Try our new research platform with insights from 80,000+ expert users

Mimecast Incydr vs Qualys Multi-Vector EDR comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Mimecast Incydr
Average Rating
9.0
Reviews Sentiment
7.4
Number of Reviews
78
Ranking in other categories
Data Loss Prevention (DLP) (20th)
Qualys Multi-Vector EDR
Average Rating
8.0
Reviews Sentiment
7.1
Number of Reviews
1
Ranking in other categories
Endpoint Detection and Response (EDR) (71st), Network Detection and Response (NDR) (28th)
 

Mindshare comparison

Mimecast Incydr and Qualys Multi-Vector EDR aren’t in the same category and serve different purposes. Mimecast Incydr is designed for Data Loss Prevention (DLP) and holds a mindshare of 2.5%, up 1.6% compared to last year.
Qualys Multi-Vector EDR, on the other hand, focuses on Endpoint Detection and Response (EDR), holds 0.3% mindshare, up 0.1% since last year.
Data Loss Prevention (DLP) Market Share Distribution
ProductMarket Share (%)
Mimecast Incydr2.5%
Microsoft Purview Data Loss Prevention8.3%
Varonis Platform6.1%
Other83.1%
Data Loss Prevention (DLP)
Endpoint Detection and Response (EDR) Market Share Distribution
ProductMarket Share (%)
Qualys Multi-Vector EDR0.3%
CrowdStrike Falcon8.7%
Microsoft Defender for Endpoint7.3%
Other83.7%
Endpoint Detection and Response (EDR)
 

Featured Reviews

Chuck_Mackey - PeerSpot reviewer
Director, Cybersecurity Consulting at a tech services company with 51-200 employees
Provides comprehensive visibility and protection, helps in identifying the gaps in security, and comes with excellent onboarding support
In a couple of instances, we had a little bit of trouble in getting it distributed throughout the organization. We ultimately managed to do it, but they talk about it being a pretty simple process, and it became a little laborious. It would just turn away. The agents were not being distributed. It was just churning and churning and churning. When we were looking for specific categories of data, it was getting bogged down, but that was not even so much Code42, although some of it was their issue. It really has to do with the overall infrastructure and what the organization is prepared to do. If the infrastructure or the networking is a little hinky or you don't have a really finely tuned network infrastructure environment and your patches aren't up to date on your servers and your endpoints, it could get a little sticky. Other than that, it was okay. We really didn't have much problem beyond that. It took a couple of days to sort that out, but it was no big deal.
reviewer1668453 - PeerSpot reviewer
Director, Security Innovation at a insurance company with 10,001+ employees
Provides contextual alerts and risk ratings on findings
It's kind of difficult to quantify areas for improvement. In the larger picture, one challenge is that the NDR space is very crowded today. I can mention half a dozen names just off the top of my head. There are at least 12 to 20 different players. All of them are well-known brand names, and it's difficult to compare them. They all claim to be giving you the same network difference capability: catching malware, dealing with all the minor taxonomy of attack, all that. Still, it's very difficult to compare them side by side because they all do things a little differently, and they all have different presentations and output. We haven't deployed it, so I can't give you what we felt about it exactly. But in the larger perspective, the critical feature is really giving a clear separation between a low, high, and medium criticality. You need a rating that is really true to the actual attack. There's one other capability we are evaluating them for, and it's for custom alerts detection. A lot of these products are trying to profile the threats that are already out there in the industry. They're very well known and published. Today, there are targeted acts being played against organizations, so you have to be sensitive to how your firewalls, protocols, and your HTTP are all operating. You might have some fine-tuned threats that are targeting you, and you should be able to build custom defenses. They should have some openness in terms of how you specify your threats. You get a standard library of threats. On top of it, every organization builds its own.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"t has a very user friendly status bar with common errors and has logs built in to the console so we can review the issues or status of CrashPlan."
"Low system overhead, setting retention policies, ease of use"
"Backup and recovery have been great, but I love having the ability to keep the hybrid type build which they offer."
"There are a couple of things. One of them is that they have what they call Incydr. Their detection and response solution to the insider threat area is called Incydr. That gives visibility to the clients that have widely dispersed employee bases due to work from home, or that had a dispersed workforce predating any of the work from home requirements. Even though they might not be inside the organization physically, they're inside the organization. It allows us to get some visibility into what people are doing, what the context is, and how to control what might be the potential for intellectual property theft or file exposure."
"It had the ability to preseed by sending in a data drive and could restore by sending the user a data drive."
"The solution is very stable. Very rarely do we have any issues with it. We don't have to deal with bugs or glitches. It doesn't crash or freeze. We find it to be reliable."
"Risk factors can be adjusted for all intricate details."
"It has quite a bit of flexibility in configuring backup sets."
"They can provide you very contextual alerts on if something bad is happening—coming into your network or going out of your network. As part of that, they gather a lot of threat intelligence and map your connections against that. The larger benefit is that they give you a risk rating on their findings."
 

