HTML Site Map

Homepage Last updated: 2019, April 12
Total pages: 1700

[1] 2
30 pages
Lepide | Data Security Platform for Breach Detection and Prevention
Lepide Privacy Policy
Awards & Reviews
Lepide’s Latest Media Coverage and Press Interviews
24 Hour Online Support for Lepide Range
NFR License
Lepide Support
Product Documentation Center for Lepide Solutions
Site Map Page 1 - Generated by www.xml-sitemaps.com
sitemap.xml
LepideAuditor | Enterprise Data Security Platform for Breach Prevention
Lepide Datasheets: Audit and Security Solutions
Lepide Videos
Case Studies - Success Stories of Lepide Solutions
Lepide Partner Reseller Program
Become an Authorised Partner of Lepide
Tell us about a new opportunity
Tell us about a new opportunity
Lepide Alliance Partnerships
Lepide | About Us | Our Vision and Mission
Prestigious Clients
Lepide – Meet The Team
Lepide Professional Services
Site Map Page 2 - Generated by www.xml-sitemaps.com
Client Testimonials of Lepide Range
Application for Sr. Technical Writer
Application for Product Developer
support-policy.pdf
Lepide Support
Careers
    
lepideauditor55 pages
Request a Demo for LepideAuditor
LepideAuditor | The Data Centric Audit and Protection Solution for Enterprises
Active Directory Auditing, Change Tracking & Reporting - LepideAuditor
Group Policy Auditing Solution to Audit & Report Group Policy Changes
File Server Auditing Solution to Audit and Report File Servers Changes
Exchange Auditing Solution to Audit & Report Exchange Server Changes
SharePoint Auditing Solution to Audit and Report SharePoint Changes
Audit SQL Server Changes with LepideAuditor for SQL Server
Office 365 Auditing and Reporting with LepideAuditor
G Suite Auditing and Reporting with LepideAuditor
Dropbox Auditing and Reporting with LepideAuditor
Audit Amazon Web Services S3 Buckets with LepideAuditor
Download the Trial version of LepideAuditor
Data Discovery & Classification Solution
Permissions and Privileges Analytics Solution
Environment States & Changes Auditing Solution
Schedule a Free Data Risk Assessment with Lepide
Data Access Governance Solution
Session Recording with LepideAuditor
Monitor the Health of Active Directory, Exchange and SQL Server
Password Expiration Reminders and Notifications for Active Directory Users
Restore Active Directory and Group Policy Objects with LepideAuditor
Exchange Online Auditing and Reporting with LepideAuditor
SharePoint Online Auditing and Change Reporting with LepideAuditor
Azure AD Auditing and Reporting with LepideAuditor
OneDrive for Business Auditing and Reporting with LepideAuditor
NetApp Filer Change Auditing & Reporting with LepideAuditor for File Server
Active Directory Cleanup Solution to Track & Manage Inactive Accounts
Request a Quote for LepideAuditor
Free Change Auditing and Reporting Solution for Critical IT Systems
Active Directory Change Reporting with Lepide Active Directory Auditor
LepideAuditor App to Get Real Time Change Notifications on Android and iOS Devices
Track Active Directory Changes in Real Time with Lepide AD Auditor
Active Directory Permission Auditing, Track Permission Changes with LepideAuditor
Permission change analysis of Active Directory, Exchange and File Servers with LepideAuditor
LepideAuditor - Awards & MVP Reviews
Group Policy Change Reporting with Lepide Group Policy Auditor
Track Group Policy Changes with Lepide Group Policy Auditor in Real Time
Track File Server Changes with LepideAuditor for File Server
Current Permission Analysis of Shared Files and Folders on File Server
File Access Auditing, Permission Change Audit on File Servers with LepideAuditor
File Share Auditing with LepideAuditor for File Server
Mailbox Access Auditing to Identify Non-Owners and Owners Accesses to Exchange Mailboxes
Exchange Server Change Tracking with LepideAuditor for Exchange Server
lepideauditor-compliance-reports.pdf
lepideauditor-audit-reports.pdf
data-access-governance-with-lepideauditor.pdf
Release History of LepideAuditor
Frequently Asked Questions about LepideAuditor
LepideAuditor SIEM (Security Information and Event Management) Integrations
Watch Change Auditing Webcast
View Screenshots of LepideAuditor
lepideauditor-suite-compliance-reports.pdf
lepideauditor-suite-audit-reports.pdf
risk-assessment-sample.pdf
         
success-stories7 pages
LepideAuditor Suite gave JSR the ability to proactively track changes being made to their critical IT systems
TechWorX achieve instant insight into IT changes through the deployment of Lepide auditing solutions
Thai-Aust Aluminium used LepideAuditor Suite to help get visibility into their File and SQL Servers
LepideAuditor Suite helped Jonckers get better visibility into what changes were occurring in their Active Directory and File Servers
LepideAuditor Suite helped Zaitoona College get visibility into Active Directory and File Server changes
LepideAuditor helped Kaplan easily meet the audit and compliance requirements of PCI
LepideAuditor helped Bass Coast Health track changes in their IT Environment
    
blog2 pages
Lepide Blog: A Guide to IT Security, Compliance and IT Operations
xmlrpc.php?rsd
         
businesses-not-able-to-recover-from-cyber-security-incidents-quickly-enough1 page
Businesses Not Able to Recover from Cyber-Security Incidents Quickly Enough
         
wp-includes1 page
wlwmanifest.xml
         
incident-response-plan-a-7-step-guide1 page
Incident Response Plan – A 7 Step Guide
         
5-forgotten-cybersecurity-best-practices1 page
5 Forgotten Cybersecurity Best Practices
         
6-tips-to-help-remote-workers-protect-their-data1 page
6 Tips to Help Remote Workers Protect Their Data
         
audit-successful-logon-logoff-and-failed-logons-in-activedirectory1 page
How to Audit Successful Logon/Logoff and Failed Logons in Active Directory
         
top-10-most-important-group-policy-settings-for-preventing-security-breaches1 page
Top 10 Most Important Group Policy Settings for Preventing Security Breaches
         
what-are-the-common-root-causes-of-account-lockouts-and-do-i-resolve-them1 page
What Are the Common Root Causes of Account Lockouts and How Do I Resolve Them?
         
5-things-you-need-to-audit-in-active-directory-for-gdpr1 page
5 Things You Need to Audit in Active Directory for GDPR
         
restore-deleted-objects-in-active-directory1 page
Restore Deleted Objects in Active Directory
         
page
              
21 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 2
              
31 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 3
              
41 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 4
              
51 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 5
              
221 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 22
              
191 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 19
              
171 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 17
              
161 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 16
              
151 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 15
              
141 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 14
              
61 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 6
              
71 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 7
              
131 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 13
              
101 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 10
              
111 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 11
              
121 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 12
              
81 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 8
              
91 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 9
              
181 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 18
              
211 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 21
              
201 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 20
              
231 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 23
              
241 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 24
              
251 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 25
              
261 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 26
              
271 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 27
              
281 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 28
              
291 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 29
              
301 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 30
              
311 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 31
              
321 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 32
              
331 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 33
              
341 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 34
              
351 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 35
              
361 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 36
              
371 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 37
              
381 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 38
              
391 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 39
              
401 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 40
              
411 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 41
              
421 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 42
              
431 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 43
              
441 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 44
              
451 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 45
              
461 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 46
              
471 page
Lepide Blog: A Guide to IT Security, Compliance and IT Operations - Page 47
         
what-is-data-privacy-and-how-to-improve-it1 page
What is Data Privacy and How to Improve it
         
is-gdpr-working-rise-in-reported-data-breaches-suggests-so1 page
Is GDPR Working? Rise in Reported Data Breaches Suggests So
         
3-ways-the-role-of-the-ciso-will-evolve-over-the-next-few-years1 page
3 Ways the Role of the CISO Will Evolve Over the Next Few Years
         
why-data-security-should-start-from-the-inside-out-and-how-to-do-it1 page
Why Data Security Should Start from the Inside Out (and How to Do It)
         
are-organizations-failing-when-it-comes-to-the-principle-of-least-privilege-polp1 page
Are Organizations Failing When It Comes to the Principle of Least Privilege (PoLP)?
         
implementing-least-privilege-security1 page
Implementing Least Privilege Security
         
privileged-access-management-pam-where-to-start1 page
Privileged Access Management (PAM): Where to Start
         
how-ueba-helps-detect-advanced-threats1 page
How UEBA Helps Detect Advanced Threats
         
healthcare-reports-highest-number-of-data-breaches-according-to-new-study1 page
Healthcare Reports Highest Number of Data Breaches According to New Study
         
why-arent-there-more-women-in-cybersecurity1 page
Why Aren’t There More Women in Cybersecurity?
         
common-challenges-with-auditing-your-it-environment1 page
4 Common Challenges with Auditing Your IT Environment (and How to Solve Them)
         
what-is-an-advanced-persistent-threat-and-how-to-defend-against-it1 page
What is an Advanced Persistent Threat (APT) and How to Defend Against It
         
insider-threats-dont-apply-to-me-do-they1 page
Insider Threats Don’t Apply to Me…Do They?
         
how-lepideauditor-can-help-companies-comply-with-ccpa1 page
How LepideAuditor Can Help Companies Comply With CCPA
         
why-siloed-data-discovery-and-classification-solutions-arent-enough1 page
Why Siloed Data Discovery and Classification Solutions Aren’t Enough
         
what-are-intrusion-prevention-systems-and-can-they-protect-your-network-from-attacks1 page
What Are Intrusion Prevention Systems and Can They Protect Your Network from Attacks?
         
why-arent-consumers-angrier-about-data-breaches1 page
Why Aren’t Consumers Angrier About Data Breaches?
         
tips-for-mitigating-data-breaches-when-using-cloud-services1 page
Tips for Mitigating Data Breaches When Using Cloud Services
         
marriott-data-breach-all-you-need-to-know1 page
The Marriott Data Breach: All You Need to Know
         
singhealth-singapores-worst-cyber-attack-so-far1 page
SingHealth: Singapore’s Worst Cyber-Attack So Far
         
why-it-is-important-to-keep-an-eye-on-your-office-365-administrators1 page
Why It Is Important to Keep an Eye on Your Office 365 Administrators
         
benefits-of-achieving-pci-compliance1 page
Benefits of Achieving PCI Compliance
         
what-to-audit-in-active-directory-to-meet-hipaa-compliance1 page
What to Audit in Active Directory to Meet HIPAA Compliance
         
is-your-business-prepared-for-the-forthcoming-gdpr1 page
Is your business prepared for the forthcoming GDPR?
         
