Data Guardian Guide

32 article(s) found
Nx's Data Risk Intel Journey

Nx is one of the world’s 1st data risk intelligence (DRI) platform that helps you gain control of all your data from office files (unstructured) to databases (structured) whether stored in your datacenter or in the cloud. By fusing business data analytics with cyber intel, Nx empowers you to proactively manage data risks to reduce your compliance burdens, reduce the likelihood of a data breach and also reduce your enterprise storage cost.

Login to Nx

Nx supports multiple login options such as Microsoft and Okta as well as in-app based authentication. Contact your administrator to obtain the Nx platform URL and authentication method for your organization.

Dashboard Overview

Nx provides various out-of-the-box dashboards to enable you to quickly and easily start visualizing your data in the manner that best suits your needs. By default, 3 key dashboards are already configured in the platform: Data Catalog, Data Minimization and Access Risk Review.

Data Source Scans

One of the first and essential tasks as a Data Guardian will be to connect and extract data from the various data sources you need to obtain visibility and gain insights. Nx supports a robust collection of data scan types (e.g., metadata, content, OCR text extraction, etc.) to meet your diverse data management requirements.

User Correlation

To get user data like user groups, department, etc., a user correlation scan has to be performed. Follow the steps outlined below to complete this process:

Dashboard Assignment

Perform the following steps to assign dashboard access to existing user.

  1. Login to Nx as an Administrator and go to User Management > Users
Data Catalog

Nx’s Data Catalog Dashboard provides a global view of the business data stores and applications that are being governed with the platform. It delivers critical visibility and data correlations of the integrated data stores with the associated business departmental owners based on access controls for each data set.

Data Classification

Nx offers a comprehensive suite of data classification technologies designed to enhance its "smart data" management functionalities, enabling Data Guardians to efficiently and accurately categorize individual files according to their specific business contexts.

Classifiers

Nx provides multiple ways to enable Data Guardians to manage and apply contextual classifications that meet the unique needs for each business data set. We recommend orderly application of each of the methodologies below that uses a funnel approach for accounting for the typically larger and simplex data sets first that eventually uses more complex, exploratory models for smaller and complicated data sets. Nx’s funnel approach often provides optimal results in terms of accuracy, performance and scale.

Dark Data Classification

The Dark Data Classification workflow allows you to classify files based on specific filters through a review process. Follow these steps to apply classification efficiently:

Privacy Attributes

Nx provides out-of-the-box privacy attributes to easily identify privacy data. Moreover, it provides the ability to the administrators to create customized privacy attributes that applies to their organization. This helps simply the identification of privacy data including Personally Identifiable Information, Personal Health Information, etc.

Smart Scan

Nx provides a Smart Scan capability for on-demand content scans and privacy analytics of specific paths or files. These scans can easily be triggered directly from the Data Catalog Dashboard.

More Like This / Similar Files

Nx offers a "find more like this" feature, enabling the discovery of files with similar content and record types. This feature facilitates advanced Dark Data Analysis through its integrated Artificial Intelligence (AI) engines. Found under the Data Inventory table within the Data Catalog Dashboard, the More Like This feature identifies files with similar attributes and context to the selected ones, promoting thorough exploration.

Tags

Nx simplifies analysis process for you through customized tagging which can help locate/segregate specific data by applying labels. Perform the steps below to apply a tag:

1. From the Data Catalog Dashboard, apply queries and filters to generate the specific group of files for which tags need to be applied. Refer to Dashboard Filters and Queries section for details

Data Minimization

Nx’s Data Minimization Dashboard was designed to provide a global and detailed view of files that could be considered for data disposal and to enable your “right to be forgotten” privacy rights processing. This dashboard provides detailed overview of the files in relation to our data minimization categories of Redundant, Outdated, Trivial and Abandoned or what we call ROTA files.

ROTA Classification

Nx’s Classifier menu also provide the supporting features to support data minimization tasks to include categorizing Redundant, Outdated, Trivial and Abandoned (ROTA) files to be managed and tracked as potential data disposal candidates.

ROTA Analysis

Nx simplifies enterprise data minimization efforts by providing a centralized collaboration workspace for business managers, compliance and risk professionals and cybersecurity teams so they can proactively work in unison to ensure that surplus and toxic data, such as over-retained privacy records, does not put their company at risk of regulatory fines, individual penalties or harm the corporate reputation.

Generate Data Disposition Plan

Perform the following steps to generate a Data Disposition Workflow:

1. Go to the Data Minimization > ROTA Analysis dashboard

ROTA Calculator

To determine the Return of Investment (ROI) from your Data Minimization effort over the period of 5 years, perform the following steps:

1. Expand Data Minimization > ROTA Analysis

Access Risk

Nx revolutionizes the process of access reviews. Instead of being confined to quarterly or annual cycles that might take weeks or even months to complete, these reviews can now be accomplished on demand with a few clicks. It empowers Data Guardians with the authority to evaluate access to sensitive data pertaining to business applications and data stores that fall under their governance.

Access Activity Risks

Perform the following steps to review Access Risk:

  • As access risk is primarily associated with sensitive data (e.g., Confidential or Restricted), we recommend excluding non-sensitive files (e.g., Internal or Public) as they typically do not pose a material risk concern. This also assists in having a stronger focus to more efficiently assess key access risks.
Dashboard Filters and Queries

Nx allows you to view your data as broadly or as granular as you prefer by applying filters and queries to narrow your search and see exactly what use cases that interests you most.

Dashboard Customization

Nx allows different users to leverage the same, shard dashboards, but allows for local customization to deliver a personal view and experience for how each user prefers to organize their dashboards. Below are some of the tools to easily customize your Nx dashboard.

Visualization - Word Cloud

Creating a Word Cloud in the platform is a straightforward process. Follow these steps to visualize your data effectively:

1. There are two ways to create this visualization:

Workflow Customization

Perform the following to customize workflow steps and approvers for your department and division.

1. Login to the Nx platform and go to Workflow and Customization

Workflow Review

As a Data Voyager, you may be requested to review and approve a Data Disposal workflow to support corporate data minimization objectives. Nx simplifies the review process by offering snapshot views for every customized workflow, streamlining the approval or rejection decisions.

Governance & Monitoring

To view progress of any Data Disposal Workflows or to determine the storage reclamation and cost savings, perform the following steps:

1. Go to Workflow > Governance & Monitoring

Workflow Certificates

There are 4 types of reports available for data disposal workflow:

  1. Execute Report
  2. Restore Report
  3. Disposal Report
  4. Certificate of Data Disposal

Let's discuss each one of them in detail:


Restore Files after Disposing

If you need to restore files after executing the workflow, you can use the restore option, provided the files have not been permanently deleted from the temporary location. Follow these steps to restore files:

Dark Data Classification Customization

Perform the following to customize workflow steps and approvers for your department and division.

Dark Data Classification Review

To classify or review the classification of files, follow these steps:

Refine Dark Data Classification

If a reviewer has suggestions for refining the filters applied by the initiator, follow these steps: