“LepideAuditor is straightforward to use and effective right off the bat. Plus, the level of patience, attentiveness and technical knowhow is far beyond most support and sales teams I’ve seen before. ”
“While price was a factor, we ultimately chose Lepide as they were able to offer us threshold alerting, a way of separating out reporting duties to a web console and a site license with extended support and maintenance. ”
“LepideAuditor is a perfect fit for our IT Security and Compliance requirements. It helps us cut out a lot of wasted time and money and now we know we can be compliant with industry standards.”
“All the features that LepideAuditor has are simple to use and give us all the information we need to know that our data is secure and that we can be compliant with industry standards.”
“LepideAuditor is a very helpful means of monitoring the activity around our valuable data and core infrastructure. The audit logs are structured in a presentable format via intelligent reports.”
How We Help Meet ISO 27001 Compliance Requirements
Analyze Risk to Your Systems and Data
Easily identify the greatest risks to your data security and take steps to remediate vulnerabilities. Identify where your most sensitive data resides within your systems, govern access, analyze user behavior and audit changes being made.
Track User Behavior With Sensitive Data
Track and monitor what your users are doing with data that falls under ISO requirements. Spot anomalies in user behavior and automate your response your unwanted or unauthorized changes.
Mapping ISO Articles to LepideAuditor
Organization of Information SecurityArticle 6
This article is essentially about control. LepideAuditor helps ensure that you are reducing the risk of data loss by identifying who your most privileged users are and governing access to your most sensitive data.
Access ControlArticle 9
Control who has access to your most sensitive data by first identifying where your most sensitive data is and who has access to it using Lepide. This will help you to implement strict access controls on a policy of least privilege.
Operations SecurityArticle 12
LepideAuditor will track, monitor and alert on any changes made to configurations in key data stores, or changes made to Group Policy Objects so that you can check whether those changes are authorized.
Information Security Incident ManagementArticle 16
LepideAuditor will provide you with a real time alert when a security incident takes place, and also a full audit trail to help investigate the root cause. You can have real time alerts delivered to specific team members to share responsibility.
Planning Information Security ContinuityArticle 17
LepideAuditor enables you to establish a strong information security strategy designed to protect data on-premise and in the cloud. Analyze user behavior, detect suspicious activity and rollback and restore unwanted changes.
Compliance with External RequirementsArticle 18
LepideAuditor is able to scan data at the point of creation and modification to identify data related to compliance regulations. Pre-defined compliance reports help to map Lepide functionality to specific articles.