Director, Cybersecurity Consulting at a tech services company with 51-200 employees
Real User
Jun 16, 2022
There are a couple of things. One of them is that they have what they call Incydr. Their detection and response solution to the insider threat area is called Incydr. That gives visibility to the clients that have widely dispersed employee bases due to work from home, or that had a dispersed workforce predating any of the work from home requirements. Even though they might not be inside the organization physically, they're inside the organization. It allows us to get some visibility into what people are doing, what the context is, and how to control what might be the potential for intellectual property theft or file exposure.
The solution is very stable. Very rarely do we have any issues with it. We don't have to deal with bugs or glitches. It doesn't crash or freeze. We find it to be reliable.
Learn what your peers think about Mimecast Insider Risk Management and Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
Mimecast Insider Risk Management and Data Protection streamlines automated backups and simplifies navigation with intuitive interfaces, supporting cross-platform environments and central administration.Offering seamless integration of security and management tools, Mimecast Insider Risk Management and Data Protection enhances data protection while ensuring ease of use. With real-time data management and centralized administration, businesses experience minimized maintenance effort. Despite...
Risk factors can be adjusted for all intricate details.
There are a couple of things. One of them is that they have what they call Incydr. Their detection and response solution to the insider threat area is called Incydr. That gives visibility to the clients that have widely dispersed employee bases due to work from home, or that had a dispersed workforce predating any of the work from home requirements. Even though they might not be inside the organization physically, they're inside the organization. It allows us to get some visibility into what people are doing, what the context is, and how to control what might be the potential for intellectual property theft or file exposure.
The solution is very stable. Very rarely do we have any issues with it. We don't have to deal with bugs or glitches. It doesn't crash or freeze. We find it to be reliable.
Works in the background and users are able to perform restores.