keeping-your-active-directory-secure-when-delegating-privileges-to-users1 page
Keeping your Active Directory secure when delegating privileges to users
         
out-of-control-domain-administrators1 page
Out of Control: Domain Administrators
         
securing-your-active-directory-environment-what-you-need-to-know1 page
Securing your Active Directory environment – What you need to know
         
how-lepideauditor-helps-implement-the-principle-of-least-privilege1 page
How LepideAuditor helps implement the Principle of Least Privilege
         
are-cisos-prepared-to-detect-cyber-security-breaches1 page
Are CISOs Prepared to Detect Cyber-Security Breaches?
         
the-lepide-checklist-for-gdpr-compliance1 page
The Lepide Checklist for GDPR Compliance
         
employee-negligence-is-biggest-cyber-security-threat-to-us-companies1 page
Employee Negligence is Biggest Cyber Security Threat to US Companies
         
timehop-breach-reminder-of-the-importance-of-password-security1 page
Timehop Breach: Reminder of the Importance of Password Security
         
what-part-does-data-access-governance-play-in-securing-unstructured-data1 page
What Part Does Data Access Governance Play in Securing Unstructured Data?
         
lepideauditor-a-brief-comparison-to-native-office-365-auditing1 page
LepideAuditor: A Brief Comparison to Native Office 365 Auditing
         
why-it-is-important-to-know-where-your-data-flows1 page
Why it is Important to Know Where Your Data Flows
         
new-uk-government-cyber-security-standards-provide-framework-for-others-to-follow1 page
New UK Government Cyber Security Standards
         
the-difference-between-windows-active-directory-and-azure-ad1 page
The Difference Between Windows Active Directory and Azure AD
         
lessons-learned-from-the-dixons-carphone-gdpr-breach1 page
Dixons Carphone: Lessons from the First High Profile GDPR Data Breach
         
hipaa-the-difference-between-the-privacy-and-security-rules1 page
HIPAA: The Difference Between the Privacy and Security Rules
         
the-hidden-costs-of-a-ransomware-attack1 page
The Hidden Costs of a Ransomware Attack
         
how-to-perform-an-it-risk-assessment1 page
3 Steps to Performing a Successful Data Security Risk Assessment
         
how-active-directory-is-evolving-in-20181 page
How Active Directory is Evolving in 2018
         
why-you-simply-cannot-ignore-insider-threats-anymore1 page
Why You Simply Cannot Ignore Insider Threats Anymore
         
top-10-signs-that-your-system-has-been-compromised1 page
Top 10 Signs That Your System Has Been Compromised
         
5-phishing-techniques-to-watch-out-for-in-20181 page
5 Phishing Techniques to Watch Out for in 2018
         
7-reasons-why-healthcare-is-a-prime-target-for-cyber-criminals1 page
7 Reasons Why Healthcare Is A Prime Target for Cyber Criminals
         
4-ways-to-measure-your-cyber-security-effectiveness1 page
4 Ways to Measure Your Cyber-Security Effectiveness
         
why-native-auditing-fails-when-it-comes-to-group-policy-auditing1 page
Why Native Auditing Fails When It Comes to Group Policy Auditing
         
times-almost-up-are-you-ready-for-gdpr1 page
Time’s Almost Up – Are You Ready For GDPR?
         
healthcare-public-administration-still-plagued-by-insider-threats1 page
Healthcare & Public Administration Still Plagued by Insider Threats
         
14-mistakes-companies-make-in-preparation-for-gdpr1 page
14 Mistakes Companies Make in Preparation for GDPR
         
the-puzzling-mathematics-of-white-space-in-exchange-database1 page
The Puzzling Mathematics of ‘White Space’ in Exchange Database
         
does-compliance-have-a-bad-reputation1 page
Does Compliance Have a Bad Reputation?
         
ransomware-should-you-pay-the-ransom1 page
Ransomware: Should you Pay the Ransom?
         
how-you-can-improve-data-integrity-in-3-easy-steps1 page
What is Data Integrity and How do Reduce Data Integrity Risk
         
understanding-internal-controls-in-the-finance-industry1 page
Understanding Internal Controls in the Finance Industry
         
seven-steps-to-better-active-directory-privileged-access-management1 page
7 Steps to Better Active Directory Privileged Access Management
         
nine-ways-to-address-ransomware-attacks-in-todays-security-landscape1 page
9 Ways to Address Ransomware Attacks in Today’s Security Landscape
         
gdpr-compliance-and-data-protection-what-you-need-to-know1 page
GDPR Compliance and Data Protection: What You Need to Know
         
how-can-financial-services-sector-be-protected-from-cyber-crime1 page
How can Financial Services Protect Themselves from Cybercrime
         
how-important-are-global-threat-intelligence-services-to-your-defense-strategy1 page
How Important are Global Threat Intelligence Services to your Defense Strategy
         
gdpr-compliance-your-questions-answered1 page
GDPR Compliance: Your Questions Answered
         
eight-ways-lepideauditor-trumps-native-auditing1 page
8 Ways LepideAuditor Trumps Native Auditing
         
ransomware-in-2018-will-it-be-worse-than-20171 page
Ransomware in 2018: Will it be worse than 2017?
         
why-active-directory-logon-controls-simply-arent-enough1 page
Why Active Directory Logon Controls Simply Aren’t Enough
         
a-closer-look-at-insider-threats-in-the-financial-sector1 page
A Closer Look at Insider Threats in the Financial Sector
         
privileged-access-management-six-ways-it-fails-and-how-to-deal-with-it1 page
Privileged Access Management: 6 Ways it Fails and How to Deal With it
         
five-security-principles-to-prevent-data-breaches-immediately1 page
Five Security Principles to Prevent Data Breaches Immediately
         
seven-ways-to-secure-critical-data-in-the-government-sector1 page
7 Ways to Secure Critical Data in the Government Sector
         
the-top-five-mistakes-executives-make-following-a-data-breach1 page
The Top 5 Mistakes Executives Make Following a Data Breach
         
gdpr-and-hipaa-what-are-the-key-differences1 page
GDPR and HIPAA: What are the key differences?
         
a-wolf-in-sheeps-clothing-identifying-malicious-insiders1 page
A Wolf in Sheep’s Clothing: Identifying Malicious Insiders
         
the-role-of-hipaa-compliance-in-the-protection-of-patient-data1 page
The Role of HIPAA Compliance in the Protection of Patient Data
         
nine-ways-to-prevent-ex-employees-from-compromising-it-security1 page
Nine ways to Prevent Ex-employees from Compromising IT security
         
why-real-time-data-monitoring-is-essential-in-preventing-security-threats1 page
Why Real-Time Data Monitoring is Essential in Preventing Security Threats
         
more-than-forty-of-companies-dont-know-where-their-data-is-stored1 page
More than 40% of Companies Don’t Know Where their Data is Stored
         
top-10-ways-to-secure-your-file-servers1 page
Top 10 Ways to Secure Your File Servers
         
the-pros-and-cons-of-being-a-system-administrator1 page
The Pros and Cons of Being a System Administrator
         
why-you-need-to-audit-privileged-access-in-active-directory1 page
Why You Need to Audit Privileged Access in Active Directory
         
how-lepideauditor-addresses-compliance-in-the-finance-sector1 page
How LepideAuditor Addresses Compliance in the Finance Sector
         
eight-simple-ways-to-spot-a-potential-security-breach-with-lepideauditor1 page
8 Simple Ways to Spot a Potential Security Breach with LepideAuditor
         
ten-ways-to-prevent-network-security-breaches-in-the-workplace1 page
10 Ways to Prevent Network Security Breaches in the Workplace
         
nine-tips-for-preventing-misuse-of-service-accounts-in-active-directory1 page
9 Tips for Preventing misuse of Service Accounts in Active Directory
         
the-biggest-threat-to-your-it-security-employee-negligence1 page
The Biggest Threat to Your IT Security? Employee Negligence
         
what-do-we-know-about-bad-rabbit-and-what-can-businesses-do-to-protect-themselves1 page
What do We Know About “Bad Rabbit”, and What can Businesses do to Protect Themselves
         
how-will-the-new-data-protection-bill-affect-your-company1 page
How will the new Data Protection Bill affect your company
         
staying-compliant-with-the-gdpr-best-practices1 page
Staying Compliant with the GDPR: Best Practices
         
dpos-gdpr-frequently-asked-questions1 page
DPOs and GDPR: Frequently Asked Questions
         
gdpr-and-privacy-by-design1 page
GDPR And Privacy by Design
         
six-simple-ways-to-ensure-data-access-governance-for-file-server-with-lepideauditor1 page
6 Simple Ways to Ensure Data Access Governance for File Server with LepideAuditor
         
overcoming-the-limitations-of-siem-solutions-with-lepideauditor1 page
Overcoming the Limitations of SIEM Solutions with LepideAuditor
         
10-reasons-why-you-need-lepideauditor1 page
10 Reasons Why You Need LepideAuditor
         
top-10-things-to-audit-in-active-directory1 page
Top 10 Things to Audit in Active Directory
         
protecting-your-active-directory-permissions1 page
Protecting your Active Directory Permissions
         
understanding-windows-event-forwarding1 page
Understanding Windows Event Forwarding
         
the-qualities-you-need-to-be-a-good-system-administrator1 page
The Qualities You Need to be a Good System Administrator
         
data-breach-horror-stories-the-worst-breaches-of-2017-so-far1 page
Data Breach Horror Stories: The Worst Breaches of 2017 so far
         
nhs-ransomware-attack-could-have-been-avoided-says-the-national-audit-office1 page
NHS Ransomware Attack Could Have Been Avoided Says the National Audit Office
         
governance-risk-and-compliance-an-easy-solution-to-a-difficult-challenge1 page
Governance, Risk and Compliance: An Easy Solution to a Difficult Challenge
         
responding-to-events-that-indicate-ransomware-and-insider-threats1 page
Responding to Events that Indicate Ransomware, Insider Threats, and other Egregious Attacks
         
why-mastering-the-principle-of-least-privilege-is-essential1 page
Why Mastering the Principle of Least Privilege is Essential
         
6-ways-lepideauditor-helps-increase-security-in-the-healthcare-sector1 page
6 Ways LepideAuditor Helps Increase Security in the Healthcare Sector
         
9-reasons-your-organization-needs-a-data-loss-prevention-plan1 page
9 Reasons your Organization Needs a Data Loss Prevention Plan
         
security-best-practices-for-active-directory1 page
Security Best Practices for Active Directory
         
7-ways-to-protect-active-directory-against-security-threats-using-lepideauditor1 page
7 Ways to Protect Active Directory Against Security Threats using LepideAuditor
         
what-can-hospitals-do-to-protect-themselves-from-cyber-attacks1 page
What can Hospitals do to Protect Themselves from Cyber-Attacks?
         
siem-vs-real-time-event-detection-and-reporting1 page
SIEM vs Real-time Event Detection and Reporting
         
the-importance-of-separating-duties-and-auditing-critical-changes1 page
The Importance of Separating Duties and Auditing Critical Changes
         
how-will-the-new-uk-data-protection-laws-affect-your-business1 page
How will the new UK Data Protection Laws affect your Business?
         
