
  • -8
    Dedicated Account Manager (DAM)
  • -8
    On-Premises
  • -7
    Proof of Concept
  • -5
    Software Requirement Specification (SRS)
  • -10
    Advance persistent threat (APT) protection
  • -5
    Distributed Denial of Service (DDoS) Mitigation
  • -10
    Firewall 
  • -10
    Full Time Equivalent
  • -12
    Per User / Device Basis
  • -9
    Unified Threat Management (UTM)
  • -8
    System Administrator
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup