The Complete Guide to Ransomware [Updated for 2022] Download eBook
Lepide Identify

Get greater visibility over the content of your files as Lepide automatically scans and classifies data related to PII, PHI, PCI, IP and other regulations.

x
Or Deploy With Our Virtual Appliance

Thousands of companies use Lepide to protect their data and detect threats

Data Classification Solution

Sensitive Data Discovery

Implement hundreds of pre-defined criteria sets to locate sensitive data across your unstructured data stores and map to compliance mandates.

Persistent Classification

Other solutions may take days to scan your environment for sensitive data. With Lepide, you can identify sensitive data at the point of creation for instant value.

Security with Context

Identify what content users have access to and what they are doing with your data to better inform access controls and security policies.

Pre-Defined Criteria Sets Make Locating Sensitive Data Easy

Lepide Data Security Platform contains a huge library of pre-defined data sets for all common types of sensitive data and compliance standards (including HIPAA, SOX, PCI, GDPR, CCPA and more). Simplify your compliance reporting with Lepide.

Secure and Protect Your Most Sensitive Unstructured Data

If a GDPR file is copied, you need to know. If a large number of health records are accessed or deleted, you need to know.

With the Lepide Data Classification solution, you will know.

Data Classification as a Means of Security

Add Context to Classification

Lepide data classification solution shows where sensitive data is, who has access to it and what your users are doing with it, enabling you to apply the appropriate access controls and security policies.

Automate Threat Response

Once your most sensitive data has been identified and classified, you can use Lepide to detect threats to it and automate response.by deploying any of our pre-defined threat models.

Reduce False Positives

Proximity scanning eliminates false positives better than any other platform on the market. By giving the discovered pattern more context, we can accurately predict what is real sensitive data and what is a false positive.

Govern Access More Effectively

By enabling you to see which of your users have access to your most sensitive data, Lepide can help you spot users with excessive permissions, apply appropriate access controls, and even govern access from within the solution.

Spot Risky User Behavior

Having visibility over your most sensitive data enables you to determine when your users are putting you at risk. Get alerts and reports on user behavior as it relates to your most sensitive, regulated data.

How Data Classification Works

Incremental Scanning After an initial discovery and classification scan, data can be classified at the point of creation/modification incrementally to give you a scalable solution that works quickly and efficiently.

Wide Range of File Types You can scan a wide range of different file types, including word documents, text documents and excel spreadsheets, to find out where your sensitive data resides.

Prioritize Data Based on Risk Categorize and score data based on the risk value of the content so that you can focus your user behavior analytics and permissions strategies on the data that matters most.

We use Lepide for the security of our Azure and On-prem environment, its real time alert system is awesome!

Read more case studies

Our Success Stories

Western Connecticut Health Network

Lepide is straightforward to use and effective right off the bat. Plus, the level of patience, attentiveness and technical knowhow is far beyond most support and sales teams I’ve seen before.

Drayke Jackson Security Engineer
Edinburgh Napier University

We chose Lepide as they were able to offer us threat detection and response, and a way of separating out reporting duties to a web console – all from one platform.

Kevin Gallagher Senior Systems Administrator
City of
Danville

Lepide is a perfect fit for our IT Security and Compliance requirements. It helps us cut out a lot of wasted time and money and now we know we can be compliant with industry standards.

Agnel Dsilva Information Technology Administrator
FAQs
We support over 85 file types (Including image files).
Some of the more popular file types supported are: .doc, .xls, .sxc, .vsd, .rtf, .pdf, .ots, .sti, .txt, .xml, .pps, .stc, .csv, .ods, .ppt, .eml, .sub, .sxw, .aacdb, .dwg, .zip, .rar, .log, .mdb, and more.
When we search for specific patterns, we take into account the structure of the pattern we are searching for. For example, if a pattern must have a specific sequence of numbers/letters, we will only classify the correctly structured sequence. We also use proximity searching to eliminate false positives by giving the discovered pattern more context on the surrounding phrases/keywords in the file.
Outside of the 100’s of predefined rules, there is also the option to easily create your own rules, values and templates for discovery and classification specific to your business needs or requirements.
There are many different pre-defined rules and templates built into the solution that you can enable out of the box. If a pattern is found in the file that matches the rule applied, Lepide will tag and classify the data respectively. We will then index the file for reporting / alerting. The discovery and classification can either be run periodically across the full dataset or on the fly as and when the files are created / modified.

There are many variables that will determine the length of time it would take to successfully complete a scan, including the size of the dataset, the size of the file, the file types and the number of patterns/rules you have configured the solution to search the data for. We benchmark against industry standards and speeds when it comes to data discovery and classification.

We recommend running a full, deep scan across your data on a periodic basis (monthly or quarterly) and enable classification on-the-fly in the interim. Every time a new file is created/modified, Lepide will scan the files in real time to identify if there has been any newly created sensitive data