5-ways-not-monitoring-group-policy-changes-can-lead-to-disaster1 page
5 Ways not Monitoring Group Policy Changes can Lead to Disaster
         
smbs-and-cost-effective-data-protection1 page
SMBs and Cost Effective Data Protection
         
10-things-to-look-for-in-a-file-auditing-solution1 page
The Top 10 Things to Look for in a File Auditing Solution
         
10-tips-for-securing-windows-file-servers1 page
10 Tips for Securing Windows File Servers
         
what-can-you-do-if-youve-become-the-victim-of-a-ransomware-attack1 page
What can you do if you’ve become the victim of a ransomware attack?
         
3-ways-to-help-stop-data-leakage-in-your-organisation1 page
3 Ways to Help Stop Data Leakage in Your Organisation
         
5-policies-that-can-help-keep-your-active-directory-secure1 page
5 policies that can help keep your Active Directory secure
         
securing-domain-controllers-by-auditing-active-directory1 page
Securing Domain Controllers by Auditing Active Directory
         
healthcare-breaches-is-there-light-at-the-end-of-the-tunnel1 page
Healthcare Breaches – Is there light at the end of the tunnel?
         
8-different-methods-to-identify-privileged-users1 page
8 Different Methods to Identify Privileged Users
         
is-pro-activity-the-best-way-to-deal-with-insider-threats1 page
Is pro-activity the best way to deal with insider threats?
         
the-number-of-data-breaches-are-increasing-at-record-pace1 page
The Number of Data Breaches are Increasing at “Record Pace”, According to New Report
         
a-lesson-in-password-policy-and-it-security-from-peep-show1 page
A Lesson in Password Policy and IT Security from Peep Show
         
10-steps-must-take-to-secure-active-directory1 page
10 Critical Steps All Companies Must Take to Secure Active Directory
         
4-ways-the-sweden-data-leak-could-have-been-avoided1 page
4 Ways the Sweden Data Leak Could Have Been Avoided
         
do-you-still-need-a-siem1 page
Do you still need a SIEM?
         
every-member-of-staff-has-a-role-to-play-in-protecting-company-data1 page
Every member of staff has a role to play in protecting company data
         
auditing-and-monitoring-of-active-directory-whats-the-difference1 page
Auditing and monitoring of Active Directory – what’s the difference?
         
how-to-detect-if-a-user-has-excessive-permissions-on-shared-folders1 page
How to detect if a user has excessive permissions on shared folders
         
common-mistakes-employees-make-that-lead-to-data-leakage1 page
Common Mistakes Employees Make That Lead to Data Leakage
         
reacting-to-the-petya-ransomware-attack-what-can-you-do1 page
Reacting to the ‘Petya’ Ransomware Attack: What Can You Do?
         
our-checklist-for-preventing-data-breaches1 page
Our Checklist for Preventing Data Breaches
         
reporting-on-historical-events-in-active-directory1 page
Reporting on historical events in Active Directory made easy
         
top-10-ways-to-stop-insider-threats1 page
Top 10 ways to stop insider threats
         
file-server-auditing-made-easy1 page
File Server auditing made easy
         
survey-finds-many-organizations-are-at-risk-from-insider-threats1 page
Survey finds many organizations are at risk from insider threats
         
how-to-perform-non-owner-mailbox-access-auditing-in-exchange-20161 page
How to audit non-owner mailbox access in Exchange 2016
         
18-things-it-auditors-need-to-know1 page
18 Things IT Auditors Need to Know
         
270000-customers-may-be-affected-by-wonga-data-breach1 page
270,000 customers may be affected by Wonga data breach
         
it-auditing-and-configuration-drift1 page
IT Auditing and Configuration Drift
         
nine-tips-on-preparing-for-and-passing-your-next-it-audit1 page
Nine Tips on Preparing For and Passing Your Next IT Audit
         
lepideauditor-suite-review-by-tom-lowson1 page
LepideAuditor Suite Review By Tom Lowson
         
three-reasons-why-change-control-is-important1 page
3 Reasons Why Change Control Is Important
         
protect-active-directory-against-security-configuration-drift1 page
Protecting Your Active Directory Against Security Configuration Drift
         
file-server-auditing-as-a-tool-for-ensuring-compliance1 page
File Server Auditing as a Tool for Ensuring Compliance
         
best-practices-for-active-directory-audit-logging1 page
Best Practices for Active Directory Audit Logging
         
protect-privileged-credentials-using-windows-server-2016-pam1 page
Protecting Privileged Credentials Using Windows Server 2016 PAM
         
pci-compliance-for-active-directory-administrators1 page
PCI Compliance for Active Directory Administrators
         
improve-file-server-security-using-abe1 page
Improve File Server Security Using Access-Based Enumeration (ABE)
         
cia-triad-the-basic-principals-of-data-security1 page
CIA triad – The Basic Principals of Data Security
         
do-you-really-need-a-dpo1 page
Do you really need a DPO?
         
heres-what-you-need-to-know-about-gdpr-including-how-it-will-be-affected-by-brexit1 page
Here’s What You Need to Know About GDPR – Including How It Will Be Affected by Brexit
         
the-state-of-it-auditing-today1 page
The state of IT auditing today
         
it-security-roundup-july-august-20161 page
IT Security Roundup – July/August 2016
         
track-of-file-folder-access-modification-and-location1 page
How to keep track of file/folder access, modification and location
         
auditing-things-all-it-departments-need-to-know1 page
Things all IT departments need to know about IT auditing
         
hipaa-compliance-how-to-avoid-getting-caught-out1 page
HIPAA Compliance – how to avoid getting caught out
         
how-to-perform-current-permission-analysis-with-file-server-auditor1 page
How to perform current permission analysis with File Server Auditor
         
what-to-look-for-when-choosing-the-right-active-directory-auditing-solution1 page
What to look for when choosing the right Active Directory auditing solution
         
insider-security-threats-common-mistakes-organizations-make-and-how-to-avoid-them1 page
Insider security threats: common mistakes organizations make and how to avoid them
         
what-we-learnt-at-infosec-20161 page
What we learnt at InfoSec 2016
         
security-and-the-need-for-user-account-auditing1 page
Security and the need for user account auditing
         
who-what-when-and-where-auditing-your-it-systems1 page
Who, What, When, and Where – the things you need to know when auditing your IT environment
         
top-10-audit-reports-for-it-teams1 page
Top 10 Audit Reports for IT Teams
         
identify-server-files-have-been-deleted1 page
Best practice for auditing and monitoring file/folder level activity
         
why-dont-gartner-do-a-quadrant-for-it-auditing1 page
Why don’t Gartner do a quadrant for IT auditing?
         
guarantee-a-merry-christmas-with-lepideauditor-suite1 page
Guarantee a merry Christmas with LepideAuditor Suite
         
9-critical-flaws-in-auditing-active-directory-natively1 page
9 critical flaws in auditing Active Directory natively
         
to-audit-or-not-to-audit-that-is-the-question1 page
To audit or not to audit… that is the question
         
how-ad-inactive-accounts-harm-security1 page
Do inactive accounts harm the Active Directory network security?
         
does-forcing-users-to-change-passwords-more-frequently-really-amount-to-increased-security1 page
Does forcing users to change passwords more frequently really amount to increased security?
         
active-directory-security-tips1 page
Real world practical tips to make Active Directory security a sure thing
         
securing-domain-controllers-to-protect-active-directory-why-and-how1 page
Securing Domain Controllers to Protect Active Directory – Why and How?
         
how-to-come-up-with-a-better-password-management-system1 page
How to come up with a Better Password Management System
         
how-to-securely-use-a-self-service-password-reset-solution1 page
Best Practice: How to Securely Use a Self-Service Password Reset Solution
         
is-windows-azure-active-directory-for-you1 page
Is Windows Azure Active Directory for You?
         
how-to-tackle-malicious-password-attacks1 page
How to tackle malicious password attacks and reduce costs involved in servicing legitimate account lockouts
         
new-compliance-regulations-and-their-implications-on-your-business1 page
New Compliance Regulations and their Implications on Your Business
         
protecting-credit-card-data-should-be-a-top-priority1 page
Protecting Credit Card Data Should be a Top Priority
         
why-you-need-centralized-event-log-management1 page
Why you need centralized event log management
         
how-event-log-monitoring-programs-work1 page
How Event Log monitoring programs work
         
effectively-manage-network-wide-event-collection-and-auto-correlation1 page
Effectively manage Network wide event collection and auto-correlation
         
remove-log-size-restrictions-with-lelm1 page
Remove log size restrictions with LELM
         
event-log-management-script-tools-vs-standalone-utilities1 page
Event log management script tools Vs standalone utilities
         
event-log-monitoring1 page
Event Log Monitoring
         
syslog-based-centralized-log-management-with-event-log-manager1 page
Syslog based centralized log management with event log manager
         
how-securing-data-access-across-windows-servers-help-organizations-to-better-manage-their-shared-data1 page
How securing data access across Windows Servers help organizations to better manage their shared data
         
dynamic-access-control-for-file-server-21 page
Dynamic Access Control for File Server – Part 2
         
audit-file-access-and-share-with-lepideauditor-for-file-server1 page
Auditing File Access and File Share using LepideAuditor for File Server
         
dynamic-access-control-for-file-server-11 page
Dynamic Access Control for File Server – Part 1
         
can-third-party-windows-server-auditors-work-on-android-platform1 page
Can Third Party Windows Server Auditors Work on Android Platform?
         
prerequisites-for-hassle-free-file-server-auditing1 page
Prerequisites for hassle-free File Server Auditing
         
lepide-software-launches-lepideauditor-for-file-server1 page
Lepide Software Launches LepideAuditor for File Server
         
are-it-and-efficiency-mutually-exclusive1 page
Are IT and Efficiency Mutually Exclusive?
         
