The Complete Guide to the NIST Cybersecurity Framework Download eBook ✕
Lepide Software
  • Download Free Trial
  • Platform
    • Overview
    • Lepide Auditor
      • Auditing and Reporting

        Monitor, audit and report on changes and interactions with platforms, files and folders across your on-premises and cloud environment.

        Learn more
        On-Premise & Cloud Platforms We Audit
        • Windows Active Directory
        • Windows File Server
        • Exchange Server
        • SQL Server
        • SharePoint
        • Microsoft Office 365
        • Amazon S3
        • Dropbox
        • G Suite
        • More...
    • Lepide Detect
      • Detect and Respond to Threats

        Intelligent threat detection through real time alerts, anomaly spotting and automated threat response.

        Learn more
        Features
        • Threat Detection Threat Detection Anomaly spotting and real time alerts.
        • Threat Response Threat Response Automated actions based on alerts.
    • Lepide Trust
      • Implement Zero Trust

        Instant visibility on permission changes, spot users with excessive permissions and reverse unwanted changes.

        Learn more
        Features
        • Risk Analysis Risk Analysis Identify areas of risk and govern access to sensitive data.
        • Permissions Analysis Permissions Analysis Analyze changes, and review current and historic permissions.
    • Lepide Identify
      • Locate and Classify Sensitive Data and PII

        Data classification adds context to your security efforts. E-Discovery helps to speed up privacy and data subject access requests.

        Learn more
        Features
        • Data Classification Data Classification Discover and Classify data on-premise and in the cloud.
        • eDiscovery eDiscovery Speed up privacy and data subject access requests with eDiscovery.
    • How It Works
    • SIEM Integration
    • Platforms We Support
    • Free Risk Assessment
  • Solutions
    • Identity Access Management
        • Active Directory Security
        • Active Directory Self Service
        • Manage Inactive Accounts
        • Password Expiry Notifications
        • Privileged Access Management
        • Track Account Lockouts
    • Data Security
        • Data Classification
        • Data Access Governance
        • Compromised Users
        • Data Breaches
        • Data Loss Prevention
        • Insider Threats
        • Microsoft 365 Security
        • Remote Worker Security
        • Ransomware
        • Zero Trust
    • Compliance
        • CMMC
        • CJIS
        • SOX
        • ISO
        • CCPA
        • GDPR
        • GLBA
        • FISMA
        • HIPAA
        • PCI DSS
        • DSARs
        • More...
    • Industry
        • Finance/Banking
        • Education
        • Healthcare
        • Public Sector
        • Technology
    • IT Management
        • Manage Event Logs
        • Restore Deleted Objects
        • Rollback Unwanted Changes
        • Session Recording
        • Server Health Check
  • Company
    • About Us
    • News
    • Customers
    • Customer Portal
    • Case Studies
    • Careers
    • Feedback
    • Contact Us
  • Partners
    • Find a Partner
    • Become a Partner
    • Register a Deal
    • Alliance Partners
    • Partner Portal
  • Resources
    • Product Documentation
    • Product Video Guides
    • Webinars
    • Whitepapers
    • eBooks
    • Datasheets
    • Blog
    • How-tos
    • CISO Talks
    • Freeware
Recent Post
Data Security | 5 min read

What is Cyber Threat Intelligence?

Aidan SimisterAidan Simister | February 9, 2023
Lepide Data Security Platform Browse by Categories
  • Data Security
  • CISO
  • Auditing
  • Compliance
  • Ransomware
  • IT Operations
  • General

More Posts

Data Security

What is Incident Response? A Comprehensive Guide

Danny MurphyDanny Murphy February 7, 2023 | 5 min read
Data Security

SIEM vs Log Management System

Anna Szentgyorgyi-SiklosiAnna Szentgyorgyi-Siklosi February 2, 2023 | 5 min read
Data Security

What is Cyber Insurance?

Natasha MurphyNatasha Murphy January 31, 2023 | 5 min read
Data Security

Top 7 Identity Security Trends In 2023

Terry MannTerry Mann January 25, 2023 | 7 min read
Data Security

What is a Data Repository?

Iain RobertsIain Roberts January 19, 2023 | 4 min read
Data Security

The Role of File Auditing in Compliance

Philip RobinsonPhilip Robinson January 17, 2023 | 4 min read
Load more
Platform
  • Overview
  • Lepide Auditor
  • Lepide Detect
  • Lepide Trust
  • Lepide Identify
Solutions
  • Ransomware
  • Remote Workers
  • Insider Threats
  • Compromised Users
  • Data Access Governance
  • Data Classification
Support
  • Contact Support
  • Support Options
  • Documentation
  • Video Guides
Partner
  • Find a Partner
  • Become a New Partner
  • New Deal Registration
  • Alliance Partnerships
  • Partner Portal
Company
  • About Us
  • Meet the Team
  • News
  • Events
  • Customers
  • Awards & Reviews
  • Careers
  • Contact Us
  • Freeware
  • Linkedin
  • Twitter
  • facebook
  • YouTube
Sign up for our monthly newsletter
  • Home
  • Privacy Policy
  • Sitemap
  • XML
DMCA