Melbourne 12th of October 2018 -- CyberRisk, one of Australia's leading information security, technology risk management and privacy consulting firms, today announced that it is an authorised reseller and partner of Lepide the fastest-growing provider of Data-Centric Audit and Protection (DCAP) solutions.
LepideAuditor, the company's flagship product, is a cost-effective way for organisations to find out where their sensitive data is, who has access to it and what changes are taking place. With hundreds of pre-defined reports as well as real-time alerts, LepideAuditor reduces the risk of insider threats, data breaches and ransomware while meeting the demands of compliance standards like GDPR, PCI, SOX and more.
LepideAuditor is already being used to audit and monitor sensitive data for over 5,000 organisations. However, while the solution has already seen some strong success in the UK, the new partnership will add the value of a proactive distributor with a proven track record of taking vendors to a full two-tier strategy.
"Lepide is a great product that will assist our clients to meet their compliance obligations, improve their data governance and help prevent data breaches", said Wayne Tufek, a Director of CyberRisk, "We're excited to be able to bring Lepide to the Australian market" he continued.
For more than a decade, Lepide has been developing security that starts with data. Designed to give organisations increased visibility and insight, Lepide's solutions are used by more than 5,000 customers worldwide to improve security while meeting the demands of compliance standards like GDPR, SOX, PCI and more.
Across on-premise and cloud-based unstructured data, LepideAuditor is an easy-to-use console that makes monitoring sensitive data simple. From there, customers can detect when data is accessed, changed or moved, and receive real-time alerts when tailored thresholds are exceeded. As a result, they can reduce the risk of insider threats, data breaches and non-compliance.
Today, Lepide is the fastest-growing Data-Centric Audit and Protection (DCAP) provider with offices in three continents. Customers include Xerox, Cisco, Pacific Western Bank, and many more.
With any aspect of operating a business, the ability to effectively manage your cyber risk is based on being able to make well informed decisions and then execute on them. CyberRisk provides your organisation with the necessary expertise, experience and skills to do both. CyberRisk is based in Melbourne, and is one of Australia's leading information security, technology risk management and privacy consulting firms. CyberRisk is an Australian information security partner delivering services that pragmatically ensure alignment between information security and business objectives, clarify complex security challenges and provide confidence for organisation's making complicated security and risk management decisions. CyberRisk is uniquely positioned to help our clients to protect their reputation, take advantage of the digital economy and grow their businesses safely and securely. Contact CyberRisk today to find out more about how they can assist you with all your information security, technology risk management and privacy needs. www.cyber-risk.com.au
Why nation-state attacks are everyone’s problem
Hear from Invictus Games Sydney 2019 CEO, Patrick Kidd OBE and Head of Technology, @James-d-smith -share their insights on how they partnered with Unisys to protect critical data over an open, public WiFi solution.
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.
An interview with CSO's David Braue and Ian Yip, Chief Technology Officer, McAffee.
According to new research conducted by the Ponemon Institute, Australia and New Zealand have the highest levels of data breaches out of the nine countries investigated. This was linked to heavy investment in security detection and an under-investment in security and vulnerability response capabilities