Call: +353-8183 700 60

Cetbix Data Inventory

Cetbix Data Inventory - Intelligence Approach

Why Cetbix Data Inventory

Every CISO, CIO or Security Manager needs the Cetbix data inventory to enable you to judge which data sources are available and in which format these data are available. With a complete 360° view of your data sources, an accurate prioritization analysis can be performed.

You may find that some of your data sources are not as accessible as you would have wished. Certain departments may have kept their own data silos in the form of Excel files or Access databases, which pose additional challenges when it comes to integrating that data into a data mart or data warehouse. Only when you have a complete data inventory can you accurately assess your BI roadmap and implementation strategies.

Where do I start?

Completing a data inventory using the Cetbix DI enables your organization to be able to devote to gathering the information and performing internal interviews.  The CISO goal here is categorized department directors or managers to understand which business user is responsible for what key business applications. The Cetbix tool gives you great insight that can be applied to your business intelligence roadmap and strategy development. By using Cetbix data inventory completed, you have gathered a necessary piece of information required to start defining your business intelligence roadmap using our intelligent-Approach.

hyper-criticality.svg

Processing activities internally

As a CISO, CIO or Security Manager, you are to maintain a record of all your organisation’s processing activities internally, and to make them available to supervisory authorities upon request.


hyper_growth.svg

Traditional Data Inventories

Cetbix data inventory can cover both personal data or general data (accounting, statistical data, network data, etc). General Cetbix data inventories are typically driven out of the IT, security, or governance department through manual or automated tools.


hyper-sprawl.svg

Advantage of Cetbix Inventory

Cetbix inventory enables the establishment of a private program that enables organization to create a data inventory  as  way of  prioritizing  efforts,  resources,  assessing  risks.

Building Your Data Inventory with Cetbix

Organizations are inundated with information. We collect, curate and use it everywhere and we have a lot of it. The volume and velocity of information collected are causing many challenges from storing it, to dealing with privacy-related, to getting rid of it at the right time and more. Addressing these challenges manually system by system or repository by repository is time-consuming and error-prone. There is a better way – and it starts with a data inventory.

 

A data inventory is a critical element of your information governance model. Set up correctly, it provides you with all the details you need on what information you have, where it’s located and who has access to it. When you need to find a piece of information quickly, it’s where you go. So why do most organizations not have one?

You store information in many places in an organization:

  • Business applications like HR, CRM, ERP, and financial systems
  • The line of business applications
  • File shares
  • SharePoint
  • Cloud-drives like Google Drive, DropBox, Office 365

There are the locations you know, and then there’s the dark data that you don’t remember storing, don’t realize is out there. Remember that over 80% of the data located within an organization is dark data. A data inventory helps you keep track of all this information – both dark and known.

 

 

vha_volvo.svg

A data inventory is a critical element for every company information governance model. Data inventory is able to provide you with all the details you need on what information you have, where this is located and who has access to it. When you need to find a piece of information quickly, it’s where you go.

Mistakes of many organizations do is using the  following channels as their data inventory tools:

  • Business applications like HR, CRM, ERP, and financial systems
  • The line of business applications
  • File shares
  • SharePoint
  • Cloud-drives like Google Drive, DropBox, Office 365

These locations could bring about shadow data since here and then there is the shadow data that you do not remember storing, nor realize is out there. Remember that over 80% of the data located within an organization is shadow data. A data inventory helps you keep track of all this information.

hardrock.svg

Set up a data inventory

The process of setting up a data inventory with Cetbix is quite simple but needs time and it’s worth the effort in the long run. Cetbix makes this simple.

  • Repository: The name of the system that contains the information (include details such as description, owner, location, access)
  • Type of data: This includes details such as description and whether or not it contains personal information.
  • Personal Information ID: PI Description (include a description of the personal information, PI Reason, and PI Policy).

Cetbix Inventory is an analytics technology that enables CISO, Security Managers and CIOs to truly get a handle on the information located in their organization.

 

Cetbix automated data inventory

The Cetbix automated Inventory tool can connect to various systems and repositories throughout the company, both structured and unstructured. It will profile and index each repository giving you a centralized view of your information.

From there, the CetbiX AI technologies base on machine learning and natural language processing will analyze the information, help categorize and organize it, and when necessary add metadata or additional metadata to improve its organization. This process is then forwarded to the CetbiX Constructs.

vha_telefonica.svg

Using and maintaining a data inventory

As a CISO, Security Manager or CIO, not only will our data inventory mechanism help you to secure your data but also acknowledge the new GDPR Regulation, it will help you find information for a data subject request. If you are decommissioning an application, it can help you organize its current content, clean out the ROT and migrate information you want to keep to a new location. IT will also help you to know which system holds sensitive data and which not.

If you are trying to find PII or PCI data stored in unsecured locations, it can tell you where it is and then help you defensibly delete it, or migrate it to a secure repository. If you have an employee who continually places inappropriate information in unsecured locations, you can find out everywhere they have content stored and find out if the information is in the right place.

Like any system that regularly adds new information, your data inventory will grow on a regular basis and you need to continually run the connectors and indexers to add new repositories and re-check existing ones. Information management is a key activity in any organization and as the information created and collected continues to grow, getting – and keeping – control of your information has never been more critical.