Block by Destination is a new Incydr feature as part of our Spring 2026 release that helps organizations prevent sensitive data from being uploaded to high-risk websites, part of our flexible suite of Adaptive Controls. It follows our recently-released Block by Source capability that protects data originating from high-value locations.
By allowing administrators to block or temporarily allow custom URLs and categories of sites like unsanctioned generative AI (GenAI) tools, this feature provides precise, real-time data exfiltration prevention while ensuring legitimate workflows remain uninterrupted.
Incydr’s built in GenAI dashboards allow you to understand which users are using which AI tools and take action, like blocking by destination or temporarily allowing users to request exemptions
This feature enables security teams to block uploads to “never allowed” destinations, such high-risk GenAI websites, using a lightweight browser extension. Employees attempting to upload data to blocked sites receive immediate, customizable notifications, while administrators gain access to detailed audit logs for compliance and investigations.
Tailor your Adaptive Controls to Balance Security with Productivity
Organizations face challenges balancing data security with productivity. While some websites pose clear risks for data exfiltration, over-blocking all untrusted sites can frustrate employees and slow legitimate business collaboration. Block by Destination addresses this by offering the ability to target blocking for specific users via watchlists.
Temporarily Allow is a great option for organizations that want to balance security and productivity. Users will be prompted and their response will be tracked to understand why they need to move data to an untrusted destination.
Security teams can also choose a “Temporarily Allow” option, letting users self-select why they need to use a specific website, balancing flexibility with accountability. Finally, Incydr Instructor offers the option to prompt users with short, educational videos in real-time, which is ideal for low-risk exfiltration scenarios.
Key Benefits of Block by Destination
- Real-Time Prevention: Blocks uploads to high-risk sites, temporarily allow users to request exemptions to users to balance security and productivity.
- Customizable Control: Administrators can define up to 10,000 URLs for maximum versatility or easily apply controls to specific site categories, and choose whether these controls are applied to specific users via watchlists.
- User Transparency: Employees receive clear, customizable notifications when controls are activated, improving security awareness.
- Seamless Enforcement: Rules apply automatically to all users, even if they’re offline.
- Comprehensive Audit Trails: Every block, temporary allow, or educational video is logged with detailed evidence, supporting compliance and investigation requirements.
Block by Destination operates through a browser extension that monitors file uploads, drag-and-drop actions, and copy-paste attempts into browsers. Administrators configure a list of blocked destinations, which are enforced in real time, ensuring that sensitive data cannot be uploaded to these high-risk sites.
Incydr automatically tracks all untrusted data movement from day one, ensuring teams have visibility into every exfiltration scenario to set up adaptive controls accordingly
Incydr’s offers unmatched visibility from day one of deployment, no policy setup needed. This allows security teams to have visibility into and set up governance for key use cases like:
- Shadow AI: Prevent unsanctioned AI tools from receiving uploaded or pasted data, ensuring compliance with acceptable use policies.
- Shadow IT: Blocks risky websites like personal email, file modification sites, or cloud storage to prevent exfiltration of sensitive data.
- Investigations and Compliance: Provides audit-ready logs to demonstrate adherence to internal policies and regulatory requirements.
Block by Destination eliminates the trade-off between security and productivity, giving organizations precision, flexibility, and peace of mind. It empowers security teams to protect sensitive data without hindering legitimate workflows, making it an essential tool for modern data protection.
Understand your Data Security Posture with a Complimentary Proof-of-Value
Get a complimentary 30-day Proof of Value and better understand your data security posture. This structured program is run by Incydr experts and ideal for organizations that need to enhance their visibility, balance collaboration with protection, and stay on top of the fast-changing world of work.