“LepideAuditor is straightforward to use and effective right off the bat. Plus, the level of patience, attentiveness and technical knowhow is far beyond most support and sales teams I’ve seen before. ”
“While price was a factor, we ultimately chose Lepide as they were able to offer us threshold alerting, a way of separating out reporting duties to a web console and a site license with extended support and maintenance. ”
“LepideAuditor is a perfect fit for our IT Security and Compliance requirements. It helps us cut out a lot of wasted time and money and now we know we can be compliant with industry standards.”
“All the features that LepideAuditor has are simple to use and give us all the information we need to know that our data is secure and that we can be compliant with industry standards.”
“LepideAuditor is a very helpful means of monitoring the activity around our valuable data and core infrastructure. The audit logs are structured in a presentable format via intelligent reports.”
How We Help to Audit Dropbox Changes
- Track Changes to Files and FoldersWith easy to configure reporting in LepideAuditor you can easily ascertain all user activity around the files being shared through Dropbox. With visibility around Files being deleted, added, renamed moved or even copied, you have complete audit trail of how your business users are interacting with your company’s data.
- Get Insights into Dropbox Link SharingHaving a record and insight into how and when your business data is being shared is critical in identifying the early warning signs of a potential data breach on the horizon. With the consolidated view and powerful filtering options provided in LepideAuditor, you can quickly get a consolidated view of all activity around Dropbox link sharing, who shared the links and when.
- Monitor Permissions to Critical DataUnderstanding who has access to the data as well as who has elevated privileges to make changes to the groups surrounding the data is critical as part of a set of stringent security controls surrounding your potentially sensitive data. Understanding how groups are modified, if members are added to groups as well as if team members are added or removed is paramount in ensuring the right permissions and access levels are set across the content shared through Dropbox.