Data Management Requirements
Different data sets require different management approaches. An application folder on the network storing application-specific files needs to be managed in a way that older files do not conflict with new ones when application software is updated. In this example, older application files might need to be deleted or moved to another location for safekeeping. On the other hand, a shared network folder might need to be periodically reviewed of its contents, have sensitive files moved to more secure locations, and have outdated files archived or deleted.
TTarget-Driven policies in Senergy let you establish precise management controls for individual network folders or shares, enabling you to tie active data governance directly to data. There are Target-Driven policies that can move data, perform data cleanup, conduct data archiving, control what types of files can be stored in a network folder or share, handle work processes initiated from other applications, and keep access permissions to folders or shares storing sensitive or high-value data secure.
Target-Driven Security Policy Types
Securing access to sensitive and high-value data is paramount. Among other things, it helps regulated organizations stay compliant, it protects organizations from data breaches, and can even minimize the damaging effects of malware.
Senergy offers Security Notification policies that enable administrators to be notified of any changes or attempted changes in access permissions to network folders, Security Lockdown policies that restore access permissions back to an established “baseline” set of users and access permissions, and Security Fencing policies that set limits on how access permissions may change over time by specifying groups that can be given permissions and others that should never be given access permissions.
Moving and Cleaning Up Data
Depending on the IT data management requirements of the network folder or share, there are various Target-Driven policies for moving and cleaning up data.
Groom policies remove files from any arbitrary path to a vault location. The files that are removed and the frequency that the removals are performed are in accordance to the specifications that you establish. You might use a Groom policy to remove personal files from a shared folder.
Move policies move folders and their contents from a target folder to a destination parent folder. With data regularly being moved in a data center, Move polices are an easy way to do so automatically.
Workload policies in Senergy provide the ability to handle work processes initiated from other applications. For example, reports generated in Galileo that specify the location of sensitive files can be imported into the Data Owner Client or Data Owner web interface where a designated Data Owner can remediate the location of these sensitive files. This approach empowers organizations to provide automated network file system security remediation approved by a gatekeeper familiar with the files.