OUR SOLUTIONS

Enterprise Security Management

 

 

Data Security Management

Puleng is a specialist for the delivery of Data Security and operational Data life-cycle architectures, with a strategy driven by a Data Classification foundation. Only by identifying the business value of data can organisations make intelligent, deliberate decisions on how the information is managed, consumed and analysed and forms the basis of an effective IT governance strategy. Our methodology includes two clear business driven initiatives which are:

  • Data Classification which is the foundation of an effective IT governance strategy and only by identifying the business value of data can organisations make intelligent, deliberate decisions on how the information is managed, consumed and analysed.
  • Data discovery and cleansing results in the removal of duplicate, Redundant, Obsolete and Trivial (ROT) content across an enterprises unstructured data estate; resulting in a decrease in infrastructure expenditure and the operation thereof.

Once the value of the data is identified, security measures can be implemented to stop the un-authorised access and disclosure of information.

 

 

 

  • DATA CLASSIFICATION
  • DATA GOVERNANCE
  • DATA ACTIVITY MONITORING (DAM)
  • DATA PROTECTION, BACKUP AND RECOVERY
  • CLOUD ACCESS SECURITY BROKER

Puleng has the leading professional services team and honed a milestone-based implementation methodology that delivers predictable project success.

 

DATA CLASSIFICATION
Puleng has developed a methodology which is geared to fast track your Data Governance Strategy. The approach aims to discover and cleanse data, classify data according to business value, and secure unauthorised access and disclosure of information.

Data Classification forms the foundation for an effective IT governance strategy. Only by identifying the business value of data can organisations make intelligent, deliberate decisions on how the information is handled.

FEATURES AND BENEFITS
  • Creates visibility into the organisations information estate
  • Reduces storage, backup and operational expenditure
  • Protects systems, information and secures data
  • Aligns technology to data privacy, regulations and availability requirements
  • Implements data security standards and processes
  • Ensures the integrity of critical data
  • Avoids disruptions in availability of systems and information

DATA GOVERNANCE

Data Governance secures access and permissions across repositories such as Exchange, SharePoint, the distributed file system, public folders, mobile devices and Active Directory. This solution extends access governance to unstructured data including remediation capabilities.

FEATURES AND BENEFITS

  • Visibility
  • Control
  • Remediation
  • Stale Data Identification
  • Audit Reporting

DATA ACTIVITY MONITORING (DAM)

Database Activity Monitoring helps to ensure the security, privacy and integrity of information within the Data centre. It is focused on heterogeneous environments across databases, data centres, big data architectures. Database Activity Monitoring provides a robust solution for safeguarding structured and unstructured data across databases, data warehouses, files shares and new data centre environments. (i.e. cloud, virtual as well as Hadoop-based systems)

FEATURES AND BENEFITS

  • Monitor and Audit
  • Enforce and Protect
  • Find and Classify
  • Assess and Harden
  • Real-time Database Security

DATA PROTECTION, BACKUP AND RECOVERY

Backup and Recovery technologies have come a long way. Server virtualisation and the data growth explosion have resulted in dramatic changes in the way backups are addressed. Ever decreasing backup windows with ever growing data protection needs have necessitated that organisations relook at how they address their backup and recovery strategies. Disk based backup solutions coupled with de-duplication technologies have had a huge impact in what is possible in terms of backups, integration between virtualisation platforms and backup technologies also provide some fantastic benefits to organisations in terms of speed of backup and recovery.

FEATURES AND BENEFITS

  • Gain visibility into your data protection environment across multiple systems and multiple sites
  • Protects multiple workloads running in a variety of configurations, including NAS, ROBO, tape, hardware snap-shots, or even the most complex assortment of applications and storage
  • Transfers backup data securely and efficiently into the cloud for disaster recovery
  • Offers continuous data protection (CDP) for operational recovery and disaster recovery for VMware environments
  • Delivers robust business resiliency through automated data isolation, analytics, and recovery

CLOUD ACCESS SECURITY BROKER

A Cloud Access Security Broker platform provides one service from which IT teams can manage the use of "Shadow IT Services", build policies across all Cloud applications through a single sign-on portal while ensuring that organisations remain compliant with corporate standards and empowering business to use, promote and govern Cloud Applications.The cloud-based platform integrates and uncovers cloud services in use including SaaS, IaaS and PaaS.

FEATURES AND BENEFITS

  • Provides the insight for organisations to embrace Cloud services while delivering unparalleled visibility, compliance, data security and threat protection.
  • Provides a Cloud Risk rating of each service, while extending Data Loss Prevention to the Cloud.
  • A single unified dashboard provides business with a view to all cloud use and risk.
  • Provides detailed statistics on data inflows and outflows while having the ability to integrate into Enterprise Security Intelligence Event Management systems for consistent reporting and remediation.

 

LET'S discuss a solution for you