internet-of-things-part-21 page
Moving towards a Smarter Internet: Internet of Things Part II (Present, Challenges & Opportunities)
         
upgrade-windows-server-2003-to-latest-one1 page
Countdown Begins! It’s High Time to Upgrade Windows Server 2003 to Latest One
         
internet-of-things-part-11 page
Moving towards a Smarter Internet: Internet of Things Part I (Present, Challenges, Threats & Opportunities)
         
analyzing-organizational-cyberspace-security-sony-hack1 page
Analyzing Organizational Cyberspace Security in the Awakening of Sony Hack
         
forecasting-technology-trends-20151 page
Forecasting Technology Trends 2015: Stand up and Take Notice!
         
why-third-party-tools-to-manage-server-and-networking-infrastructure1 page
Why Select Third-Party Tools to Manage Server and Networking Infrastructures?
         
why-techies-need-to-slow-down-for-better-health1 page
Why Techies Need To Slow Down For Better Health
         
10-statements-to-ruin-your-day1 page
10 statements to ruin your day
         
death-of-a-salesman1 page
Death of a salesman
         
like-us-vote-for-our-products1 page
Like us. Vote for our products
         
last-logon-reporter-tool1 page
Last logon Reporter Tool
         
the-panama-papers-what-we-know-so-far1 page
The Panama Papers – What we know so far
         
can-ex-employees-sabotage-your-it-assets-at-their-will1 page
Can ex-employees sabotage your IT assets at their will?
         
security-vs-trust1 page
Security vs. Trust – It’s all about Behavior
         
ashley-madison-data-leak-what-are-the-lessons1 page
Ashley Madison data leak – What are the lessons?
         
minimalize-the-risk-and-protect-yourself-from-thwarting-cyber-attacks1 page
Minimalize the risk and protect yourself from thwarting cyber-attacks
         
ten-it-admin-mistakes-that-can-be-expensive-on-security-and-productivity-fronts1 page
Ten IT admin mistakes that can be expensive on security and productivity fronts
         
administration-duties-for-improved-security-and-change-control1 page
3 Ways to Separate Administration Duties for Improved Security and Change Control
         
failure-to-secure-end-user-devices-leaves-servers-and-data-at-risk1 page
Failure to Secure End-User Devices Leaves Servers and Data at Risk
         
bring-sql-server-management-studio-on-mobile1 page
A Thought to Bring the SQL Server Management Studio on Mobile
         
are-you-using-sql-server-management-studio-effectively1 page
Are You Using SQL Server Management Studio effectively?
         
manage-stored-sql-mdf-files-and-improve-sql-server-performance1 page
Manage stored SQL MDF files and improve SQL server performance
         
enhance-sql-database-performance-with-sql-storage-manager1 page
Enhance SQL database performance with SQL storage manager
         
tips-for-surviving-an-it-audit1 page
Tips for Surviving an IT Audit
         
auditing-account-management-and-directory-service-access1 page
Auditing Account Management and Directory Service Access in Windows Server 2012
         
stay-safe-of-security-risks-this-holiday-season1 page
Stay safe of security risks this holiday season
         
ad-user-management-with-powershell1 page
Active Directory User Management using Windows PowerShell
         
troubleshoot-ad-account-lockouts1 page
How to Troubleshoot Active Directory Account Lockouts and Manage Employee Productivity
         
common-mistakes-by-admins-in-log-analysis1 page
Common mistakes made by Admins during log analysis
         
overcoming-the-limitations-of-native-ad-auditing-with-laad1 page
Overcoming the limitations of Native Auditing with LepideAuditor for Active Directory
         
manage-password-expiration-in-active-directory1 page
An effective way to manage password expiration in Active Directory
         
audit-sql-server-for-advanced-server-performance1 page
Audit SQL Server for restraining data threats and experience advanced server performance
         
factors-to-be-considered-while-performing-an-active-directory-security-audit1 page
Factors to be considered while performing an active directory security audit
         
use-active-directory-self-service-to-meet-ad-challenges1 page
Use Active Directory self service to meet AD challenges
         
ad-management-complexities-and-need-of-self-service-facility1 page
AD management complexities and need of self service facility
         
get-over-identity-management-obstacles-with-ad-self-service1 page
Get over Identity Management obstacles with AD Self Service
         
how-adss-is-important-to-increase-organizations-productivity1 page
How ADSS is important to increase organizations productivity
         
automatic-directory-update-with-self-service1 page
Automatic directory update with self service
         
active-directory-user-rights-management1 page
Active Directory User rights management
         
enable-ad-recycle-bin1 page
Enable AD Recycle Bin
         
self-service-applications-for-active-directory1 page
Self service applications for Active Directory
         
end-user-self-service-through-scsm-portal-but-is-it-enough1 page
End user self service through SCSM portal- But is it enough?
         
how-do-siem-solutions-help-mitigate-advanced-persistent-threats-apt1 page
How do SIEM Solutions Help Mitigate Advanced Persistent Threats (APT)?
         
the-future-of-data-protection-in-the-uk1 page
The Future of Data Protection in the UK
         
prevent-petya-and-other-ransomware-attacks-by-disabling-smbv11 page
Prevent Petya and other Ransomware attacks by disabling SMBv1
         
remove-users-admin-rights-to-prevent-insider-hacks1 page
Remove Admin Rights from Users to Prevent Insider Hacks
         
businesses-are-failing-to-report-their-most-disruptive-data-breaches1 page
Businesses are Failing to Report Their Most Disruptive Data Breaches
         
3-things-the-deloitte-breach-can-teach-you-about-mastering-it-security1 page
3 Things the Deloitte Breach Can Teach You About Mastering IT Security
         
is-gdpr-enforceable-in-practice-outside-of-the-eu1 page
Is GDPR Enforceable in Practice Outside of the EU?
         
insider-threats-5-ways-protect-and-secure-sensitive-data1 page
Insider Threats: 5 Ways your Company Can Protect and Secure Sensitive Data
         
the-importance-of-data-classification1 page
The Importance of Data Classification
         
why-choose-lepideauditor-over-native-auditing-for-it-security-and-compliance1 page
Improving IT Security and Compliance: LepideAuditor vs Native Auditing
         
why-automated-response-is-critical-to-it-security1 page
Why Automated Response is Critical to IT Security and how Lepide helps
         
top-10-risks-to-active-directory-security1 page
Top 10 Risks to Active Directory Security
         
gearing-up-to-fight-ransomware-attacks1 page
Gearing up to Fight Ransomware Attacks
         
how-lepideauditor-overcomes-the-limitations-of-auditing-office-365-natively1 page
How LepideAuditor Overcomes the Limitations of Auditing Office 365 Natively
         
overcoming-common-visibility-issues-with-exchange-server-auditing1 page
Overcoming Common Visibility Issues with Exchange Server Auditing
         
cyber-security-awareness-checklist-for-financial-institutions1 page
Cyber Security Awareness Checklist for Financial Institutions
         
what-steps-can-law-firms-take-to-protect-their-confidential-data1 page
What Steps can Law Firms take to Protect their Confidential Data?
         
uber-uncool-do-we-really-know-how-many-data-breaches-there-are1 page
Uber-Uncool: Do We Really Know How Many Data Breaches There Are?
         
privileged-users-growing-threat-to-your-it-security1 page
A Growing Threat to your IT Security: Privileged Users
         
how-to-use-active-directory-services-to-meet-security-and-compliance-requirements1 page
How to use Active Directory Services to Meet Security and Compliance Requirements
         
improving-security-and-compliance-ten-common-active-directory-mistakes1 page
Improving Security and Compliance: 10 Common Active Directory Mistakes
         
how-lepideauditor-helps-increase-security-in-the-education-sector1 page
How LepideAuditor Helps Increase Security in the Education Sector
         
how-the-security-reports-in-lepideauditor-help-you-protect-sensitive-data1 page
How the Security Reports in LepideAuditor Help You Protect Sensitive Data
         
how-will-the-gdpr-affect-companies-in-the-usa1 page
How will the GDPR Affect Companies in the USA
         
ten-ways-to-improve-data-security1 page
10 Ways to Improve Data Security
         
eight-technologies-financial-institutions-should-be-aware-of1 page
8 Technologies Financial Institutions Should Be Aware Of
         
insider-threats-in-healthcare-280000-medicaid-patient-records-hacked1 page
Insider Threats in Healthcare: 280,000 Medicaid Patient Records Hacked
         
ten-predictions-for-it-security-in-20181 page
10 Predictions for IT Security in 2018
         
how-can-financial-institutions-prevent-and-recover-from-a-data-breach1 page
How can Financial Institutions Prevent and Recover from a Data Breach
         
how-can-educational-institutions-respond-to-the-growing-threat-of-a-cyber-attack1 page
How can Educational Institutions Respond to the Growing Threat of a Cyber-Attack?
         
the-10-biggest-data-security-problems-in-the-healthcare-industry1 page
The 10 Biggest Data Security Problems in the Healthcare Industry
         
pci-3-2-best-practices-will-soon-be-mandatory-prepare-yourself-for-february-1st-20181 page
PCI 3.2 Best Practices Will Soon Be Mandatory: Prepare yourself for February 1st 2018
         
how-would-your-organization-fare-if-faced-with-this-data-security-issue1 page
How Would Your Organization Fare if Faced with This Data Security Issue?
         
have-you-left-it-unlocked-with-the-keys-in1 page
Have You Left It Unlocked with The Keys In?
         
improve-file-server-security-by-delegating-outside-of-the-it-department1 page
Improve File Server Security by Delegating Outside of the IT Department
         
