Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Intelligent Threat Detection. Faster response. Active Directory is the root cause of 98% of all security threats. Nearly all of these threats involve data compromises on enterprise data storage. Our unique combination of detailed auditing and anomaly detection, real-time alerting, real-time data discovery and classification makes it easy to quickly identify, prioritize, and investigate threats. Protect sensitive data from rogue users and compromised user accounts. Our technology allows you to detect and investigate data threats to your most sensitive data like no other vendor. Data classification and data discovery are combined with threat detection to allow you to examine all events, changes and actions with context. You have complete visibility of Active Directory, Group Policy and File Servers, Office 365. NetApp, SharePoint. Box, Dropbox, Office 365. Security threats 10x faster detected and responded to Active Directory allows you to track movements and investigate threats as soon as they arise.

Description

QueryPie serves as a unified platform that consolidates diverse data sources and security protocols into a single interface. Accelerate your company's journey toward achievement without altering your current data infrastructure. In an era driven by data, effective data governance has become essential. Make certain that you adhere to data governance regulations while simultaneously granting multiple users access to an increasing volume of essential data. Formulate data access policies by incorporating crucial factors such as IP addresses and time of access. You can create various privilege types based on SQL commands categorized into DML, DCL, and DDL, allowing for secure data analysis and modifications. Effortlessly monitor SQL event details and analyze user behavior along with potential security threats by examining logs filtered by permissions. Furthermore, all historical data can be exported for comprehensive reporting, ensuring that you have a clear view of your data usage and security practices. This holistic approach not only enhances oversight but also supports informed decision-making for future strategies.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon CloudWatch
Amazon Elastic Container Service (Amazon ECS)
Apache Cassandra
AuthControl Sentry
Azure Databricks
Box
DataGrip
DigitalOcean
Google Cloud Platform
Google Kubernetes Engine (GKE)
Google Workspace
Impala
Looker
MariaDB
Microsoft Azure
MySQL
Prometheus
SAP HANA
Snowflake
Tableau

Integrations

Amazon CloudWatch
Amazon Elastic Container Service (Amazon ECS)
Apache Cassandra
AuthControl Sentry
Azure Databricks
Box
DataGrip
DigitalOcean
Google Cloud Platform
Google Kubernetes Engine (GKE)
Google Workspace
Impala
Looker
MariaDB
Microsoft Azure
MySQL
Prometheus
SAP HANA
Snowflake
Tableau

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Lepide

Founded

2015

Country

United States

Website

www.lepide.com

Vendor Details

Company Name

QueryPie

Founded

2019

Country

South Korea

Website

www.querypie.com

Product Features

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Product Features

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Alternatives

Alternatives

PK Protect Reviews

PK Protect

PKWARE
PHEMI Health DataLab Reviews

PHEMI Health DataLab

PHEMI Systems
SISA Radar Reviews

SISA Radar

SISA Information Security