Your Journey with Teleskope
Setup
Your journey with Teleskope begins with one of our deployment models: Self Hosted or SaaS. Both option is designed to accommodate security, overhead, and support requirements for a variety of customers and industries. We offer flexibility in connecting to our systems and integrating with your existing infrastructure, and work with every customer to meet their own infrastructure, reliability, security, and access standards.
After deploying Teleskope, you may begin enrolling Connectors. Each source of data is considered its own Connector, and the requirements of each vary from cloud to cloud and service to service. In the Connectors section, we've detailed how to set up and provide the necessary permissions for Teleskope to reach and read from each data source.
Discovery
Post-setup, Teleskope initiates crawling and scanning of your data . Our crawlers continuously compile a comprehensive inventory of your data, while our scanners take samples of each resource and record its context and metadata, detecting any personal or sensitive data entities within. Our scanners are powered by a multi-model classification engine, capable of detecting over 150+ personal and sensitive elements.
These components communicate with your metadata service which houses all of Teleskope's findings and powers your frontend observatory dashboard.
Discovery configurations offer detailed control over operational parameters like scan frequency, data sampling methods and size, rate-limiting, and custom detectors.
Remediation
After discovering your data ecosystem, Teleskope allows you to take action through its Policy Maker, delete customer information with DSR, and surface compliance shortcomings in Issues.
Policy Maker enables security engineers to define and implement custom event-driven automations. Events are supplied by the crawling and scanning of your sources, so as soon as an object is discovered and cataloged, preconfigured automations take action: tagging, redacting, masking, quarantining, or alerting.
DSR empowers privacy engineers to automate data subject rights requests wherever that data exists in your organization.
Issues uncovers existing regulatory, compliance, and security vulnerabilities in connected datasources and grades each finding to you time in their resolution.
Last updated