ENTERPRISE SECURITY MANAGEMENT



Data Security Management

Overview

Puleng is a specialist for the delivery of Data Security and operational Data life-cycle architectures, with a strategy driven by a Data Classification foundation. Only by identifying the business value of data can organisations make intelligent, deliberate decisions on how the information is managed, consumed and analysed and forms the basis of an effective IT governance strategy.
Once the value of the data is identified, security measures can be implemented to stop the un-authorised access and disclosure of information.

Our methodology includes two clear business driven initiatives which are:
  • Data Classification which is the foundation of an effective IT governance strategy and only by identifying the business value of data can organisations make intelligent, deliberate decisions on how the information is managed, consumed and analysed.
  • Data discovery and cleansing results in the removal of duplicate, Redundant, Obsolete and Trivial (ROT) content across an enterprises unstructured data estate; resulting in a decrease in infrastructure expenditure and the operation thereof.

Speak to a Consultant

All fields are required!

DATA CLASSIFICATION
DATA CLASSIFICATION


Puleng has developed a methodology which is geared to fast track your Data Governance Strategy. The approach aims to discover and cleanse data, classify data according to business value, and secure unauthorised access and disclosure of information.
Data Classification forms the foundation for an effective IT governance strategy. Only by identifying the business value of data can organisations make intelligent, deliberate decisions on how the information is handled.

 

DATA GOVERNANCE
DATA GOVERNANCE


Data Governance secures access and permissions across repositories such as Exchange, SharePoint, the distributed file system, public folders, mobile devices and Active Directory. This solution extends access governance to unstructured data including remediation capabilities

 

DATA ACTIVITY MONITORING (DAM)
DATA ACTIVITY MONITORING (DAM)


Database Activity Monitoring helps to ensure the security, privacy and integrity of information within the Data centre. It is focused on heterogeneous environments across databases, data centres, big data architectures. Database Activity Monitoring provides a robust solution for safeguarding structured and unstructured data across databases, data warehouses, files shares and new data centre environments. (i.e. cloud, virtual as well as Hadoop-based systems)

 

DATA PROTECTION, BACKUP AND RECOVERY
DATA PROTECTION, BACKUP AND RECOVERY


Backup and Recovery technologies have come a long way. Server virtualisation and the data growth explosion have resulted in dramatic changes in the way backups are addressed. Ever decreasing backup windows with ever growing data protection needs have necessitated that organisations relook at how they address their backup and recovery strategies. Disk based backup solutions coupled with de-duplication technologies have had a huge impact in what is possible in terms of backups, integration between virtualisation platforms and backup technologies also provide some fantastic benefits to organisations in terms of speed of backup and recovery.

 

CLOUD ACCESS SECURITY BROKER
CLOUD ACCESS SECURITY BROKER


A Cloud Access Security Broker platform provides one service from which IT teams can manage the use of "Shadow IT Services", build policies across all Cloud applications through a single sign-on portal while ensuring that organisations remain compliant with corporate standards and empowering business to use, promote and govern Cloud Applications.The cloud-based platform integrates and uncovers cloud services in use including SaaS, IaaS and PaaS.