OUR SOLUTIONS

 

Enterprise Security Management

Identity Management | Access Management | Access Governance | Federated Identity and Cloud Management | Cloud Access Security Broker | Privileged Access | Data Classification | Data Governance | Data Loss Prevention | Data Audit and Protection | Security Intelligence and User Behaviour Analytics | Enterprise Governance, Risk and Compliance

 

Puleng Technologies is a specialist Identity and Access Governance Management Company, with over five million user identities under management and the largest number of enterprise environments in production in South Africa. A strong User Governance framework is the thread which ensures that the right Users have access to the right Services while providing business advantage through self-enrolment, user life-cycle and a quality customer experience.

LET'S discuss a solution for you

 

 

 

 

  • IDENTITY MANAGEMENT
  • ACCESS MANAGEMENT
  • ACCESS GOVERNANCE
  • FEDERATED IDENTITY AND CLOUD MANAGEMENT
  • CLOUD ACCESS SECURITY BROKER
  • PRIVILEGED ACCESS
  • DATA CLASSIFICATION
  • DATA GOVERNANCE
  • DATA LOSS PREVENTION
  • DATA AUDIT AND PROTECTION
  • SECURITY INTELLIGENCE AND USER BEHAVIOUR ANALYTICS
  • ENTERPRISE GOVERNANCE, RISK AND COMPLIANCE (eGRC)

Puleng has the leading professional services team and honed a milestone-based implementation methodology that delivers predictable project success.

 

IDENTITY MANAGEMENT

Identity management provides self-service for users, automated lifecycle management across heterogeneous platforms. Identity Management facilitates a rich policy framework for enforcing corporate security policies and enabling detailed audit capabilities. This protects IT infrastructure from information theft and helps the organisation to comply with regulations.
Identity management facilitates the creation, automation and enforcement of business policies that strengthen security.

FEATURES AND BENEFITS

  • Automated Provisioning
  • Audit Reporting
  • User Lifecycle Management
  • Access Approval
  • Access Fulfilment
  • Access Review and Certification
  • Identity Policy Management

ACCESS MANAGEMENT

Access management solutions securely manage access to business-critical applications and data. These solutions provide centralised authentication and authorisation, policy management and access control services for Web resources, systems and hosted applications. Single Sign-On (SSO) improves the user experience and reduces help-desk costs.
Centralise the management of two-factor authentication functions, security tokens and user across the enterprise.

FEATURES AND BENEFITS

  • Single Sign-On
  • Multi-factor Authentication
  • Fine-grained Authorisation
  • Centralised Policy Database
  • Enhance User Experience
  • Auditing and Monitoring User Access

ACCESS GOVERNANCE

Access Governance offers visibility regarding who has access to what information resources within an organisation. Governance implies that the control of access is driven by policy as well as procedure. Access Governance systems are of significant importance to enterprises due to an increased emphasis on regulatory compliance and heightened sensitivity to insider threat.
IT organisations can reduce access management complexity and increase operational efficiency while minimizing risk and ensuring compliance.

FEATURES AND BENEFITS

  • Enterprise Wide View Storage health
  • Storage Charge Back
  • Validate Storage Compliance
  • Detailed Performance Analysis

FEDERATED IDENTITY AND CLOUD MANAGEMENT

Federated Identity Management provides web and federated single sign-on (SSO) to end users across multiple applications. Browser based integration and open standards provides short term gains in user productivity, user experience and reduction in administration costs. Enterprises adopting cloud based services can leverage federated single sign-on for secure information sharing across private, public and hybrid cloud deployments.
Implement a powerful identity mediation service for Cloud, SaaS and Web services.

FEATURES AND BENEFITS

  • Internal Single Sign-on
  • Workforce to Cloud
  • 3rd Party Service Aggregation
  • Secure Token Services
  • Social Identity
  • Business Partner Single Sign-on

CLOUD ACCESS SECURITY BROKER

A Cloud Access Security Broker platform provides one service from which IT teams can manage the use of "Shadow IT Services", build policies across all Cloud applications through a single sign-on portal while ensuring that organisations remain compliant with corporate standards and empowering business to use, promote and govern Cloud Applications.The cloud-based platform integrates and uncovers cloud services in use including SaaS, IaaS and PaaS.

