Upcoming Webinar       Active Directory and Windows Infrastructure as a Malware Tool       27th January, 2pm EST      Register Now
Archive for 2021

Lepide, a data security vendor has evaluated their entire product portfolio for exposure to this critical vulnerability in the Log4j open-source package announced on December 10, 2021. Confirmed Affected Products – Action Required (See instructions below) Lepide Active Directory Self Service Confirmed Unaffected Products/Tools – No Action Required Lepide Data Security Platform Lepide Data Security Platform Web Console and Report Viewer Lepide Change Reporter Lepide Account Lockout Examiner Lepide Open … Read more

The last few years have been challenging for many organizations, as the pandemic forced changes in infrastructure and working patterns, and a myriad of new security threats emerged. At Lepide, we understand that many companies face significant challenges with visibility over the security of their sensitive data. With Lepide Data Security Platform 21.2, we are taking the next step towards providing that complete customizable visibility. The Lepide Data Security Platform … Read more

8 March 2021, Austin, Texas – Over the years, we have come to understand the challenges customers are experiencing with other Data Security Platforms, and we have taken it all on board. With the Lepide Data Security Platform 21.1, we decided to completely overhaul how our solution scales, to better serve our customers’ needs. In organizations that have a large number of unstructured data stores, security teams have really struggled … Read more

Lepide and Atakama are pleased to announce that they have entered into a global strategic partnership, combining Lepide’s disruptive, scalable, enterprise Data Security Platform with Atakama’s unparalleled protection capabilities for sensitive information. With the increasing prevalence of insider threats and data breaches involving sensitive data, Lepide recognized the need to expand their data security offering, beyond threat detection and response, and integrate another layer of security through multi-factor encryption. By … Read more