4-steps-to-securing-unstructured-data-for-compliance1 page
4 Steps to Securing Unstructured Data for Compliance
         
sears-and-delta-breaches-reinforce-need-for-pci-dss-compliance1 page
Sears and Delta Breaches Reinforce Need for PCI DSS Compliance
         
data-protection-officers-and-gdpr-what-you-need-to-know1 page
Data Protection Officers and GDPR: What You Need to Know
         
what-gdpr-really-means-for-banks-and-finance-houses1 page
What GDPR Really Means for Banks and Finance Houses
         
how-automated-compliance-reports-can-help-mitigate-risk-of-non-compliance1 page
How Automated Compliance Reports Can Help Mitigate Risk of Non-Compliance
         
the-ico-prepare-to-run-gdpr-campaign-aimed-at-consumers1 page
The ICO Prepare to Run GDPR Campaign Aimed at Consumers
         
the-importance-of-a-capable-compliance-manager1 page
The Importance of a Capable Compliance Manager
         
how-to-stay-compliant-with-pci-3-2-a-checklist1 page
How to Stay Compliant with PCI 3.2: A Checklist
         
the-threat-of-unstructured-data1 page
The Threat of Unstructured Data
         
why-you-need-to-audit-privileged-accounts-in-active-directory1 page
Why you Need to Audit Privileged Accounts in Active Directory
         
most-companies-think-their-active-directory-is-secure-until-they-talk-to-us1 page
Most Companies Think Their Active Directory is Secure Until They Talk to Us
         
poor-visibility-and-weak-passwords-are-putting-active-directory-at-risk1 page
Poor Visibility and Weak Passwords are Putting Active Directory at Risk
         
how-auditing-access-rights-and-changes-strengthen-security1 page
How Auditing Access Rights, States and Changes Helps Strengthen Security
         
how-to-ensure-your-active-directory-is-secure1 page
How to Ensure Your Active Directory is Secure
         
do-you-need-an-active-directory-auditing-tool1 page
Do You Need An Active Directory Auditing Tool?
         
how-to-manage-privileged-users-for-better-security-and-compliance1 page
How to Manage Privileged Users for Better Security and Compliance
         
how-cisos-are-adapting-to-meet-the-rising-threat-of-a-cyber-attack1 page
How CISOs are Adapting to Meet the Rising Threat of a Cyber-Attack
         
how-to-prevent-data-breaches-in-the-healthcare-sector1 page
How to Prevent Data Breaches in the Healthcare Sector
         
why-auditing-permissions-is-an-essential-part-of-your-it-security-plan1 page
Why Auditing Permissions is an Essential Part of Your IT Security Plan
         
the-problem-of-privilege-management-in-data-security1 page
The Problem of Privilege Management in Data Security
         
when-is-a-data-breach-really-considered-a-data-breach-in-the-usa1 page
When is a Data Breach Really Considered a Data Breach in the USA?
         
governments-now-using-have-i-been-pwned-to-check-data-breach-status1 page
Governments Now Using “Have I Been Pwned” to Check Data Breach Status
         
what-we-can-learn-from-the-atlanta-ransomware-attack1 page
What We Can Learn from the Atlanta Ransomware Attack
         
ransomware-attacks-in-the-healthcare-sector1 page
Ransomware Attacks in the Healthcare Sector
         
how-lepideauditor-helps-meet-hipaa-compliance1 page
How LepideAuditor Helps Meet HIPAA Compliance
         
four-things-you-should-know-about-it-risk-assessments1 page
4 Things You Should Know About IT Risk Assessments
         
gdpr-warning-ico-issues-record-fines-in-january1 page
GDPR Warning: ICO Issues Record Fines in January
         
how-to-be-compliant-in-20181 page
How to Be Compliant in 2018
         
why-it-security-is-inside-out1 page
Why IT Security Is Inside Out
         
the-myth-of-ransomware-prevention-solutions1 page
The Myth of Ransomware Prevention Solutions
         
have-you-forgotten-about-your-sox-compliance-audit1 page
Have you Forgotten About your SOX Compliance Audit?
         
gdpr-are-companies-concerned-about-the-consequence-of-non-compliance1 page
GDPR: Are Companies Concerned About the Consequence of Non-Compliance?
         
local-authorities-need-to-start-preparing-for-the-gdpr1 page
Local Authorities Need to Start Preparing for the GDPR
         
gdpr-likely-to-hit-mid-market-organizations-the-hardest1 page
GDPR Likely to Hit Mid-Market Organizations the Hardest
         
reporting-a-breach-under-the-gdpr1 page
Reporting a Breach Under the GDPR
         
tesla-security-breach-highlights-lack-of-insider-monitoring1 page
Tesla Security Breach Highlights Lack of Insider Monitoring
         
security-policies-cisos-must-implement1 page
Security Policies CISOs Must Implement
         
password-policy-best-practices-our-suggestions1 page
Password Policy Best Practices – Our Suggestions
         
what-cisos-can-learn-from-the-yahoo-data-breach-fine1 page
What CISOs Can Learn from the Yahoo Data Breach Fine
         
insider-threats-preparation-best-practices-and-detection1 page
Insider Threats: Preparation, Best Practices and Detection
         
the-danger-of-delayed-threat-detection-and-how-to-prevent-it1 page
The Danger of Delayed Threat Detection and How to Prevent it
         
5-steps-for-developing-a-successful-data-access-governance-dag-program1 page
5 Steps for Developing a Successful Data Access Governance (DAG) Program
         
data-classification-the-whys-and-the-hows1 page
Data Classification: The Why’s and the How’s
         
a-year-after-wannacry-what-lessons-have-been-learned1 page
A Year After WannaCry, What Lessons Have Been Learned?
         
5-ways-ransomware-is-changing-in-20181 page
5 Ways Ransomware is Changing in 2018
         
how-will-a-cyber-attack-impact-your-business1 page
How Will A Cyber-Attack Impact Your Business?
         
how-can-we-prevent-employees-violating-security-policies1 page
How Can We Prevent Employees Violating Security Policies?
         
how-to-keep-ephi-out-of-the-wrong-hands-whilst-ensuring-availability1 page
How to Keep ePHI Out of the Wrong Hands, Whilst Ensuring Availability
         
how-does-privilege-separation-improve-it-security1 page
How Does Privilege Separation Improve IT Security?
         
aggregating-auditing-data-from-multiple-cloud-services-using-a-dcap-solution1 page
Aggregating & Auditing Data from Multiple Cloud Services Using a DCAP Solution
         
why-auditing-office-365-natively-isnt-enough1 page
Why Auditing Office 365 Natively Isn’t Enough
         
how-lepideauditor-can-help-to-protect-active-directory1 page
How LepideAuditor Can Help to Protect Active Directory
         
how-enterprises-are-making-use-of-user-entity-behavior-analytics-ueba1 page
How Enterprises are Making Use of User & Entity Behavior Analytics (UEBA)
         
why-now-is-the-time-for-a-data-centric-security-strategy1 page
Why Now is the Time for a Data-Centric Security Strategy
         
what-is-data-centric-audit-and-protection-dcap1 page
What is Data-Centric Audit and Protection (DCAP)?
         
do-disabled-and-deleted-accounts-in-sharepoint-create-a-security-risk1 page
Do Disabled and Deleted Accounts in SharePoint Create a Security Risk?
         
why-active-directory-is-the-main-target-of-insider-cyber-attacks1 page
Why Active Directory is the Main Target of Insider Cyber-Attacks
         
how-office-365-audit-logging-can-improve-your-security1 page
How Office 365 Audit Logging Can Improve Your Security
         
should-you-be-concerned-about-gdpr-fines1 page
Should You be Concerned About GDPR Fines?
         
naughty-microsoft-are-gdpr-fines-incoming1 page
Naughty Microsoft: Are GDPR Fines Incoming?
         
is-gdpr-working-to-increase-data-security1 page
Is GDPR Working to Increase Data Security?
         
is-your-data-access-governance-program-fit-for-gdpr-compliance1 page
Is Your Data Access Governance Program Fit for GDPR Compliance?
         
the-top-10-data-breaches-of-20181 page
The Top 10 Data Breaches of 2018
         
the-difference-between-information-security-and-cybersecurity1 page
The Difference Between Information Security and Cybersecurity
         
how-data-access-governance-compliments-privileged-access-management1 page
How Data Access Governance Compliments Privileged Access Management
         
5-questions-you-need-to-answer-to-protect-yourself-from-rogue-admins1 page
5 Questions You Need to Answer to Protect Yourself from Rogue Admins
         
tips-to-protect-office-365-data-against-ransomware1 page
Tips to Protect Office 365 Data Against Ransomware
         
prevent-detect-and-recover-from-a-ransomware-attack1 page
Prevent, Detect and Recover from a Ransomware Attack
         
ransomware-vs-cryptojacking1 page
Ransomware VS Cryptojacking
         
cyber-security-best-practices-employee-training-techniques-that-stick1 page
Cyber-Security Best Practices: Employee Training Techniques That Stick
         
is-it-possible-to-prevent-data-breaches-caused-by-insiders1 page
Is it Possible to Prevent Data Breaches Caused by Insiders?
         
3-reasons-why-cybersecurity-in-non-profit-organizations-is-so-important1 page
3 Reasons Why Cybersecurity in Non-profit Organizations is so Important
         
how-dcap-solutions-protect-your-company-from-insider-threats1 page
How DCAP Solutions Protect Your Company from Insider Threats
         
4-security-automation-tips-for-your-business1 page
4 Security Automation Tips for Your Business
         
3-ways-data-discovery-and-classification-improves-data-security1 page
3 Ways Data Discovery and Classification Improves Data Security
         
it-security-trends-of-20181 page
IT Security Trends Of 2018
         
why-cybersecurity-security-isnt-just-an-it-problem1 page
Why Cybersecurity Security Isn’t Just an IT Problem
         
what-should-your-it-risk-assessment-focus-on1 page
What Should Your IT Risk Assessment Focus On?
         
college-campuses-are-a-breeding-ground-for-insider-threats1 page
College Campuses are a Breeding Ground for Insider Threats
         
preventing-cyber-attacks-during-the-midterm-elections1 page
Preventing Cyber-Attacks During the Midterm Elections
         
why-dont-we-secure-our-data-in-the-same-way-that-we-secure-our-money1 page
Why Don’t We Secure Our Data in the Same Way That We Secure Our Money?
         
what-healthcare-organizations-have-to-say-about-information-security1 page
What Healthcare Organizations Have to Say About Information Security
         
how-not-to-handle-a-data-breach-with-examples1 page
How NOT to Handle a Data Breach (With Examples)
         
automation-is-the-key-to-effective-cybersecurity1 page
Automation is the Key to Effective Cybersecurity
         
shortage-of-security-personnel-is-a-major-cause-of-data-breaches1 page
Shortage of Security Personnel is a Major Cause of Data Breaches
         
the-pressure-on-cisos-is-ramping-up1 page
The Pressure on CISOs is Ramping Up
         
what-is-shaping-the-bleak-healthcare-cyber-security-landscape1 page
What Is Shaping the Bleak Healthcare Cyber-Security Landscape?
         
can-a-private-blockchain-be-used-to-secure-sensitive-data1 page
Can a Private Blockchain Be Used to Secure Sensitive Data?
         
