+
+

Related Products

  • Curtain LogTrace File Activity Monitoring
    4 Ratings
    Visit Website
  • Safetica
    358 Ratings
    Visit Website
  • Curtain MonGuard Screen Watermark
    7 Ratings
    Visit Website
  • Heimdal Endpoint Detection and Response (EDR)
    54 Ratings
    Visit Website
  • Netwrix Auditor
    296 Ratings
    Visit Website
  • DriveStrike
    23 Ratings
    Visit Website
  • ManageEngine Log360
    93 Ratings
    Visit Website
  • Hoxhunt
    4,474 Ratings
    Visit Website
  • ThreatLocker
    469 Ratings
    Visit Website
  • Guardz
    56 Ratings
    Visit Website

About

Welcome to data security for the collaborative and remote enterprise. Validate proper use of sanctioned collaboration tools, such as Slack and OneDrive. Uncover Shadow IT applications that may indicate gaps in corporate tools or training. Gain visibility into off-network file activity, such as web uploads and cloud sync apps. Quickly detect, investigate and respond to data exfiltration by remote employees. Receive activity alerts based on file type, size or count. Access detailed user activity profiles to speed investigation and response.

About

LinkShadow Network Detection and Response (NDR) ingests network traffic and uses machine learning to detect malicious activity and to understand security risks and exposure. It combines detection for known attack behavior with the ability to recognize what is typical for any given organization, flagging unusual network activity or session that can indicate an attack. Once a malicious activity is detected, LinkShadow NDR responds using third-party integration like firewall, Endpoint Detection and Response (EDR), Network Access Control (NAC) etc. NDR solutions analyze network traffic to detect malicious activity inside the perimeter—otherwise known as the east-west corridor—and support intelligent threat detection, investigation, and response. Using an out-of-band network mirror port, NDR solutions passively capture network communications and apply advanced techniques, including behavioral analytics and machine learning, to identify known and unknown attack patterns.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprise organizations

Audience

Governments, banking, healthcare, telecom

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

No images available

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 5.0 / 5
ease 4.5 / 5
features 5.0 / 5
design 5.0 / 5
support 5.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Code42
Founded: 2001
United States
www.code42.com

Company Information

LinkShadow
Founded: 2016
United States
www.linkshadow.com

Alternatives

Alternatives

Securonix UEBA

Securonix UEBA

Securonix
FortiInsight

FortiInsight

Fortinet
Risk Monitor

Risk Monitor

SearchInform

Categories

Categories

Integrations

Axonius
Box
Code42 Incydr
Cortex XDR
Dropbox
Indent
Microsoft OneDrive
Okta
Slack
Splunk Enterprise
Splunk SOAR
Tines
iCloud

Integrations

Axonius
Box
Code42 Incydr
Cortex XDR
Dropbox
Indent
Microsoft OneDrive
Okta
Slack
Splunk Enterprise
Splunk SOAR
Tines
iCloud
Claim Code42 and update features and information
Claim Code42 and update features and information
Claim LinkShadow and update features and information
Claim LinkShadow and update features and information