Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Wiz Reviews & Ratings
    1,452 Ratings
    Company Website
  • Safetica Reviews & Ratings
    414 Ratings
    Company Website
  • Orca Security Reviews & Ratings
    546 Ratings
    Company Website
  • Teradata VantageCloud Reviews & Ratings
    1,107 Ratings
    Company Website
  • Uniqkey Reviews & Ratings
    182 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,305 Ratings
    Company Website
  • Securden Password Vault for Enterprises Reviews & Ratings
    55 Ratings
  • Google Chrome Enterprise Reviews & Ratings
    2,062 Ratings
    Company Website
  • PeerGFS Reviews & Ratings
    28 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    684 Ratings
    Company Website

What is Wraith?

The rapid uptake of cloud technology, along with the complexities of multi-cloud configurations and fragmented security teams, leads to a considerable lack of visibility for many organizations. Wraith addresses this challenge by providing outstanding visibility and threat-hunting features that cover on-premise, hybrid, and multi-cloud environments. By leveraging AI-driven anomaly detection, Wraith becomes a crucial tool for uncovering and addressing hidden threats, thus protecting cloud infrastructures. Moreover, Wraith ensures broad visibility across different platforms, allowing security teams to manage assets and monitor activities across various Cloud Service Providers (CSPs) from a single interface. This functionality not only promotes a unified security approach but also improves the speed of threat response within diverse and complex cloud settings, making it essential for contemporary cybersecurity frameworks. In summary, organizations can bolster their security protocols and react more swiftly to new threats, creating a safer environment for their digital operations. Furthermore, the integration of such advanced tools helps in building a proactive security culture within organizations.

What is Lepide Data Security Platform?

Smart Threat Detection. Accelerated response time. Active Directory is responsible for the majority, approximately 98%, of all security vulnerabilities. Almost all of these vulnerabilities are linked to data breaches within enterprise data storage systems. Our innovative blend of comprehensive auditing, anomaly detection, and real-time alerting, along with instantaneous data discovery and classification, streamlines the process of identifying, prioritizing, and examining threats. Safeguard sensitive information from unauthorized users and compromised accounts. Our cutting-edge technology empowers you to recognize and analyze data threats to your critical information like no other provider can. The integration of data classification with data discovery enhances threat detection, enabling thorough examination of all events, alterations, and actions within their context. You gain full visibility into Active Directory, Group Policy, File Servers, Office 365, NetApp, SharePoint, and cloud storage solutions like Box and Dropbox. Security threats can be identified and addressed ten times faster, allowing Active Directory to facilitate immediate tracking and investigation of threats as they emerge. This comprehensive approach ensures that your organization remains vigilant and protected against evolving security threats.

Media

Media

Integrations Supported

Active Directory
Amazon Web Services (AWS)
Box
Dropbox
FortiSIEM
Gigamon
Google Cloud Platform
Microsoft 365
Microsoft Azure
Microsoft Security Copilot
Microsoft Sentinel
Microsoft SharePoint
Revenant
Suricata
Syslog-ng
VMware ESXi
VMware vSphere
Vectra AI
Zeek

Integrations Supported

Active Directory
Amazon Web Services (AWS)
Box
Dropbox
FortiSIEM
Gigamon
Google Cloud Platform
Microsoft 365
Microsoft Azure
Microsoft Security Copilot
Microsoft Sentinel
Microsoft SharePoint
Revenant
Suricata
Syslog-ng
VMware ESXi
VMware vSphere
Vectra AI
Zeek

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

NetCentrics

Date Founded

1995

Company Location

United States

Company Website

netcentrics.com/tech-and-solutions/wraith/

Company Facts

Organization Name

Lepide

Date Founded

2015

Company Location

United States

Company Website

www.lepide.com

Categories and Features

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Popular Alternatives

Cloud Cost Pro Reviews & Ratings

Cloud Cost Pro

Gathr.ai

Popular Alternatives

PK Protect Reviews & Ratings

PK Protect

PKWARE
SISA Radar Reviews & Ratings

SISA Radar

SISA Information Security