Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    374 Ratings
  • Heimdal Endpoint Detection and Response (EDR) Reviews & Ratings
    54 Ratings
  • ManageEngine ADAudit Plus Reviews & Ratings
    424 Ratings
  • Criminal IP Reviews & Ratings
    11 Ratings
  • ManageEngine EventLog Analyzer Reviews & Ratings
    159 Ratings
  • Safetica Reviews & Ratings
    357 Ratings
  • PathSolutions TotalView Reviews & Ratings
    42 Ratings
  • ConnectWise SIEM Reviews & Ratings
    186 Ratings
  • A10 Defend Threat Control Reviews & Ratings
    32 Ratings
  • Resolver Reviews & Ratings
    254 Ratings

What is Proofpoint Identity Threat Defense?

In an ever-changing hybrid environment, the prosperity of your organization relies heavily on its personnel, their digital identities, and the tools they utilize to protect and improve its assets. Cybercriminals have developed sophisticated techniques to infiltrate your cloud environments by exploiting these identities. To combat this issue effectively, you need a state-of-the-art, agentless solution designed to detect and respond to identity-related threats, allowing you to pinpoint and eliminate current identity weaknesses that are vital in the modern threat landscape. Proofpoint Identity Threat Defense, previously known as Illusive, offers comprehensive prevention capabilities and insights into all your identities, enabling you to tackle identity vulnerabilities before they develop into serious risks. Furthermore, it equips you to detect lateral movements within your systems and deploy misleading tactics to hinder threat actors from accessing your organization's critical resources. By integrating the ability to address contemporary identity risks and manage real-time identity threats within a single platform, organizations can significantly bolster their security posture and ensure greater peace of mind. This holistic approach not only enhances protection but also fosters a proactive security culture essential for navigating today’s complex cybersecurity challenges.

What is Lepide Data Security Platform?

Smart Threat Detection. Accelerated response time. Active Directory is responsible for the majority, approximately 98%, of all security vulnerabilities. Almost all of these vulnerabilities are linked to data breaches within enterprise data storage systems. Our innovative blend of comprehensive auditing, anomaly detection, and real-time alerting, along with instantaneous data discovery and classification, streamlines the process of identifying, prioritizing, and examining threats. Safeguard sensitive information from unauthorized users and compromised accounts. Our cutting-edge technology empowers you to recognize and analyze data threats to your critical information like no other provider can. The integration of data classification with data discovery enhances threat detection, enabling thorough examination of all events, alterations, and actions within their context. You gain full visibility into Active Directory, Group Policy, File Servers, Office 365, NetApp, SharePoint, and cloud storage solutions like Box and Dropbox. Security threats can be identified and addressed ten times faster, allowing Active Directory to facilitate immediate tracking and investigation of threats as they emerge. This comprehensive approach ensures that your organization remains vigilant and protected against evolving security threats.

Media

Media

Integrations Supported

Microsoft 365
Active Directory
Axonius
BlueCat Gateway
BlueCat Unified DDI
Box
Cisco Umbrella
CrowdStrike Falcon
CyberArk Privileged Access Manager
Dropbox
Google Cloud Platform
IBM QRadar SIEM
LogRhythm SIEM
Microsoft Azure
Microsoft Endpoint Manager
Microsoft Entra ID
Microsoft SharePoint
Palo Alto Networks NGFW
Splunk Enterprise
Tanium

Integrations Supported

Microsoft 365
Active Directory
Axonius
BlueCat Gateway
BlueCat Unified DDI
Box
Cisco Umbrella
CrowdStrike Falcon
CyberArk Privileged Access Manager
Dropbox
Google Cloud Platform
IBM QRadar SIEM
LogRhythm SIEM
Microsoft Azure
Microsoft Endpoint Manager
Microsoft Entra ID
Microsoft SharePoint
Palo Alto Networks NGFW
Splunk Enterprise
Tanium

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Proofpoint

Date Founded

2002

Company Location

United States

Company Website

www.proofpoint.com/us/illusive-is-now-proofpoint

Company Facts

Organization Name

Lepide

Date Founded

2015

Company Location

United States

Company Website

www.lepide.com

Categories and Features

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Popular Alternatives

Popular Alternatives

Baits Reviews & Ratings

Baits

MokN
SISA Radar Reviews & Ratings

SISA Radar

SISA Information Security
Fidelis Elevate Reviews & Ratings

Fidelis Elevate

Fidelis Security
PK Protect Reviews & Ratings

PK Protect

PKWARE