Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Safetica Reviews & Ratings
    409 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    163 Ratings
    Company Website
  • Graylog Reviews & Ratings
    411 Ratings
    Company Website
  • Criminal IP ASM Reviews & Ratings
    18 Ratings
    Company Website
  • Omnilert Reviews & Ratings
    26 Ratings
    Company Website
  • Curtain LogTrace File Activity Monitoring Reviews & Ratings
    4 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    681 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,263 Ratings
    Company Website
  • Diplomat Managed File Transfer Reviews & Ratings
    47 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    208 Ratings
    Company Website

What is Lepide Data Security Platform?

Smart Threat Detection. Accelerated response time. Active Directory is responsible for the majority, approximately 98%, of all security vulnerabilities. Almost all of these vulnerabilities are linked to data breaches within enterprise data storage systems. Our innovative blend of comprehensive auditing, anomaly detection, and real-time alerting, along with instantaneous data discovery and classification, streamlines the process of identifying, prioritizing, and examining threats. Safeguard sensitive information from unauthorized users and compromised accounts. Our cutting-edge technology empowers you to recognize and analyze data threats to your critical information like no other provider can. The integration of data classification with data discovery enhances threat detection, enabling thorough examination of all events, alterations, and actions within their context. You gain full visibility into Active Directory, Group Policy, File Servers, Office 365, NetApp, SharePoint, and cloud storage solutions like Box and Dropbox. Security threats can be identified and addressed ten times faster, allowing Active Directory to facilitate immediate tracking and investigation of threats as they emerge. This comprehensive approach ensures that your organization remains vigilant and protected against evolving security threats.

What is Change Auditor?

Overseeing change reporting and access logs for Active Directory (AD) and various enterprise applications can present significant challenges, often making standard IT auditing tools inadequate or ineffective. This struggle can lead to unnoticed data breaches and insider threats if appropriate measures are not implemented. Fortunately, Change Auditor addresses these challenges effectively. By employing Change Auditor, organizations can take advantage of thorough, real-time IT auditing, in-depth forensic analysis, and proactive security threat surveillance, which encompasses all critical configuration modifications, user activities, and administrative actions across platforms like Microsoft Active Directory, Azure AD, Exchange, Office 365, and file servers. Moreover, Change Auditor carefully tracks user interactions related to logins, authentication, and other vital services, which enhances threat detection and bolsters overall security management. In addition, its unified console makes the auditing process more straightforward by reducing the reliance on various separate IT audit tools, thus streamlining workflows and boosting productivity. As a result, organizations can maintain a stronger security posture while efficiently managing their IT environments.

Media

Media

Integrations Supported

Active Directory
Microsoft 365
Microsoft SharePoint
Box
Dropbox
IBM QRadar SIEM
Microsoft Entra ID
Microsoft Exchange
Microsoft OneDrive
Quest IT Security Search
SQL Server
Skype
Splunk Cloud Platform

Integrations Supported

Active Directory
Microsoft 365
Microsoft SharePoint
Box
Dropbox
IBM QRadar SIEM
Microsoft Entra ID
Microsoft Exchange
Microsoft OneDrive
Quest IT Security Search
SQL Server
Skype
Splunk Cloud Platform

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Lepide

Date Founded

2015

Company Location

United States

Company Website

www.lepide.com

Company Facts

Organization Name

Quest Software

Date Founded

1987

Company Location

United States

Company Website

www.quest.com/change-auditor/

Categories and Features

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Categories and Features

Popular Alternatives

Popular Alternatives

PK Protect Reviews & Ratings

PK Protect

PKWARE
SISA Radar Reviews & Ratings

SISA Radar

SISA Information Security
Cygna Auditor Reviews & Ratings

Cygna Auditor

Cygna Labs