N-able Risk IntelligenceN-able
|
||||||
Related Products
|
||||||
About
Intelligent Threat Detection. Faster Response. 98% of all threats start with Active Directory and nearly always involve the compromise of data stored on enterprise data stores. Our unique combination of detailed auditing, anomaly detection, real time alerting, and real time data discovery and classification allows you to identify, prioritize and investigate threats - fast. Protect Sensitive Data from Rogue Users and Compromised User Accounts. We enable you to detect and investigate threats to your most sensitive data in ways no other vendor can. Bringing together data discovery and classification with threat detection enables you to investigate all events, changes, actions and anomalies with context. End to end visibility of Active Directory, Group Policy, File Servers, Office 365, NetApp, SharePoint, Box, Dropbox and more. Detect and Respond to Security Threats 10x Faster. Investigate threats as they emerge in Active Directory and track movement
|
About
Your customers recognize the importance of security, but they often don't realize the urgency until they see something tangible. N-able™ Risk Intelligence makes it concrete by assigning value to your data vulnerability, helping you build a strong business case for data protection and triage the most important problems to tackle. Help ensure that only authorized individuals can access sensitive data. Safeguard sensitive personal data from attack. View reports on the potential financial impact of your at-risk data. Locate security holes in your systems. Protect credit card data and help ensure PCI DSS compliance. Sensitive data left exposed on systems poses a great risk to your customers. Often, companies amass large amounts of sensitive personally identifiable information (PII), including social security numbers, driver's license numbers, credit card information, and more in dispersed persistent storage.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Businesses looking for a way to protect their data
|
Audience
Businesses in need of a risk intelligence solution to locate sensitive data across networks and workstations
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationLepide
Founded: 2015
United States
www.lepide.com
|
Company InformationN-able
Founded: 2000
United States
www.solarwindsmsp.com/products/risk-intelligence
|
|||||
Alternatives |
Alternatives |
|||||
|
||||||
|
|
|||||
|
|
|||||
Categories |
Categories |
|||||
Data Governance Features
Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management
|
||||||
Integrations
Active Directory
Box
Dropbox
Microsoft 365
Microsoft SharePoint
|
Integrations
Active Directory
Box
Dropbox
Microsoft 365
Microsoft SharePoint
|
|||||
|
|