Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Safetica Reviews & Ratings
    409 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    163 Ratings
    Company Website
  • Graylog Reviews & Ratings
    411 Ratings
    Company Website
  • Criminal IP ASM Reviews & Ratings
    18 Ratings
    Company Website
  • Omnilert Reviews & Ratings
    26 Ratings
    Company Website
  • Curtain LogTrace File Activity Monitoring Reviews & Ratings
    4 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    681 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,263 Ratings
    Company Website
  • Diplomat Managed File Transfer Reviews & Ratings
    47 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    208 Ratings
    Company Website

What is Lepide Data Security Platform?

Smart Threat Detection. Accelerated response time. Active Directory is responsible for the majority, approximately 98%, of all security vulnerabilities. Almost all of these vulnerabilities are linked to data breaches within enterprise data storage systems. Our innovative blend of comprehensive auditing, anomaly detection, and real-time alerting, along with instantaneous data discovery and classification, streamlines the process of identifying, prioritizing, and examining threats. Safeguard sensitive information from unauthorized users and compromised accounts. Our cutting-edge technology empowers you to recognize and analyze data threats to your critical information like no other provider can. The integration of data classification with data discovery enhances threat detection, enabling thorough examination of all events, alterations, and actions within their context. You gain full visibility into Active Directory, Group Policy, File Servers, Office 365, NetApp, SharePoint, and cloud storage solutions like Box and Dropbox. Security threats can be identified and addressed ten times faster, allowing Active Directory to facilitate immediate tracking and investigation of threats as they emerge. This comprehensive approach ensures that your organization remains vigilant and protected against evolving security threats.

What is Code42 Incydr?

Incydr delivers crucial insights, context, and governance to effectively avert data breaches and protect intellectual property. It facilitates the identification of file exfiltration across a variety of platforms, such as web browsers, USB devices, cloud services, email, file sharing links, Airdrop, and beyond. You can monitor the movement and sharing of files within your organization without the need for specific policies, proxies, or extra plugins. Incydr automatically identifies when files leave your protected environment, making it simple to detect cases where files are transmitted to personal accounts or unregulated devices. The system evaluates file activities using over 120 specific Incydr Risk Indicators (IRIs), guaranteeing that this essential prioritization is functional from the outset without requiring any preliminary configuration. Its risk assessment approach is tailored to various use cases and provides clarity to administrators, helping them comprehend the reasoning behind each risk evaluation. Furthermore, Incydr utilizes Watchlists to actively defend data against employees who may pose a higher risk of leaking or misappropriating files, particularly those nearing departure from the organization. This multifaceted strategy empowers organizations with a robust set of technical and administrative measures to effectively combat the spectrum of insider threats and incidents. Ultimately, Incydr's comprehensive framework ensures that your organization's sensitive information remains protected in an ever-evolving digital environment, adapting to new threats as they arise.

Media

Media

Integrations Supported

Box
Microsoft 365
Axonius
BambooHR
Code42
Cortex XDR
CrowdStrike Container Security
CyberArk Endpoint Privilege Manager
Daylight
Exabeam
Gmail
LogRhythm SIEM
Microsoft OneDrive
Microsoft Sentinel
Microsoft Teams
ServiceNow
Splunk Cloud Platform
Splunk SOAR
Tines
Workday Extend

Integrations Supported

Box
Microsoft 365
Axonius
BambooHR
Code42
Cortex XDR
CrowdStrike Container Security
CyberArk Endpoint Privilege Manager
Daylight
Exabeam
Gmail
LogRhythm SIEM
Microsoft OneDrive
Microsoft Sentinel
Microsoft Teams
ServiceNow
Splunk Cloud Platform
Splunk SOAR
Tines
Workday Extend

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Lepide

Date Founded

2015

Company Location

United States

Company Website

www.lepide.com

Company Facts

Organization Name

Mimecast

Date Founded

2003

Company Location

United Kingdom

Company Website

www.mimecast.com/products/code42-incydr/

Categories and Features

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Popular Alternatives

Popular Alternatives

Cogility Cogynt Reviews & Ratings

Cogility Cogynt

Cogility Software
PK Protect Reviews & Ratings

PK Protect

PKWARE
SISA Radar Reviews & Ratings

SISA Radar

SISA Information Security