ENTERPRISE SECURITY MANAGEMENT
Puleng is a specialist for the delivery of Data Security and operational Data life-cycle architectures, with a strategy driven by a Data Classification foundation. Only by identifying the business value of data can organisations make intelligent, deliberate decisions on how the information is managed, consumed and analysed and forms the basis of an effective IT governance strategy.
Once the value of the data is identified, security measures can be implemented to stop the un-authorised access and disclosure of information.
Puleng has developed a methodology which is geared to fast track your Data Governance Strategy. The approach aims to discover and cleanse data, classify data according to business value, and secure unauthorised access and disclosure of information.
Data Classification forms the foundation for an effective IT governance strategy. Only by identifying the business value of data can organisations make intelligent, deliberate decisions on how the information is handled.
Data Governance secures access and permissions across repositories such as Exchange, SharePoint, the distributed file system, public folders, mobile devices and Active Directory. This solution extends access governance to unstructured data including remediation capabilities
Database Activity Monitoring helps to ensure the security, privacy and integrity of information within the Data centre. It is focused on heterogeneous environments across databases, data centres, big data architectures. Database Activity Monitoring provides a robust solution for safeguarding structured and unstructured data across databases, data warehouses, files shares and new data centre environments. (i.e. cloud, virtual as well as Hadoop-based systems)
Backup and Recovery technologies have come a long way. Server virtualisation and the data growth explosion have resulted in dramatic changes in the way backups are addressed. Ever decreasing backup windows with ever growing data protection needs have necessitated that organisations relook at how they address their backup and recovery strategies. Disk based backup solutions coupled with de-duplication technologies have had a huge impact in what is possible in terms of backups, integration between virtualisation platforms and backup technologies also provide some fantastic benefits to organisations in terms of speed of backup and recovery.
A Cloud Access Security Broker platform provides one service from which IT teams can manage the use of "Shadow IT Services", build policies across all Cloud applications through a single sign-on portal while ensuring that organisations remain compliant with corporate standards and empowering business to use, promote and govern Cloud Applications.The cloud-based platform integrates and uncovers cloud services in use including SaaS, IaaS and PaaS.