Lepide Identify

Get greater visibility over the content of your files with Lepide Data Classification Software. It automatically scans and classifies data related to PII, PHI, PCI, IP, and other regulations.

Or Deploy With Our Virtual Appliance

Launch our brand new in-browser demo

Thousands of companies use Lepide to protect their data and detect threats

Thousands of Companies Use Lepide to Protect Their Data and Detect Threats - image

Data Classification Software

Sensitive Data Discovery - icon Sensitive Data Discovery

Implement hundreds of pre-defined criteria sets to locate sensitive data across your unstructured data stores and map to compliance mandates.

Persistent Classification - icon Persistent Classification

Other solutions may take days to scan your environment for sensitive data. With Lepide, you can identify sensitive data at the point of creation for instant value.

Security with Context - icon Security with Context

Identify what content users have access to and what they are doing with your data to better inform access controls and security policies.

Data Classification as a Means of Security

Automate Threat Response - icon Automate Threat Response

Once your most sensitive data has been identified and classified, you can use Lepide to detect threats to it and automate response.by deploying any of our pre-defined threat models.

Reduce False Positives - icon Reduce False Positives

Proximity scanning eliminates false positives better than any other platform on the market. By giving the discovered pattern more context, we can accurately predict what is real sensitive data and what is a false positive.

Govern Access More Effectively - icon Govern Access More Effectively

By enabling you to see which of your users have access to your most sensitive data, Lepide can help you spot users with excessive permissions, apply appropriate access controls, and even govern access from within the solution.

Spot Risky User Behavior - icon Spot Risky User Behavior

Having visibility over your most sensitive data enables you to determine when your users are putting you at risk. Get alerts and reports on user behavior as it relates to your most sensitive, regulated data.

Locating Sensitive Data Easy - screenshot

Pre-Defined Criteria Sets Make Locating Sensitive Data Easy

Our Data classification software contains a huge library of pre-defined data sets for all common types of sensitive data and compliance standards (including HIPAA, SOX, PCI, GDPR, CCPA and more). Simplify your compliance reporting with Lepide.

Secure and Protect Your Most Sensitive Unstructured Data

If a GDPR file is copied, you need to know. If a large number of health records are accessed or deleted, you need to know.

With the Lepide Data Classification tool, you will know.

Secure Sensitive Unstructured Data - screenshot

Want to see it in action?

Take a virtual tour of the Lepide Data Security Platform in our web-based demo. See how Lepide aligns with your use case, whether it be ransomware, Active Directory security, Microsoft 365 security, data protection, data access governance or more.

Launch in-browser demo
In-Browser Demo - image

On-Premise and Cloud Protection From a Single Console

How Data Classification Works

Incremental Scanning After an initial discovery and classification scan, data can be classified at the point of creation/modification incrementally to give you a scalable solution that works quickly and efficiently.

Wide Range of File Types You can scan a wide range of different file types, including word documents, text documents and excel spreadsheets, to find out where your sensitive data resides.

Prioritize Data Based on Risk Categorize and score data based on the risk value of the content so that you can focus your user behavior analytics and permissions strategies on the data that matters most.

How Data Classification Works - image
gartner peer insights

We use Lepide for the security of our Azure and On-prem environment, its real time alert system is awesome!

gartner rating
Read more case studies

Our Success Stories

Western Connecticut Health Network

Lepide is straightforward to use and effective right off the bat. Plus, the level of patience, attentiveness and technical knowhow is far beyond most support and sales teams I’ve seen before.

Ratings Drayke Jackson Security Engineer Drayke Jackson
Edinburgh Napier University

We chose Lepide as they were able to offer us threat detection and response, and a way of separating out reporting duties to a web console – all from one platform.

Ratings Kevin Gallagher Senior Systems Administrator Kevin Gallagher
City of

Lepide is a perfect fit for our IT Security and Compliance requirements. It helps us cut out a lot of wasted time and money and now we know we can be compliant with industry standards.

Ratings Agnel Dsilva Information Technology Administrator Agnel Dsilva
We support over 85 file types (Including image files).
Some of the more popular file types supported are: .doc, .xls, .sxc, .vsd, .rtf, .pdf, .ots, .sti, .txt, .xml, .pps, .stc, .csv, .ods, .ppt, .eml, .sub, .sxw, .aacdb, .dwg, .zip, .rar, .log, .mdb, and more.
When we search for specific patterns, we take into account the structure of the pattern we are searching for. For example, if a pattern must have a specific sequence of numbers/letters, we will only classify the correctly structured sequence. We also use proximity searching to eliminate false positives by giving the discovered pattern more context on the surrounding phrases/keywords in the file.
Outside of the 100’s of predefined rules, there is also the option to easily create your own rules, values and templates for discovery and classification specific to your business needs or requirements.
There are many different pre-defined rules and templates built into the solution that you can enable out of the box. If a pattern is found in the file that matches the rule applied, Lepide will tag and classify the data respectively. We will then index the file for reporting / alerting. The discovery and classification can either be run periodically across the full dataset or on the fly as and when the files are created / modified.

There are many variables that will determine the length of time it would take to successfully complete a scan, including the size of the dataset, the size of the file, the file types and the number of patterns/rules you have configured the solution to search the data for. We benchmark against industry standards and speeds when it comes to data discovery and classification.

We recommend running a full, deep scan across your data on a periodic basis (monthly or quarterly) and enable classification on-the-fly in the interim. Every time a new file is created/modified, Lepide will scan the files in real time to identify if there has been any newly created sensitive data