FEATURES AND BENEFITS

  • Provides the insight for organisations to embrace Cloud services while delivering unparalleled visibility, compliance, data security and threat protection.
  • Provides a Cloud Risk rating of each service, while extending Data Loss Prevention to the Cloud.
  • A single unified dashboard provides business with a view to all cloud use and risk.
  • Provides detailed statistics on data inflows and outflows while having the ability to integrate into Enterprise Security Intelligence Event Management systems for consistent reporting and remediation.

PRIVILEGED ACCESS MANAGEMENT

A privileged account is typically the administrator, super-user or root account for a given system and provides the capability, not only to reconfigure and/or apply modifications to a system and/or its components, but also to access any information that is held on the system. Security and management of these privileged accounts is a priority for all enterprises.
When users require use of a privileged account, the "Username" and "Password" is booked-out from the automated self-service Password Safe.

FEATURES AND BENEFITS

  • Password Safe
  • Least Privilege
  • Unix/Linux Servers
  • Windows Servers and Desktops
  • Applications and Databases
  • Reduce IT Security Risk

DATA CLASSIFICATION
Puleng has developed a methodology which is geared to fast track your Data Governance Strategy. The approach aims to discover and cleanse data, classify data according to business value, and secure unauthorised access and disclosure of information.

Data Classification forms the foundation for an effective IT governance strategy. Only by identifying the business value of data can organisations make intelligent, deliberate decisions on how the information is handled.

FEATURES AND BENEFITS
  • Creates visibility into the organisations information estate
  • Reduces storage, backup and operational expenditure
  • Protects systems, information and secures data
  • Aligns technology to data privacy, regulations and availability requirements
  • Implements data security standards and processes
  • Ensures the integrity of critical data
  • Avoids disruptions in availability of systems and information

DATA GOVERNANCE

Data Governance secures access and permissions across repositories such as Exchange, SharePoint, the distributed file system, public folders, mobile devices and Active Directory. This solution extends access governance to unstructured data including remediation capabilities.

FEATURES AND BENEFITS

  • Visibility
  • Control
  • Remediation
  • Stale Data Identification
  • Audit Reporting

DATA LOSS PREVENTION

Data Loss Prevention discovers and monitors the location and flow of sensitive data such as customer credit card data, employee personal information and corporate intellectual property. The solution enforces controls to prevent loss of sensitive data through email, web, PCs, smartphones and more.

FEATURES AND BENEFITS

  • Discover, Monitor and Protect the Flow of Sensitive Data
  • Locate Sensitive Data
  • Monitor Actions such as Print or Transfer
  • Monitor the Flow of Sensitive Data Through All Network Channels

SECURITY INTELLIGENCE AND USER BEHAVIOUR

Security Intelligence and Analytics leverages and extends the architecture and analytics of traditional SIEM (Security Intelligence and Event Monitoring).
Security Intelligence redefines SIEM by combining network monitoring, traditional log-centric SIEM, forensic, compliance and big data management and analytics.

FEATURES AND BENEFITS

  • Big Data Security Analytics
  • Executing Forensic Investigations
  • Short and Long Term Free-form Contextual Analysis
  • Eliminate Security Blind Spots
  • Global Security Intelligence and Community
  • Compliance Reports

ENTERPRISE GOVERNANCE RISK AND COMPLIANCE (eGRC)

eGRC is the implementation of a central repository of information on the business hierarchy and potential infrastructure. This enables organisations to form an aggregate view of business divisions, determine the value of supporting technologies and use that information in the context of enterprise governance, risk management and compliance (eGRC) initiatives across the enterprise.

FEATURES AND BENEFITS

  • Point and Click Configuration
  • Comprehensive Knowledge Base of eGRC Content
  • Current View of Your eGRC Activities
  • Reports and Dashboards
  • Make Informed Decisions
  • Modules Covering All Business and IT Risk

 

LET'S discuss a solution for you