national-cyber-security-awareness-month-2018-key-talking-points1 page
National Cyber Security Awareness Month 2018: Key Talking Points
         
the-5-foundations-of-data-security1 page
The 5 Foundations of Data Security
         
the-state-of-education-cyber-security-in-20181 page
The State of Education Cyber-Security in 2018
         
the-state-of-finance-cybersecurity-in-20181 page
The State of Finance Cybersecurity In 2018
         
the-state-of-healthcare-cyber-security-in-20181 page
The State of Healthcare Cyber Security in 2018
         
why-privileged-accounts-are-a-gateway-to-cyber-attacks1 page
Why Privileged Accounts Are A Gateway to Cyber Attacks
         
what-is-the-zero-trust-model-of-security-and-why-is-it-important1 page
What is the Zero Trust Model of Security and Why is it Important?
         
external-attacks-vs-insider-threats-where-should-your-security-budget-go1 page
External Attacks VS Insider Threats: Where Should Your Security Budget Go?
         
why-investing-millions-in-cyber-security-is-not-enough1 page
Why Investing Millions in Cyber-security is Not Enough
         
inadequate-logging-and-monitoring-a-big-concern-for-enterprise-cybersecurity1 page
Inadequate Logging and Monitoring a Big Concern for Enterprise Cybersecurity
         
enterprise-insider-threats-and-the-observer-effect1 page
Enterprise Insider Threats and the Observer Effect
         
information-security-risk-management-how-to-get-it-right1 page
Information Security Risk Management: How to Get it Right
         
why-are-companies-failing-at-incident-response1 page
Why Are Companies Failing at Incident Response?
         
best-practices-for-securing-your-employee-data1 page
Best Practices for Securing Your Employee Data
         
5-ways-to-secure-electronic-health-records1 page
5 Ways to Secure Electronic Health Records
         
why-education-institutions-need-to-pay-attention-to-insider-threats1 page
Why Education Institutions Need to Pay Attention to Insider Threats
         
reddit-is-sms-based-authentication-really-secure1 page
Reddit: Is SMS-Based Authentication Really Secure?
         
most-healthcare-organizations-cant-recover-from-data-breaches1 page
Most Healthcare Organizations Can’t Recover from Data Breaches
         
5-methods-for-better-insider-threat-prevention1 page
5 Methods for Better Insider Threat Prevention
         
5-common-myths-about-insider-threats1 page
5 Common Myths About Insider Threats
         
3-traits-shared-by-successful-cisos1 page
3 Traits Shared by Successful CISOs
         
making-the-case-for-a-vp-of-security-rationalization1 page
Making the Case for a VP of Security Rationalization
         
how-do-data-breaches-happen1 page
How Do Data Breaches Happen?
         
data-classification-software-5-things-you-should-consider1 page
Data Classification Software: 5 Things You Should Consider
         
detect-a-data-breach-questions-that-need-to-be-asked1 page
Detect a Data Breach – Questions That Need to be Asked
         
3-ways-monitoring-exchange-online-improves-security1 page
3 Ways Monitoring Exchange Online Improves Security
         
are-cisos-in-high-demand1 page
Are CISOs in High Demand?
         
what-is-user-activity-monitoring-and-how-should-you-implement-it1 page
What is User Activity Monitoring and How Should You Implement it?
         
what-is-a-brute-force-attack-the-complete-guide1 page
What is a Brute Force Attack? The Complete Guide
         
the-biggest-piece-security-advice-for-cisos-in-20191 page
The Biggest Piece Security Advice for CISOs in 2019
         
5-assumptions-cisos-make-that-may-threaten-data-security1 page
5 Assumptions CISOs Make That May Threaten Data Security
         
how-cisos-can-talk-to-the-rest-of-the-board-about-data-security1 page
How CISOs Can Talk to the Rest of the Board About Data Security
         
why-most-organizations-still-not-gdpr-compliant1 page
Most Organizations Still Not GDPR Compliant – Here’s Why
         
gdpr-questions-what-is-the-right-to-be-forgotten1 page
GDPR Questions: What is the Right to be Forgotten?
         
compliance-does-not-equal-security-heres-why1 page
Compliance Does NOT Equal Security: Here’s Why
         
hipaa-compliance-a-guide-to-meeting-hipaa-requirements1 page
HIPAA Compliance: A Guide to Meeting HIPAA Requirements
         
12-tips-for-protecting-phi1 page
12 Tips for Protecting PHI
         
three-major-ways-the-compliance-landscape-will-evolve-in-20191 page
Three Major Ways the Compliance Landscape Will Evolve in 2019
         
how-hipaa-affects-the-newest-healthcare-trends1 page
How HIPAA Affects the Newest Healthcare Trends
         
what-are-active-directory-fsmo-roles-and-what-do-they-do1 page
Active Directory FSMO Roles: What Are They and What Do They Do?
         
lepideauditor-a-real-alternative-to-varonis1 page
LepideAuditor – a Real Alternative to Varonis
         
formjacking-are-ransomware-and-cryptojacking-about-to-be-replaced1 page
Formjacking: Are Ransomware and Cryptojacking About to Be Replaced?
         
how-can-hospitals-protect-themselves-from-samsam-ransomware-attacks1 page
How Can Hospitals Protect Themselves from SamSam Ransomware Attacks?
         
what-is-ryuk-ransomware-and-how-dangerous-is-it1 page
What is Ryuk Ransomware and How Dangerous is it?
         
8-key-data-security-trends-to-watch-out-for-in-20191 page
8 Key Data Security Trends to Watch Out For in 2019
         
secure-active-directory-nine-simple-steps1 page
Secure Active Directory in 9 Simple Steps
         
insider-threat-a-guide-to-detect-and-prevent-insider-threats1 page
Insider Threat: A Guide to Detect and Prevent Insider Threats
         
cyber-crime-is-one-of-the-greatest-risks-facing-the-world-today1 page
Cyber-Crime is One of the Greatest Risks Facing the World Today
         
how-is-a-ueba-solution-different-to-a-siem-solution1 page
How is a UEBA Solution Different to a SIEM Solution?
         
the-rise-of-the-chief-data-officer1 page
The Rise of the Chief Data Officer
         
how-to-secure-your-data-when-working-with-remote-teams1 page
How to Secure Your Data When Working with Remote Teams
         
schools-report-an-increase-in-security-incidents-since-gdpr-came-into-effect1 page
Schools Report an Increase in Security Incidents Since GDPR Came into Effect
         
focusing-solely-on-regulatory-compliance-could-make-your-data-less-secure1 page
Focusing Solely on Regulatory Compliance Could Make Your Data Less Secure
         
a-quarter-of-nhs-trusts-have-zero-staff-who-are-versed-in-security1 page
A Quarter of NHS Trusts Have Zero Staff Who are Versed in Security
         
the-greatest-mobile-security-threats-facing-enterprises1 page
The Greatest Mobile Security Threats Facing Enterprises
         
8-signs-you-might-be-at-risk-of-an-insider-threat1 page
8 Signs You Might Be at Risk of an Insider Threat
         
automation-is-the-only-way-to-address-the-cyber-security-skills-shortage1 page
Automation is the Only Way to Address the Cyber-Security Skills Shortage
         
why-humans-are-still-an-important-part-of-the-cybersecurity-strategy1 page
Why Humans Are Still an Important Part of the Cybersecurity Strategy
         
how-the-nist-framework-helps-improve-data-security1 page
How the NIST Framework Helps Improve Data Security
         
we-cant-comply-with-the-gdpr-if-we-cant-manage-our-unstructured-data1 page
We Can’t Comply with the GDPR if We Can’t Manage Our Unstructured Data
         
3-massive-data-breaches-in-2018-and-how-they-could-have-been-avoided1 page
3 Massive Data Breaches in 2018 and How They Could Have Been Avoided
         
10-cybersecurity-trends-to-watch-out-for-in-20191 page
10 Cybersecurity Trends to Watch Out For in 2019
         
how-enterprises-can-protect-their-data-from-insider-threats1 page
How Enterprises Can Protect Their Data from Insider Threats
         
how-to-minimize-enterprise-cyber-security-threats1 page
How to Minimize Enterprise Cyber-Security Threats
         
could-a-cyber-attack-be-the-cause-of-the-next-financial-crisis1 page
Could a Cyber-Attack Be the Cause of The Next Financial Crisis?
    
whitepaper36 pages
How CISOs Can Win Over the Board on Cybersecurity Strategy
Lepide Whitepapers: Cyber-Security, Ransomware and IT Auditing
10 Best Practices for Keeping Active Directory Secure
Popular Cyber Attack Methods and How to Mitigate Them
How to Secure and Protect Personally Identifiable Information (PII)
Do You Need A Data-Centric Audit & Protection Solution?
Is Your Organization Prepared for a Cyber-Attack?
How to Discovery and Classify Data Using FSRM – Whitepaper
Cyber Attacks: A Suggested Approach – Whitepaper – Lepide
Ransomware Predictions for 2018 - Whitepaper
Security Monitoring: The Missing Link – Whitepaper
How to Deal with the Threat of Malicious “Cyber” Insiders - Lepide Whitepaper
Top 10 Ways to Avoid Privilege Abuse – Whitepaper
ransomware-detection-and-prevention-with-las.pdf
Should the NHS Outsource Information Governance – Whitepaper
reanimating-the-deleted-objects-of-active-directory.pdf
Avoiding privilege abuse in Active Directory
Improving IT Efficiency: Getting the Right Tool for the Job
Insider Threats: Trust Isn’t a Security Strategy
10 Things IT Departments Do to Prevent Cyber Attacks and Meet Compliance
How Auditing Helps Meet PCI DSS Compliance - Whitepaper
How Educational Institutions Should Prepare for GDPR Compliance
The NHS, the GDPR and the importance of automated solutions
SIEM-less Auditing - A Seamless Auditing Solution in Microsoft Windows – Whitepaper
Best Practices for Keeping Active Directory Clean – Whitepaper
Basic Principles for Securing Active Directory – Whitepaper
Auditing, Logging and Alerting - Lepide Whitepaper
The Lepide Guide to SIEM (Security Information & Event Management)
Detecting Ransomware using File Server Auditing – Whitepaper
taking-active-directory-auditing-to-the-next-level.pdf
how-to-install-exchange-2016.pdf
9 Critical Flaws in Auditing Active Directory Natively
Is Native Auditing Really a Choice?
successful-file-server-auditing-looking-beyond-native-auditing.pdf
achieving-pci-compliance-with-2020-auditsuite.pdf
whitepaper-lafs.pdf
    
webinar2 pages
Live Webinar – Every Tuesday – LepideAuditor Product Demo
Lepide Webinars
    
