• Support
  • |
  • sales@lepide.com
  • |
  • +1-800-814-0578
  • |

Get greater visibility over the content of your files as Lepide automatically scans and classifies data related to PII, PHI, PCI, IP and other regulations.

Thousands of companies use Lepide to audit Active Directory, protect their data and detect threats

Sensitive Data Discovery and Classification Made Simple

Our data discovery and classification software helps give you more context around your most sensitive data, so that you easily identify potential areas of exposure and apply the correct access controls. See how many of your files contain sensitive data, where they are distributed, what type of data you have and more.

Sensitive Data Discovery

Implement hundreds of pre-defined criteria sets to locate sensitive data across your unstructured data stores and map to compliance mandates.

Persistent Classification

Other solutions may take days to scan your environment for sensitive data. With Lepide, you can identify sensitive data at the point of creation for instant value.

Security with Context

Identify what content users have access to and what they are doing with your data to better inform access controls and security policies.

  • Personal Information
  • Financial Records
  • Security File Types
  • Health Records
  • Regulated Data

Pre-Defined Criteria Sets Make Locating Sensitive Data Easy

Lepide Data Security Platform contains a huge library of pre-defined data sets for all common types of sensitive data and compliance standards (including HIPAA, SOX, PCI, GDPR, CCPA and more). Simplify your compliance reporting with Lepide.

Secure and Protect Your Most Sensitive Unstructured Data

Alert and report on anomalous or suspicious user behavior and changes being made to your most critical data. Get detailed, actionable insights with real context about where your sensitive data is, who has access to it and what your users are doing with it.

If a GDPR file is copied, you need to know. If a large number of health records are accessed or deleted, you need to know.

With Lepide, you will know.

Making the Most of Data Classification

Add Context to Classification

Lepide not only discovers and classifies your sensitive data, it lets you know who has access to it and what your users are doing with it, enabling you to apply the appropriate access controls and security policies.

Automate Threat Response

Once your most sensitive data has been identified and classified, you can use Lepide to detect threats to it and automate response.by deploying any of our pre-defined threat models.

Reduce False Positives

Lepide uses intelligent proximity scanning to eliminate false positives better than any other platform on the market. By giving the discovered pattern more context, we can accurately predict what is real sensitive data and what is a false positive.

Govern Access More Effectively

By enabling you to see which of your users have access to your most sensitive data, Lepide can help you spot users with excessive permissions, apply appropriate access controls, and even govern access from within the solution.

Spot Risky User Behavior

Having visibility over your most sensitive data enables you to determine when your users are putting you at risk. Get alerts and reports on user behavior as it relates to your most sensitive, regulated data.

How Data Classification Works

Incremental Scanning After an initial discovery and classification scan, data can be classified at the point of creation/modification incrementally to give you a scalable solution that works quickly and efficiently.

Wide Range of File Types You can scan a wide range of different file types, including word documents, text documents and excel spreadsheets, to find out where your sensitive data resides.

Prioritize Data Based on Risk Categorize and score data based on the risk value of the content so that you can focus your user behavior analytics and permissions strategies on the data that matters most.

1,000 + customers in over 120
countries are using Lepide

Drayke Jackson Security Engineer

Lepide is straightforward to use and effective right off the bat. Plus, the level of patience, attentiveness and technical knowhow is far beyond most support and sales teams I’ve seen before.

Kevin Gallagher Senior Systems Administrator

We chose Lepide as they were able to offer us threat detection and response, and a way of separating out reporting duties to a web console – all from one platform.

Agnel Dsilva Information Technology Administrator

Lepide is a perfect fit for our IT Security and Compliance requirements. It helps us cut out a lot of wasted time and money and now we know we can be compliant with industry standards.

Want to Get Started?

Send us a message and we’ll talk about how best to get you started with the Lepide Data Security Platform.

FAQs
We support over 85 file types (Including image files).
Some of the more popular file types supported are: .doc, .xls, .sxc, .vsd, .rtf, .pdf, .ots, .sti, .txt, .xml, .pps, .stc, .csv, .ods, .ppt, .eml, .sub, .sxw, .aacdb, .dwg, .zip, .rar, .log, .mdb, and more.
When we search for specific patterns, we take into account the structure of the pattern we are searching for. For example, if a pattern must have a specific sequence of numbers/letters, we will only classify the correctly structured sequence. We also use proximity searching to eliminate false positives by giving the discovered pattern more context on the surrounding phrases/keywords in the file.
Outside of the 100’s of predefined rules, there is also the option to easily create your own rules, values and templates for discovery and classification specific to your business needs or requirements.
There are many different pre-defined rules and templates built into the solution that you can enable out of the box. If a pattern is found in the file that matches the rule applied, Lepide will tag and classify the data respectively. We will then index the file for reporting / alerting. The discovery and classification can either be run periodically across the full dataset or on the fly as and when the files are created / modified.

There are many variables that will determine the length of time it would take to successfully complete a scan, including the size of the dataset, the size of the file, the file types and the number of patterns/rules you have configured the solution to search the data for. We benchmark against industry standards and speeds when it comes to data discovery and classification.

We recommend running a full, deep scan across your data on a periodic basis (monthly or quarterly) and enable classification on-the-fly in the interim. Every time a new file is created/modified, Lepide will scan the files in real time to identify if there has been any newly created sensitive data