Puleng is a specialist for the delivery of Data Security and operational Data life-cycle architectures, with a strategy driven by a Data Classification foundation. Only by identifying the business value of data can organisations make intelligent, deliberate decisions on how the information is managed, consumed and analysed and forms the basis of an effective IT governance strategy.
Once the value of the data is identified, security measures can be implemented to stop the un-authorised access and disclosure of information.
The ability to discover and classify data based on content and its context to the business are a critical starting point to any data security / data privacy initiative. The requirement to classify data is relevant to existing data accumulated over years within a business, but also important when new data is being created. This ensures data can be protected with the correct policies from inception. Our solutions cover the classification of data in structured and unstructured repositories and provide organisations the ability to understand where there critical data is, which is a vital first step to being able to adequately protect data.
Data Governance is currently a hot topic due to regulations like POPIA and GDPR. Data Governance seeks to empower data owners to answer 4 critical questions with regards to data privacy and security:
- Do you know where your sensitive data is?
- Do you know who has access to the data?
- Is the access appropriate (ie. Do the right people have access only to the right data)
- Can you prove it? (Do you have irrefutable evidence of who had access to what data and what they did with it?)
Puleng has a comprehensive Data Governance methodology to assist organisations in adopting and deploying these solutions to address requirements related to data security and governance, driven by POPIA / GDPR.
Data Activity Monitoring (DAM)
Having visibility and an audit trail of who accessed / modified what data within an organisation plays a critical part in securing the data and ensuring that data is not misused or exfiltrated.
This is relevant to unstructured data (file servers, SharePoint etc.) and especially on database repositories, which typically house critical and sensitive data.
Database activity monitoring solutions help to ensure the security, privacy and integrity of data . These solutions also provide the ability to mask sensitive information from database administrators in order to implement a “need to know” approach to sensitive data in these repositories.
Data Protection, Backup and Recovery
Backup and Recovery technologies have come a long way. Server virtualisation and the data growth explosion have resulted in dramatic changes in the way backups are addressed. Ever decreasing backup windows with ever growing data protection needs have necessitated that organisations relook at how they address their backup and recovery strategies. Disk based backup solutions coupled with de-duplication technologies have had a huge impact in what is possible in terms of backups, integration between virtualisation platforms and backup technologies also provide some fantastic benefits to organisations in terms of speed of backup and recovery.
Cloud Access Security Broker
CASB technologies intend to extend the traditional on-premises data protection capabilities like Data Loss Prevention (DLP) into cloud platforms.
This enables an organisation to enforce policies related to what type of data users can upload / download to SaaS platforms like Dropbox, OneDrive etc, at a granular level.
CASB technologies provide full visibility into the use of “Shadow IT”, and provide the necessary controls to ensure that only allowed platforms are used and that sensitive data is not exposed / leaked via these platforms