news2 pages
Latest News and Updates – Lepide Software
xmlrpc.php?rsd
         
wp-includes1 page
wlwmanifest.xml
         
on-the-fly-classification-introduced-into-lepideauditor-19-11 page
“On the Fly” Classification Introduced into LepideAuditor 19.1
         
category
              
product-update1 page
Product Update - Latest News and Updates – Lepide Software
                   
page
                        
21 page
Product Update - Latest News and Updates – Lepide Software - Page 2
                        
31 page
Product Update - Latest News and Updates – Lepide Software - Page 3
                        
41 page
Product Update - Latest News and Updates – Lepide Software - Page 4
                        
51 page
Product Update - Latest News and Updates – Lepide Software - Page 5
                        
71 page
Product Update - Latest News and Updates – Lepide Software - Page 7
                        
61 page
Product Update - Latest News and Updates – Lepide Software - Page 6
                        
81 page
Product Update - Latest News and Updates – Lepide Software - Page 8
                        
91 page
Product Update - Latest News and Updates – Lepide Software - Page 9
              
announcement1 page
Announcement - Latest News and Updates – Lepide Software
                   
page
                        
21 page
Announcement - Latest News and Updates – Lepide Software - Page 2
              
new-launch1 page
New Launch - Latest News and Updates – Lepide Software
                   
page
                        
21 page
New Launch - Latest News and Updates – Lepide Software - Page 2
         
active-directory-self-service-19-0-introduces-a-new-and-improved-user-interface1 page
Active Directory Self Service 19.0 Introduces a New and Improved User Interface
         
lepideauditor-19-0-improves-further-on-data-discovery-and-classification-and-data-security-analytics1 page
LepideAuditor 19.0 Improves Further on Data Discovery and Classification and Data Security Analytics
         
track-users-and-objects-with-excessive-permissions-with-lepideauditor-18-71 page
Easily Identify Users and Objects with Excessive Permissions with LepideAuditor 18.7
         
lepideauditor-now-includes-data-discovery-and-classification1 page
LepideAuditor Now Includes Data Discovery and Classification
         
lepideauditor-18-5-introduces-anomaly-spotting-to-improve-user-entity-behavior-analytics1 page
LepideAuditor 18.5 Introduces Anomaly Spotting to Improve User & Entity Behavior Analytics
         
lepideauditor-18-4-released1 page
LepideAuditor 18.4 Introduces a Brand-New Interactive Access Governance Insights Dashboard and G Suite Auditing
         
lepide-active-directory-self-service-version-18-1-released1 page
Lepide Releases Version 18.1 of Active Directory Self Service Solution with New Search Capabilities
         
lepideauditor-18-3-now-integrates-with-any-siem-solution-and-introduces-amazon-web-services-auditing1 page
LepideAuditor 18.3 now integrates with any SIEM Solution and Introduces Amazon Web Services Auditing
         
lepideauditor-18-1-now-audits-cloud-components1 page
LepideAuditor 18.1 Now Audits Dropbox, Azure AD and OneDrive for Business
         
page
              
21 page
Latest News and Updates – Lepide Software - Page 2
              
31 page
Latest News and Updates – Lepide Software - Page 3
              
41 page
Latest News and Updates – Lepide Software - Page 4
              
51 page
Latest News and Updates – Lepide Software - Page 5
              
131 page
Latest News and Updates – Lepide Software - Page 13
              
121 page
Latest News and Updates – Lepide Software - Page 12
              
111 page
Latest News and Updates – Lepide Software - Page 11
              
101 page
Latest News and Updates – Lepide Software - Page 10
              
61 page
Latest News and Updates – Lepide Software - Page 6
              
71 page
Latest News and Updates – Lepide Software - Page 7
              
91 page
Latest News and Updates – Lepide Software - Page 9
              
81 page
Latest News and Updates – Lepide Software - Page 8
         
20191 page
2019 - Latest News and Updates – Lepide Software
              
041 page
2019 April - Latest News and Updates – Lepide Software
              
021 page
2019 February - Latest News and Updates – Lepide Software
              
011 page
2019 January - Latest News and Updates – Lepide Software
         
20181 page
2018 - Latest News and Updates – Lepide Software
              
121 page
2018 December - Latest News and Updates – Lepide Software
              
111 page
2018 November - Latest News and Updates – Lepide Software
              
101 page
2018 October - Latest News and Updates – Lepide Software
              
091 page
2018 September - Latest News and Updates – Lepide Software
              
081 page
2018 August - Latest News and Updates – Lepide Software
              
071 page
2018 July - Latest News and Updates – Lepide Software
              
051 page
2018 May - Latest News and Updates – Lepide Software
              
041 page
2018 April - Latest News and Updates – Lepide Software
              
011 page
2018 January - Latest News and Updates – Lepide Software
         
20171 page
2017 - Latest News and Updates – Lepide Software
              
111 page
2017 November - Latest News and Updates – Lepide Software
              
101 page
2017 October - Latest News and Updates – Lepide Software
              
081 page
2017 August - Latest News and Updates – Lepide Software
              
061 page
2017 June - Latest News and Updates – Lepide Software
              
051 page
2017 May - Latest News and Updates – Lepide Software
              
031 page
2017 March - Latest News and Updates – Lepide Software
              
021 page
2017 February - Latest News and Updates – Lepide Software
              
011 page
2017 January - Latest News and Updates – Lepide Software
              
page
                   
21 page
2017 - Latest News and Updates – Lepide Software - Page 2
         
20161 page
2016 - Latest News and Updates – Lepide Software
              
101 page
2016 October - Latest News and Updates – Lepide Software
              
091 page
2016 September - Latest News and Updates – Lepide Software
              
081 page
2016 August - Latest News and Updates – Lepide Software
              
071 page
2016 July - Latest News and Updates – Lepide Software
              
061 page
2016 June - Latest News and Updates – Lepide Software
              
041 page
2016 April - Latest News and Updates – Lepide Software
              
031 page
2016 March - Latest News and Updates – Lepide Software
              
021 page
2016 February - Latest News and Updates – Lepide Software
              
011 page
2016 January - Latest News and Updates – Lepide Software
              
page
                   
21 page
2016 - Latest News and Updates – Lepide Software - Page 2
         
20151 page
2015 - Latest News and Updates – Lepide Software
              
121 page
2015 December - Latest News and Updates – Lepide Software
              
111 page
2015 November - Latest News and Updates – Lepide Software
              
101 page
2015 October - Latest News and Updates – Lepide Software
              
091 page
2015 September - Latest News and Updates – Lepide Software
              
081 page
2015 August - Latest News and Updates – Lepide Software
              
071 page
2015 July - Latest News and Updates – Lepide Software
              
061 page
2015 June - Latest News and Updates – Lepide Software
              
051 page
2015 May - Latest News and Updates – Lepide Software
              
041 page
2015 April - Latest News and Updates – Lepide Software
              
031 page
2015 March - Latest News and Updates – Lepide Software
              
021 page
2015 February - Latest News and Updates – Lepide Software
              
011 page
2015 January - Latest News and Updates – Lepide Software
              
page
                   
21 page
2015 - Latest News and Updates – Lepide Software - Page 2
                   
31 page
2015 - Latest News and Updates – Lepide Software - Page 3
         
20141 page
2014 - Latest News and Updates – Lepide Software
              
121 page
2014 December - Latest News and Updates – Lepide Software
              
111 page
2014 November - Latest News and Updates – Lepide Software
              
101 page
2014 October - Latest News and Updates – Lepide Software
              
081 page
2014 August - Latest News and Updates – Lepide Software
              
061 page
2014 June - Latest News and Updates – Lepide Software
              
051 page
2014 May - Latest News and Updates – Lepide Software
              
021 page
2014 February - Latest News and Updates – Lepide Software
              
011 page
2014 January - Latest News and Updates – Lepide Software
              
page
                   
21 page
2014 - Latest News and Updates – Lepide Software - Page 2
         
20131 page
2013 - Latest News and Updates – Lepide Software
              
091 page
2013 September - Latest News and Updates – Lepide Software
              
071 page
2013 July - Latest News and Updates – Lepide Software
              
061 page
2013 June - Latest News and Updates – Lepide Software
              
051 page
2013 May - Latest News and Updates – Lepide Software
              
041 page
2013 April - Latest News and Updates – Lepide Software
              
021 page
2013 February - Latest News and Updates – Lepide Software
              
011 page
2013 January - Latest News and Updates – Lepide Software
              
page
                   
21 page
2013 - Latest News and Updates – Lepide Software - Page 2
         
20121 page
2012 - Latest News and Updates – Lepide Software
              
111 page
2012 November - Latest News and Updates – Lepide Software
              
101 page
2012 October - Latest News and Updates – Lepide Software
              
091 page
2012 September - Latest News and Updates – Lepide Software
              
081 page
2012 August - Latest News and Updates – Lepide Software
              
071 page
2012 July - Latest News and Updates – Lepide Software
              
061 page
2012 June - Latest News and Updates – Lepide Software
              
051 page
2012 May - Latest News and Updates – Lepide Software
              
031 page
2012 March - Latest News and Updates – Lepide Software
              
page
                   
21 page
2012 - Latest News and Updates – Lepide Software - Page 2
         
20111 page
2011 - Latest News and Updates – Lepide Software
              
121 page
2011 December - Latest News and Updates – Lepide Software
              
011 page
2011 January - Latest News and Updates – Lepide Software
         
20101 page
2010 - Latest News and Updates – Lepide Software
              
041 page
2010 April - Latest News and Updates – Lepide Software
         
20091 page
2009 - Latest News and Updates – Lepide Software
              
101 page
2009 October - Latest News and Updates – Lepide Software
         
lepideauditor-18-0-now-including-open-share-analysis1 page
Launch of LepideAuditor 18.0 – Now Including Open Share Analysis
         
launch-of-lepideauditor-17-5-4-now-with-integrated-data-discovery-and-classification1 page
Launch of LepideAuditor 17.5.4 – Now with Integrated Data Discovery and Classification
         
lepide-launches-active-directory-self-service-18-01 page
Lepide Launches Active Directory Self Service 18.0: Now with Automated Script Execution
         
easily-meet-gdpr-compliance-with-lepideauditor-17-51 page
Easily meet GDPR compliance with LepideAuditor 17.5
         
lepidemigrator-for-exchange-moves-to-kernel1 page
LepideMigrator for Exchange moves to Kernel
         
audit-sharepoint-online-with-lepideauditor-17-41 page
Audit SharePoint Online with LepideAuditor 17.4
         
lepideauditor-17-3-with-netapp-cluster-mode-auditing1 page
Launch of LepideAuditor 17.3 – Now with NetApp Cluster Mode auditing
         
launch-of-lepideauditor-17-21 page
Launch of LepideAuditor 17.2
         
lepide-exchange-recovery-manager-moves-to-kernel1 page
Lepide Exchange Recovery Manager moves to Kernel
         
lepide-active-directory-self-service-17-0-is-now-available1 page
Lepide Active Directory Self Service 17.0 is now available
         
lepideauditor-17-1-launched1 page
LepideAuditor 17.1 is now available
         
lepideauditor-suite-17-0-with-threshold-alerts-for-file-server-auditing1 page
Lepide launches LepideAuditor Suite 17.0 with brand new threshold alerts for File Server auditing
         
lepide-announces-launch-of-lepideauditor-suite-16-4-21 page
Lepide announces launch of LepideAuditor Suite 16.4.2 with several exciting new features for easier auditing
         
lepideauditor-suite-v16-4-launched1 page
Lepide launches the new and improved LepideAuditor Suite 16.4
         
lepide-active-directory-self-service-version-16-2-launched1 page
Lepide Software release Lepide Active Directory Self Service version 16.2
         
lepide-appoints-distology-as-their-uk-distributor1 page
Lepide appoints Distology as their UK distributor to help them grow their channel in the region
         
lepide-has-a-new-logo1 page
Lepide has a new logo!
         
