Senergy

Discover the power of Target-driven Policies to manage and protect your most important data

What can Senergy 6.0 do for you?

Empower Data Owners and Reduce IT Staff Workload

A new Data Owner Client provides a personal dashboard and framework for allowing owners control over managing their own data, while reducing the workload for a burdened IT Staff. 

Data Governance

Data access permissions need to be managed so that organizations are in compliance with industry and government regulations. 

Take Action

Still trying to move network data around using your workstation or scripts?  Let Senergy's Workload subsystem do the heavy lifting for you.

Additional Protection from Ransomware Attack

Will your most important files be protected when your organization is hit with a ransomware attack?  With Epoch Data Protection policies they will. 

What's New In Version 6.0

Target-Driven Policies

Senergy 6 expands the concept of applying policy by introducing an entirely new family of policy types. This genre of policies allows customers to apply policy directly to the data in High-Value Target (HVT) folders on the network.

The Target-Driven genre allows for multiple families of policies in Senergy 6. These include:

  • Data Location Policies
  • Content Control Policies
  • Data Protection Policies

Each of these policy families can and will include multiple policy types. For example, there are different types of Data Location policies that allow customers to move or copy data in HVT folders. Content Control policies allow for actions such as grooming of data in HVT folders.

Epoch Data Protection

Epoch Data Protection policies allow customers to maintain nearline standby views of HVT folders principally stored in a network file system.  What’s more, advanced technology allows views of that data over time without data duplication and administrators can grant designated data owners access to these views. These Data Owners can view and access the view of the HVT as it existed at a selected point in the past.  Think of it as a time machine for the HVT.

Quickly recover file data as a result of:

  • Ransomware Attacks resulting in destroyed / encrypted files
  • Inadvertently corrupted, deleted, or lost files
  • Need for data in files as they existed at some point in the past

Easily recover security assignments because of:

  • Lost or destroyed security assignments
  • Inadvertently changed security assignments
  • Need to inspect security assignments as they existed at some point in the past  

*Epoch Data Protection is not intended to replace your primary backup system. It is meant to be a way to place additional and alternative protections on specific HVT's. 

Updated Admin UI

Senergy 6 includes an updated Administration UI that has been reorganized to allow logical separation of management to fit both Identity-Driven and Target-Driven paradigms. Additionally, the new UI included new dashboards and graphical elements that simplify administration. 

Scheduling

Senergy 6 includes an advanced scheduling system for Target-Driven workloads. With an Outlook-inspired UI, policies may drive action against HVTs at a designated time and optionally recurring on a regular basis.

Data Owner Client

A new modern user interface intended for empowering data owners and other types of end users. The Data Owner client provides a personal dashboard and a framework for allowing designated data owners extensible control over managing their own data. The Data Owner Client is the interfaced used in Senergy 6 to allow interaction with Epoch Data Protection capabilities. This interface will evolve with other similar capabilities over time.

Workload

With Workload, if you can produce a list of files or folders that you would like to move, copy, delete, set owner, etc, you can have Senergy do that work for you. These workloads could come as output from our own products like Galileo,  utilities developed by another software vendor, or from your own programs. It’s really that simple and that powerful. 

Senergy: A critical component of a File Analysis strategy

An objective of File Analysis is to harness and reduce your "data glut". This begins with first defining the contents of your "dark data", and then determining which files to retain, archive, and delete. 

Click here to learn more about File Analysis

Our Products Come with 5 Star Technical Support

100% Customer Satisfaction rating for 12 months in a row. 

Benefits

File System Flexibility

With Senergy, you can define where user home folders and collaborative storage folders are created, what documents are provisioned within these folders, what rights are established to these folders, when and where to vault a removed user’s home folder, and more.

Enforced Data Compliance

Senergy enforces compliance to corporate policies pertaining to data access and data retention.

Simplified Collaborative Development

Members of cross-functional teams can be granted personal folders within a collaborative storage network area for sharing documents within the group.

Reduced File System Administration Costs

By automating Active Directory tasks that are normally done manually, Senergy can save you significant time and money in annual IT administration expenses.

Galileo Integration

If you have deployed Condrey Corporation's Galileo enterprise reporting product, Galileo can report on the files and folders in target paths of Senergy policies.

Maximize Your Efficiency Today!

Just fill out a request and we will send your FREE trial license.

Time Machine Sans Hot Tub

Read David Condrey's blog about the new Epoch Data Protection feature in Senergy 6.0. It's entertaining and informative! 

Read the Blog

Product Demo Videos

FAQ

What are the tasks that Senergy automates?

Through Active Directory identity-based policies, Senergy automates the following:

Provisioning:

  • Home folders
  • Profile paths
  • Remote Desktop Services home folders
  • Remote Desktop Services profile paths
  • User auxiliary home folders
  • Collaborative home folders

On-Going Management

  • Security analysis
  • Quota management
  • Storage relocation
  • Storage load balancing
  • Storage redistribution
  • Content analysis
  • Storage reporting
  • File grooming

Disposal

  • Immediate or deferred home folder deletion
  • Home folder vaulting
  • Filtered file removal prior to vaulting

 

How can Senergy help address my organization’s mandates for compliance to industry and government regulations?

Senergy enables you to you demonstrate regulatory compliance for data retention, security, and access.

First, you can specify, within the Active Directory identity-based policies themselves, where user and collaborative storage will reside. This could be on shares or servers where sensitive corporate data is not stored.

Additionally, Senergy lets you set and then the product enforces file system rights when the user home folder and collaborative storage folders are created. Full Control is not a default right that Senergy grants to the user and thus, prevents potential security threats. If users have been previously been given Full Control, or any other right you wish to revoke, you can simply perform a Manage Operation in Senergy to enforce all users into compliance with the rights as indicated in the policy.

Finally, Senergy lets you indicate when and where to vault the user home folders when users leave the organization. With this knowledge, you can easily retrieve and restore this data when needed.

How does Senergy manage collaborative storage?

First of all, let’s define what we mean by “collaborative storage.” Collaborative storage is a shared storage area where a group of people in an organization can collaborate by sharing files. For example, a cross-functional project team in an organization might need a collaborative storage area where all members could access and submit project files.

Senergy lets you easily create collaborative storage areas through collaborative storage policies that you can assign to group objects or to an organizational unit (also known as a container). You can structure the collaborative storage in one of two ways:

  • Creating a single project folder where all project members have access and have the same rights.
  • Creating a project folder with a specified owner. The project folder has subfolders for each of the members of the group. This configuration is done through a process called “Dynamic Template Processing.”

Senergy works with Active Directory to ensure that only members of the Group object have access to collaborative storage. As new members are added to the group, they are automatically granted access to the collaborative storage. As members are removed, they are denied access, but the files that they submitted to the collaborative storage folder remain.

Why is the Cross-Empire Data Migration functionality sold as a separate add-on to Senergy?

The Cross-Empire Data Migration subsystem is intended for those customers that are undergoing a migration project from one platform to another. We recognize that this feature is not needed by all customers, so we have decided to only make this feature available to those customers that actually need it.

 
Is Senergy available only through direct purchase through Condrey Corporation?

The product may be purchased and delivered through one of the many great Condrey Corporation partners and resellers. A list of Condrey Corporation partners and resellers is available here.

 
Does the Active Directory schema have to be extended to support Senergy?

To enable collaborative storage or auxiliary storage management, you must extend the Active Directory schema to enable Senergy attributes. If you do not intend to have Senergy manage collaborative storage or auxiliary storage, there is no need to extend the Active Directory schema.

Note: You extend the Active Directory schema using SchemaTool.exe