Your Journey with Teleskope

Setup

Your journey with Teleskope begins with one of our four deployment models: Teleskope Managed, Self Managed, Hybrid, and SaaS. Each option is designed to accommodate security, overhead, and support requirements for a variety of customers and industries. We offer flexibility in connecting to our systems and integrating with your existing infrastructure; we work with every customer to meet their own infrastructure, reliability, security, and access standards.

After deploying Teleskope, you may begin setting up Connectors. Each source of data is considered its own connector, and the requirements of each vary from cloud to cloud and service to service. In the Connectors section, we've details how to set up and provide the necessary permissions for Teleskope to connect to and read from your sources.

Discovery

Post-setup, Teleskope initiates crawling and scanning of your data . Our crawlers continuously compile a comprehensive inventory of your data, while our scanners take a sample of each data asset, as well as the context and metadata around it, detecting any personal or sensitive data entities within. Our scanners are powered by a multi-model classification engine, capable of detecting over 150+ personal and sensitive elements.

These components communicate with your metadata service, which houses all of Teleskope's findings and powers your frontend observatory dashboard.

Discovery configurations offer detailed control over operational parameters, such as scan frequency, data sampling methods and size, as well as custom detectors.

Remediation

After discovering your data ecosystem, Teleskope allows you to take action through its Policy Maker, delete customer information with DSR, and surface compliance shortcomings in Issues.

  • Policy Maker enables security engineers to define and implement custom event-driven automations. Events are supplied by the crawling and scanning of your sources, so as soon as an object is discovered and cataloged, preconfigured automations take action: tagging, redacting, masking, or alerting.
  • DSR empowers privacy engineers to automate data subject rights requests wherever that data exists in your organization.
  • Issues uncovers existing regulatory, compliance, and security vulnerabilities in connected datasources and grades each finding to you time in their resolution.