Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Satori Reviews & Ratings
    86 Ratings
    Company Website
  • DataBuck Reviews & Ratings
    6 Ratings
    Company Website
  • Netwrix Auditor Reviews & Ratings
    296 Ratings
    Company Website
  • Source Defense Reviews & Ratings
    7 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • Firmex Virtual Data Room Reviews & Ratings
    403 Ratings
    Company Website
  • Ansarada Reviews & Ratings
    277 Ratings
    Company Website
  • Google Cloud Platform Reviews & Ratings
    55,697 Ratings
    Company Website
  • Carbon Black EDR Reviews & Ratings
    281 Ratings
    Company Website
  • Safetica Reviews & Ratings
    356 Ratings
    Company Website

What is Lepide Data Security Platform?

Smart Threat Detection. Accelerated response time. Active Directory is responsible for the majority, approximately 98%, of all security vulnerabilities. Almost all of these vulnerabilities are linked to data breaches within enterprise data storage systems. Our innovative blend of comprehensive auditing, anomaly detection, and real-time alerting, along with instantaneous data discovery and classification, streamlines the process of identifying, prioritizing, and examining threats. Safeguard sensitive information from unauthorized users and compromised accounts. Our cutting-edge technology empowers you to recognize and analyze data threats to your critical information like no other provider can. The integration of data classification with data discovery enhances threat detection, enabling thorough examination of all events, alterations, and actions within their context. You gain full visibility into Active Directory, Group Policy, File Servers, Office 365, NetApp, SharePoint, and cloud storage solutions like Box and Dropbox. Security threats can be identified and addressed ten times faster, allowing Active Directory to facilitate immediate tracking and investigation of threats as they emerge. This comprehensive approach ensures that your organization remains vigilant and protected against evolving security threats.

What is IRI Voracity?

IRI Voracity is a comprehensive software platform designed for efficient, cost-effective, and user-friendly management of the entire data lifecycle. This platform accelerates and integrates essential processes such as data discovery, governance, migration, analytics, and integration within a unified interface based on Eclipse™. By merging various functionalities and offering a broad spectrum of job design and execution alternatives, Voracity effectively reduces the complexities, costs, and risks linked to conventional megavendor ETL solutions, fragmented Apache tools, and niche software applications. With its unique capabilities, Voracity facilitates a wide array of data operations, including: * profiling and classification * searching and risk-scoring * integration and federation * migration and replication * cleansing and enrichment * validation and unification * masking and encryption * reporting and wrangling * subsetting and testing Moreover, Voracity is versatile in deployment, capable of functioning on-premise or in the cloud, across physical or virtual environments, and its runtimes can be containerized or accessed by real-time applications and batch processes, ensuring flexibility for diverse user needs. This adaptability makes Voracity an invaluable tool for organizations looking to streamline their data management strategies effectively.

Media

Media

Integrations Supported

Altibase
Amazon RDS
Apache Hive
Apache Kafka
Cloudera
Docker
EDB Postgres Advanced Server
Greenplum
Hadoop
IBM Cognos Analytics
IRI CoSort
IRI Data Manager
KNIME Analytics Platform
Microsoft 365
Microsoft Excel
Microsoft Word
Red Hat Enterprise Linux
SAP HANA
Strategy ONE

Integrations Supported

Altibase
Amazon RDS
Apache Hive
Apache Kafka
Cloudera
Docker
EDB Postgres Advanced Server
Greenplum
Hadoop
IBM Cognos Analytics
IRI CoSort
IRI Data Manager
KNIME Analytics Platform
Microsoft 365
Microsoft Excel
Microsoft Word
Red Hat Enterprise Linux
SAP HANA
Strategy ONE

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Lepide

Date Founded

2015

Company Location

United States

Company Website

www.lepide.com

Company Facts

Organization Name

IRI, The CoSort Company

Date Founded

1978

Company Location

United States

Company Website

www.iri.com/products/voracity

Categories and Features

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Categories and Features

Big Data

Collaboration
Data Blends
Data Cleansing
Data Mining
Data Visualization
Data Warehousing
High Volume Processing
No-Code Sandbox
Predictive Analytics
Templates

Data Analysis

Data Discovery
Data Visualization
High Volume Processing
Predictive Analytics
Regression Analysis
Sentiment Analysis
Statistical Modeling
Text Analytics

Data Cleansing

Address/ZIP Code Cleaning
Charting
Data Consolidation / ETL
Data Mapping
Multi Data Format Support
Phone/Email Validation
Raw Data Ingestion
Sample Testing
Validation / Matching / Reconciliation

Data Discovery

Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Management

Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge

Data Management Platforms (DMP)

Ad Network Integration
Analytics / ROI Tracking
Audience Targeting
Behavioral Analytics
CRM
Campaign Management
Competitive Analysis
Customer Journey Mapping
Data Capture / Transfer
Data Classification
Data Visualization

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

ETL

Data Analysis
Data Filtering
Data Quality Control
Job Scheduling
Match & Merge
Metadata Management
Non-Relational Transformations
Version Control

Popular Alternatives

Popular Alternatives

PK Protect Reviews & Ratings

PK Protect

PKWARE
SISA Radar Reviews & Ratings

SISA Radar

SISA Information Security