How To Get Started
Step-by-step instructions for getting started with your Salesforce Exfiltration Detector. This video will cover key details and how to configure Salesforce and authorize the detector.
Watch Video
Your go-to resource center for everything you need to get started using the Salesforce Exfiltration Detector for Incydr.
Step-by-step instructions for getting started with your Salesforce Exfiltration Detector. This video will cover key details and how to configure Salesforce and authorize the detector.
Watch Video
Watch Demo
Read Article
Transparency – it is core to our approach to Insider Risk Management, so we felt it’s our responsibility to be transparent and share our own Insider Risk story and what we learned. 3 takeaways in...
Read Article
Automatically remove a user's access to specified corporate applications on trusted, non-trusted or mobile devices, in response to critical events.
Learn More
How can security teams tell the difference between files moving to their corporate account and files moving to a personal one when it involves the same application? Incydr's Trust methodology.
Read Product Overview
This technical white paper outlines the range of responses that Incydr enables and best practices for when to take which response.
Read White Paper
Ensure response actions are right-sized to the severity of every event.
Learn More