Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Intelligent Threat Detection. Faster response. Active Directory is the root cause of 98% of all security threats. Nearly all of these threats involve data compromises on enterprise data storage. Our unique combination of detailed auditing and anomaly detection, real-time alerting, real-time data discovery and classification makes it easy to quickly identify, prioritize, and investigate threats. Protect sensitive data from rogue users and compromised user accounts. Our technology allows you to detect and investigate data threats to your most sensitive data like no other vendor. Data classification and data discovery are combined with threat detection to allow you to examine all events, changes and actions with context. You have complete visibility of Active Directory, Group Policy and File Servers, Office 365. NetApp, SharePoint. Box, Dropbox, Office 365. Security threats 10x faster detected and responded to Active Directory allows you to track movements and investigate threats as soon as they arise.
Description
QOMPLX's Identity Threat Detection and Response (ITDR) system is designed to continuously validate and safeguard against network breaches. By identifying existing misconfigurations in Active Directory (AD) and providing real-time attack detection, QOMPLX ITDR plays a crucial role in maintaining identity security within network operations. It ensures that every identity is verified instantly, effectively preventing privilege escalation and lateral movement within the network. Our solution seamlessly integrates with your existing security infrastructure, leveraging it to enhance our analytics and provide a comprehensive view of potential threats. With our system, organizations can assess the priority and severity of threats, allowing resources to focus on the most critical areas. By enabling real-time detection and prevention measures, we thwart attackers' attempts to circumvent security protocols. Our dedicated experts, well-versed in areas from Active Directory (AD) security to red teaming, are committed to meeting your specific needs. QOMPLX empowers clients to manage and mitigate cybersecurity risks holistically, ensuring a robust defense. Additionally, our analysts will implement our SaaS solutions and continuously monitor your environment for any emerging threats.
API Access
Has API
API Access
Has API
Integrations
Active Directory
Amazon Web Services (AWS)
Box
Dropbox
IBM Cloud Network Security
IBM QRadar SIEM
Microsoft 365
Microsoft Entra ID
Microsoft SharePoint
Splunk Cloud Platform
Integrations
Active Directory
Amazon Web Services (AWS)
Box
Dropbox
IBM Cloud Network Security
IBM QRadar SIEM
Microsoft 365
Microsoft Entra ID
Microsoft SharePoint
Splunk Cloud Platform
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Lepide
Founded
2015
Country
United States
Website
www.lepide.com
Vendor Details
Company Name
QOMPLX
Country
United States
Website
www.qomplx.com
Product Features
Data Governance
Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance