Integrated Data Discovery and Classification Software

Our mission here at Lepide is to help organizations like yours get the visibility you need over your data to ensure you can take the correct steps to secure it. We help thousands of organizations understand user behaviour and interaction with their files and folders and gain more insight into who has access to their data. Now, utilizing an integration into the data discovery capabilities in built into all versions of Windows, we’re able to provide context to our audit data.

Discover, Classify, Score and Tag Your Most Sensitive Data Using Technology You Already Own

See More

Get Detailed Analysis and Alerts on User Behaviour Through a Simple Integration

See More

Ensure Appropriate Access Rights by Analyzing Permissions to Your Unstructured Data

See More

Free trial Request a demo Request a quote

Discover, Classify, Score and Tag Your Most Sensitive Data Using Technology You Already Own

Discover Where Your Most Sensitive Files and Folders Reside

Using the Classification Management section of File Server Resource Manager (FSRM), you can automatically uncover your most sensitive files and folders by scanning the content based on a range of pre-defined conditions. Identify data based on PII, credit card numbers, dates of birth, full names, addresses and much more. Identify which files and folders contain information relevant to compliance mandates such as PCI, GDPR, SOX, HIPAA and more.

Tag, Classify and Score Your Sensitive Data Based on Risk

FSRM allows you to set Classification Properties that enable you to classify your data and automate both tagging and scoring. This functionality will help you detect your most critical data fast and spot data that directly relates to specific business use cases. For example, under PCI compliance you will need to identify all files that could potentially contain credit card numbers and demonstrate you can easily report on where this data is as well as applying the relevant security policies to protect it.

Classify Files and Folders ‘On the Fly’

In the Classification Rules section of FSRM, you can create simple rules to classify data based on an initial discovery process and then automatically at the point of creation. Near real time classification of the data enables you to automatically organize it by relevant categories and makes it infinitely easier when you need to locate it for compliance purposes.

An Easier Way to Identify Where Specific Data Subject Information Resides

When editing a Classification Rule within FSRM, you can uncover where all information about a specific ‘data subject’ resides within your unstructured data using a simple ‘string value’ in the Classification Parameters configuration. This could help you to easily identify where all relative data resides across your unstructured data if under request by a data subject who is exercising their rights to be forgotten.

Windows Data Discovery and Classification in Action       Watch Now

Get Detailed Analysis and Alerts on User Behaviour Through a Simple Integration

View All Your Most Sensitive Files and Folders in a Single, Flexible Report

A single report displays all your sensitive files and folders and allows you to filter, search or group for easy interrogation of the data. This feature of LepideAuditor enables you to add context to the raw data Microsoft provides and helps satisfy compliance audits. The data collected from multiple storage locations is then consolidated and centrally stored for multilocation reporting capabilities.

Spot Potential Data Breaches Involving Your Sensitive Data

With just a simple right click, you can instantly create alerts to track critical changes to a sensitive file or folder. Our threshold-based alerting allows you to create alerts if a group of conditions are met. You can apply contextual filters, so you only receive alerts around your most sensitive files. Get instant notifications when files are copied, moved, deleted, modified and renamed – or if permissions are modified. Alert when sensitive files are accessed, or access attempts have been made over a period of time. Determine which files and folders are utilized by which users and when.

Run One of Our Pre-Set User Behaviour Reports or Build Your Own

With multiple predefined reports and intuitive report builders around you unstructured data, we’re able to schedule a report with multiple filters and a range of reporting options based upon either one, a few of or all the files that contain sensitive data. These reports can be scheduled to be automatically delivered to a user of your choice via email; enabling you to automate the delivery of the report to either the data owner, your DPO, a compliance officer or Information Security Manager. Reports have been specifically designed for security and compliance mandates such as PCI, GDPR, SOX, HIPAA and more.

Group Your Sensitive Data Easily by Type, Location, Data Owner and Last Accessed Date

With our flexible reporting platform you’re able to drag, drop and group reports by either classification type (i.e. Credit Card, PII) by data owner, by last accessed date or a combination of multiple filters. You can then easily search, or sort, based on text or wild cards. You may have multiple classification rules configured and data tagged with different severity levels to help you adhere to specific compliance regulations or security policies. This will then help you sort the data based upon the compliance requirement you are working towards with flexible reporting around your most sensitive files.

Schedule a Personalized Demo       Click Here

Ensure Appropriate Access Rights by Viewing Current and Historic Permissions to Your Unstructured Data

View Who Has Permissions to Your Sensitive Data

Being able to determine current permissions in your File Server helps to ensure that only the right users have access to the right data – which will enable you to enforce a Policy of Least Privilege. LepideAuditor enables you to easily uncover and visualize who currently has which permissions to your most sensitive files and folders by comparing applied NTFS and Share Permissions.

Identify How, When and by What Means Access Was Granted

Using the permissions exploration feature, determine by what means and method the access was granted to this data, who granted the access levels and when. A simple way of helping to reduce the risks of permission sprawl on your most important files and folders. This means that, if a user is given excessive permissions to sensitive data (either directly inherited from a parent directory or applied through group membership), you are able to easily identify the effective permissions and the complete scope as to how these permissions are being granted.

Uncover and Compare Historical Permissions to Sensitive Data

Once installed, you will be able to create snapshots of current permissions to allow you to keep a track of historical permissions and compare them with just a few clicks. This gives a complete view of permission evolution through time. Understanding what permissions were applied to sensitive data in the past, what those permissions are today and how the permissions have evolved through that designated window of time.

Explore What a Specific User or Group Has Access to and At What Level

Pick a user or a group and easily drill down to see exactly which files and folders this user can access. You can also see the permission levels that apply to the specific files and folders to help you maintain control of the levels of permissions to your critical data.

Identify Data ‘At Risk’ By Showing Current Open Shares

A simple report enables you to see a list of all the open shares that exist within your environment, along with the files and folders that reside within them to help ensure you can spot data that is over exposed and needs to be secured down.

Explore Security Principles Behind Your Open Shares

See the means by which the open shares were ‘opened’ to help give context to them and determine whether you have any security breaches. You can see how they became open, so that you can prevent further unnecessary open shares being created.

Read all reviews

Read all stories

Latest Blogs
IT Security

Information Security Risk Management: How to Get it Right

Learn More

How Office 365 Audit Logging Can Improve Your Security

Learn More

Benefits of Achieving PCI Compliance

Learn More
Try LepideAuditor™

Lepide® is a registered trademark of Lepide Software Private Limited. © Copyright 2018 Lepide Software Private Limited. All trademarks acknowledged.