Lepide Trust provides instant visibility into permission changes, identifies excessive user privileges, and helps organizations implement least privilege and zero trust.
Vendor
Lepide
Company Website




Lepide Trust is a comprehensive permissions analysis solution designed to provide organizations with instant visibility over changes made to permissions within their environment. It helps identify users with excessive privileges, thereby enabling the implementation of a robust least privilege policy. A fundamental component of any effective zero trust strategy, Lepide Trust offers complete visibility into the permissions structure, allowing businesses to promptly identify instances where changes lead to over-privileged users. The solution enables detailed analysis of permissions, revealing who has access to sensitive data, how that access is granted, and determining effective permissions by object, user, or mailbox. It highlights changes that create privileged users, traces the origin of these permissions, and facilitates their reversal if necessary. Furthermore, Lepide Trust assists in revoking excessive permissions by analyzing how employees utilize their access, reporting on users with access to sensitive files or folders who are not actively using it. This provides a clear starting point for rightsizing permissions to enforce a zero trust model. The software also helps spot data at risk by automatically discovering new shares as they are created and determining if they are open, thus exposing sensitive data to all users and allowing for quick reaction to mitigate such risks.
Features & Benefits
- Permissions Analysis
- Provides deep insights into who has access to sensitive data and how that access is granted, allowing for determination of effective permissions by object, user, or mailbox. It identifies changes creating privileged users, traces permission origins, and supports reversal.
- Excessive Permission Revocation
- Enables the analysis of permission usage to identify and revoke excessive access. It reports on users with access to sensitive files or folders who are not actively utilizing that access, guiding the implementation of zero trust.
- Data Risk Identification
- Helps identify and react quickly to sensitive data exposed through open shares. Features auto share discovery to detect new open shares and assess their risk level.