lepideauditor-suite-16-3-with-file-server-current-permission-reporting1 page
LepideAuditor Suite 16.3 now comes with File Server Current Permission reporting
         
lepide-active-directory-self-service-16-1-launched1 page
Lepide Software has launched Lepide Active Directory Self Service 16.1 with a couple of new features
         
auditor-suite-16-2-launched1 page
Auditor Suite 16.2 launched with Active Directory and Exchange Server Permission Analysis
         
lepide-sql-storage-manager-is-now-available-for-free1 page
Lepide SQL Storage Manager is now available for Free
         
lepideauditor-for-exchange-server-review-won-silver-award1 page
LepideAuditor for Exchange Server Review won Silver Award
         
readers-choice-award-from-msexchange-org1 page
Reader’s Choice Award from MSExchange.org
         
lepideauditor-for-active-directory-wins-gold-award-by-windowsnetworking-team1 page
LepideAuditor for Active Directory Wins Gold Award by Windowsnetworking Team
         
lepide-software-pvt-ltd-is-proud-to-announce-that-we-are-now-a-certified-partner-of-microsoft1 page
Lepide Software Pvt Ltd is proud to announce that we are now a certified partner of Microsoft
         
lepideauditor-suite-16-1-launched1 page
LepideAuditor Suite 16.1 launched with File Server Auditor and Permission Analysis
         
lepide-active-directory-self-service-version-16-0-released1 page
Lepide Active Directory Self Service Version 16.0 Released
         
lepideauditor-suite-16-0-with-compliance-reports1 page
LepideAuditor Suite 16.0 with Regulatory Compliance Reports
         
lepide-active-directory-self-service-version-15-1-released1 page
Lepide Active Directory Self Service Version 15.1 Released
         
yet-another-new-release-to-the-lepide-auditor-suite-version-15-41 page
Yet another new release to the LepideAuditor Suite version 15.4
         
lepideauditor-suite-15-3-launched1 page
LepideAuditor Suite 15.3 launched
         
major-new-release-of-auditorsuite-from-lepide1 page
MAJOR new release of AuditorSuite from Lepide
         
lepideauditor-for-file-server-15-3-launched1 page
LepideAuditor for File Server 15.3 launched
         
lepide-software-announces-release-of-lepideauditor-for-file-server-version-15-21 page
Lepide Software announces release of LepideAuditor for File Server version 15.2
         
lepideauditor-suite-version-15-1-launched1 page
LepideAuditor Suite version 15.1 launched
         
lepide-software-announces-launch-of-new-version-15-2-of-the-lerm1 page
Lepide Software announces launch of new version (15.2) of the LERM
         
lepide-software-launches-upgraded-version-15-1-of-lepideauditor-for-file-server1 page
Lepide Software launches upgraded version 15.1 of LepideAuditor for File Server
         
lepide-software-launches-upgraded-version-of-lepide-active-directory-self-service-15-01 page
Lepide Software launches upgraded version of Lepide Active Directory Self Service 15.0
         
lepideauditor-for-file-server-version-15-0-launched1 page
LepideAuditor for File Server version 15.0 Launched
         
lepideauditor-suite-15-0-launched1 page
LepideAuditor Suite 15.0 launched
         
lepide-active-directory-self-service-version-14-12-launched1 page
Lepide Active Directory Self Service Version 14.12 launched
         
lepide-active-directory-self-service-version-14-11-launched1 page
Lepide Active Directory Self Service Version 14.11 launched
         
lepideauditor-suite-is-launched1 page
LepideAuditor Suite is launched
         
lepide-software-launched-lepide-active-directory-self-service-version-14-06-011 page
Lepide Software launched Lepide Active Directory Self Service version 14.06.01
         
lepideauditor-for-active-directory-version-14-06-01-launched1 page
LepideAuditor for Active Directory Version 14.06.01 Launched
         
lepide-software-launched-lepideauditor-for-file-server-version-14-05-011 page
Lepide Software launched LepideAuditor for File Server Version 14.05.01
         
lepide-software-announces-the-launch-of-lepideauditor-for-sharepoint1 page
Lepide Software announces the launch of LepideAuditor for SharePoint
         
lepide-active-directory-cleaner-launched1 page
Lepide Active Directory Cleaner launched
         
lepide-user-password-expiration-reminder-version-14-05-01-launched1 page
Lepide User Password Expiration Reminder Version 14.05.01 launched
         
lepide-software-announces-the-launch-of-lepideauditor-for-exchange-server-14-05-011 page
Lepide Software announces the launch of LepideAuditor for Exchange Server 14.05.01
         
lepide-software-announces-the-launch-of-lepideauditor-for-file-server-version-14-02-011 page
Lepide Software announces the launch of LepideAuditor for File Server Version 14.02.01
         
lepideauditor-for-exchange-server-released1 page
LepideAuditor for Exchange Server released
         
lepideauditor-for-active-directory-version-13-07-01-launched1 page
LepideAuditor for Active Directory version 13.07.01 launched
         
lepide-user-password-expiration-reminder-launched1 page
Lepide User Password Expiration Reminder Launched
         
lepideauditor-for-sql-server-launched1 page
LepideAuditor for SQL Server Launched
         
lepide-active-directory-bulk-image-editor-launched1 page
Lepide Active Directory Bulk Image Editor launched
         
lepide-software-launched-lepideauditor-for-file-server1 page
Lepide Software launched LepideAuditor for File Server
         
lepide-active-directory-manager-version-12-12-01-launched1 page
Lepide Active Directory Manager Version 12.12.01 launched
         
lepide-software-launched-lepideauditor-for-active-directory1 page
Lepide Software Launched LepideAuditor for Active Directory
         
lepide-event-log-manager-updated-version-launched1 page
Lepide Event Log Manager Updated Version Launched
         
lepide-active-directory-self-service-version-12-09-01-launched1 page
Lepide Active Directory Self Service version 12.09.01 launched
         
lepide-remote-admin-launched1 page
Lepide Remote Admin Launched
         
lepide-last-logon-reporter-launched1 page
Lepide Last Logon Reporter Launched
         
lepide-sql-storage-manager-launched1 page
Lepide SQL Storage Manager Launched
         
lem-version-12-05-01-launched1 page
LEM Version 12.05.01 Launched
         
ladss-updates-for-version-11-12-011 page
LADSS Updates for Version 11.12.01
         
lepide-event-log-manager-launched1 page
Lepide Event log Manager Launched
         
lepide-active-directory-self-service-tool-launched1 page
Lepide Active Directory Self Service Tool Launched
         
launched-lepide-free-tools1 page
Launched: Lepide Free Tools
    
careers25 pages
Lepide Careers
Job Opening for Product Developer
Job Opening for Senior SQL DBA
Lepide Careers | PHP Manager
Lepide Careers | Quality Analyst
Job Opening for QA-Lead
Job Opening for Senior Technical Support Engineer
Job Opening for Senior SQL Developer
Job Opening for Enterprise Sales Executive - Europe
Job Opening for Enterprise Sales Executive - London
Job Opening for Enterprise Sales Executive - Austin
Job Opening for Senior Technical Writers
Job Opening for SEO Executives
Job Application for Product Developer
Job Application for Senior SQL DBA
Job Application for PHP Developer
Job Application for Quality Analyst
Job Application for QA Lead
Job Application for Senior Technical Support Engineer
Job Application for Senior SQL Developer
Job Application for Enterprise Sales Executive Europe
Job Application for Enterprise Sales Executive UK
Job Application for Enterprise Sales Executive USA
Job Application for Sr Technical Writer
Job Application for SEO Executives
    
configurationguide20 pages
EULA.pdf
lepideauditor-app-configuration-guide.pdf
current-permission-report-configuration-guide.pdf
data-discovery-and-classification.pdf
configure-file-server-resource-manager-in-windows-server-2012-r2-and-above.pdf
configuration-guide-auditing-cloud-components.pdf
configuration-guide-siem-integration.pdf
configuration-guide-session-recording.pdf
ueba-configuration-guide.pdf
lepideauditor-solution-upgrade.pdf
lepideauditor-enable-auditing-manually.pdf
lepideauditor-configure-mailbox-auditing.pdf
lepideauditor-enable-logon-logoff-monitoring.pdf
predefined-regular-expressions-to-be-used-in-file-server-resource-manager.pdf
configure-lepideauditor-for-data-classification.pdf
auditor-suite-enable-auditing-manually.pdf
auditor-suite-configure-mailbox-auditing.pdf
auditor-suite-enable-logon-logoff-monitoring.pdf
troubleshooting-guide-suite.pdf
ladss-configuration-guide.pdf
    
community 566 pages
Lepide Forums
Lepide Forums
All Posts
Announcements descending order
LepideAuditor descending order
LepideAuditor for File Server descending order
Lepide Active Directory Self Service descending order
Password Expiration Reminder descending order
Event Log Manager descending order
SQL Storage Manager descending order
Free Tools descending order
Lepide Forums FAQ
Register at Lepide Forums
Board FAQ
Lepide Forums
Advanced Search - Lepide Forums-
General Forum Usage
Setting and Profile Features
Reading and Posting Messages
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
Search Forums - Lepide Forums
[1] 2