Cons

"I think one we can improve is the compression."
"You can't always filter out data that you'd like to."
"The application, written in Java, required far more system resources on a Client than other solutions."
"I would like to see more flexibility on privileges, perhaps create another kind of admin for regions. Also, I would like the ability to access logs without having to be on the actual device or a super-admin."
"In a couple of instances, we had a little bit of trouble in getting it distributed throughout the organization. We ultimately managed to do it, but they talk about it being a pretty simple process, and it became a little laborious. It would just turn away. The agents were not being distributed. It was just churning and churning and churning. When we were looking for specific categories of data, it was getting bogged down, but that was not even so much Code42, although some of it was their issue."
"Java, please get rid of Java."
"Reporting could use an overhaul. It is very limited."
"What I think could be improved is how I get support."
"My challenge is actually comparing offerings from different vendors across a threat spectrum that is very large. We are talking about millions of threats. How are you confident that Blue Hexagon is catching all one million of them and Palo Alto is doing the same thing? They all have their strengths. Within that, Blue Hexagon might cover 990,000 of them. Palo Alto might cover another 990,000. It's a bit difficult to compare them and say, "Oh, are they catching the same 990,000?" I don't know."
 

Pricing and Cost Advice

"It is 100% worth the cost to get and keep the support, especially when setting it up."
"It used to be a good solution for SOHO in particular as it had unlimited storage for a reasonable price. However, their pricing model has changed and they are now primarily targeting enterprise users."
"They were the best solution and surprisingly enough, the cheapest."
"The pricing is reasonable. It's my understanding that the cost is about $7 for unlimited storage in the cloud per server."
"It was expensive. It was more expensive than Eureka, and it was more expensive than Barracuda Backup, but what we got was a full team. They didn't come in and nickel and dime us. They provided the assistance we needed. They didn't say that they need to charge us for something or it is going to take another statement of work. It was all bundled into it... We pay for the software maintenance. It is probably 18% or 20% of the license fee for rev releases."
"It's difficult to state the setup cost. All the NDRs range anywhere between $500,000, plus or minus, to $2 million. There's a spread of pricing here, depending on who you are talking to. Obviously the major brand names want more money. They typically bundle it with their other offerings. With Cisco, for example, you don't just buy an NDR. So, typically it gets rolled into the cost."
report
Use our free recommendation engine to learn which Data Loss Prevention (DLP) solutions are best for your needs.
881,733 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
12%
Performing Arts
7%
Financial Services Firm
6%
Outsourcing Company
5%
Financial Services Firm
14%
Retailer
9%
Comms Service Provider
9%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business24
Midsize Enterprise24
Large Enterprise30
No data available
 

Questions from the Community

What is your primary use case for Code42 Incydr?
Data Leakage Protection on large scale environments. This can be to protect against leakage on endpoints and servers that consist of highly classified or propriety information. It can be added on a...
Ask a question
Earn 20 points
 

Also Known As

Code42 Next-Gen DLP, Code42 Next-Gen Data Loss Protection, Code42 Forensic File Search, Code42 Backup + Restore
Blue Hexagon
 

Overview

 

Sample Customers

Adobe, Okta, Samsung, Taylormade, Boston University, Lending Club, North Highland, Stanford University, Ping Identity, Qualcomm, Pandora.
Pacific Dental Services, Greenhill and Co, Heffernan Insurance Brokers
Find out what your peers are saying about Microsoft, Forcepoint, Broadcom and others in Data Loss Prevention (DLP). Updated: January 2026.
881,733 professionals have used our research since 2012.