Automate the Management and Protection of your Network File System Data

What can Senergy do for you?

Keep Sensitive Data Secure

A series of security-based Target-Driven policies let you protect high-value targets from unauthorized access. Notification policies notify you when access permissions have been updated. Fencing policies restrict access to certain users and groups, and Lockdown policies prevent new users from being granted access.;

Remediate the Location of Sensitive or Confidential Files

Address compliance requirements for securing confidential and sensitive files by providing Data Owners the ability to remediate the location of these files. When Galileo is combined with Senergy, Data Owners have the means of importing reports and then remediating problems. Data Owners can either move the files to a more secure location, delete the files, or change the ownership of the folder where the files are stored.

Manage Your Data Assets

Automate data management to mitigate risk. Senergy policies ensure that you’re always managing your data assets properly. Senergy handles data privacy, rights and access analysis, data disposition, and protection of high-value targets through its policies.

Increase Security and Minimize Risk

Senergy helps you employ user identity information to either grant or deny access to sensitive data. Perform path analyses to view network access rights from any server or share to any particular folder. Archive data to the storage medium you specify so that you always have it for compliance audits. Limit the types of content users can store on your company network to protect yourself against liability claims.

Address File Analysis Objectives

Implement a File Analysis plan, taking action to remediate challenges pertaining to data access and growth. Through automated policies and administrator-initiated management actions, Senergy remediates these and other storage management tasks. These policies ensure that access rights are correct and helps you archive or dispose of data once they have completed their lifecycle.

Protects High-Value Targets

Epoch Data Protection policies let you assure that high-value targets are securely protected to a nearline repository. Should the original files become lost, corrupted, or encrypted through ransomware, you can easily and quickly recover the files from the protected nearline repository.

Send notifications to data owners when access permissions to network folders change

Let the data owners manage access to their data.  They know who should have access and who shouldn't.  They will be notified of access changes so they can take action to stop data leaks or correct access issues.  

Empower Data Owners and Reduce IT Staff Workload

Instead of relying on the availability and judgment of IT personnel to recover archived data or remediate the location of sensitive data, designated Data Owners, who are familiar with the data, can perform these tasks quickly and efficiently.

Data Governance

Data access permissions need to be managed so that organizations are in compliance with industry and government regulations. 

Take Action

Still trying to move network data around using your workstation or scripts?  Let Senergy's Workload subsystem do the heavy lifting for you.

Additional Protection from Ransomware Attack

Will your most important files be protected when your organization is hit with a ransomware attack?  With Epoch Data Protection policies they will. 


Target-Driven Policies

Apply policy directly to the data in High-Value Target (HVT) folders on the network.

The Target-Driven genre allows for multiple families of policies. These include:

  • Data Location Policies
  • Content Control Policies
  • Data Protection Policies
  • Security Notification Policies
  • Lockdown Policies
  • Fencing Policies

Each of these policy families can and will include multiple policy types. For example, there are different types of Data Location policies that allow customers to move or copy data in HVT folders. Content Control policies allow for actions such as grooming of data in HVT folders. Notification policies notify you when access permissions have been updated. Fencing policies restrict access to certain users and groups, and Lockdown policies prevent new users from being granted access.

Epoch Data Protection

Epoch Data Protection policies allow customers to maintain nearline standby views of HVT folders principally stored in a network file system.  What’s more, advanced technology allows views of that data over time without data duplication and administrators can grant designated data owners access to these views. These Data Owners can view and access the view of the HVT as it existed at a selected point in the past.  Think of it as a time machine for the HVT.

Quickly recover file data as a result of:

  • Ransomware Attacks resulting in destroyed / encrypted files
  • Inadvertently corrupted, deleted, or lost files
  • Need for data in files as they existed at some point in the past

Easily recover security assignments because of:

  • Lost or destroyed security assignments
  • Inadvertently changed security assignments
  • Need to inspect security assignments as they existed at some point in the past  

*Epoch Data Protection is not intended to replace your primary backup system. It is meant to be a way to place additional and alternative protections on specific HVT's. 


Senergy 6 includes an advanced scheduling system for Target-Driven workloads. With an Outlook-inspired UI, policies may drive action against HVTs at a designated time and optionally recurring on a regular basis.

Data Owner Client

A user interface intended for empowering data owners and other types of end users. The Data Owner client provides a personal dashboard and a framework for allowing designated data owners extensible control over managing their own data. The Data Owner Client is the interfaced used in Senergy 6 to allow interaction with Epoch Data Protection capabilities. This interface will evolve with other similar capabilities over time.


With Workload, if you can produce a list of files or folders that you would like to move, copy, delete, set owner, etc, you can have Senergy do that work for you. These workloads could come as output from our own products like Galileo,  utilities developed by another software vendor, or from your own programs. It’s really that simple and that powerful. 

Read more about Senergy 6!

Check out these new Target-Driven Policies!

Security Notification Policies

Notifies administrators of any changes in access permissions to high-value targets.

Lockdown Policies

Lets you lock down the access permissions of a high-value target by overriding any changes made to access permissions of the high-value target.

Fencing Policies

Lets you set limits on how access permissions may change over time by allowing or denying access to specified groups.

Senergy: A critical component of a File Analysis strategy

An objective of File Analysis is to harness and reduce your "data glut". This begins with first defining the contents of your "dark data", and then determining which files to retain, archive, and delete. 

Click here to learn more about File Analysis

Our Products Come with 5 Star Technical Support

100% Customer Satisfaction rating for 12 months in a row. 


File System Flexibility

With Senergy, you can define where user home folders and collaborative storage folders are created, what documents are provisioned within these folders, what rights are established to these folders, when and where to vault a removed user’s home folder, and more.

Enforced Data Compliance

Senergy enforces compliance to corporate policies pertaining to data access and data retention.

Simplified Collaborative Development

Members of cross-functional teams can be granted personal folders within a collaborative storage network area for sharing documents within the group.

Reduced File System Administration Costs

By automating Active Directory tasks that are normally done manually, Senergy can save you significant time and money in annual IT administration expenses.

Galileo Integration

If you have deployed Condrey Corporation's Galileo enterprise reporting product, Galileo can report on the files and folders in target paths of Senergy policies.

Maximize Your Efficiency Today!

Just fill out a request and we will send your FREE trial license.

Time Machine Sans Hot Tub

Read David Condrey's blog about the new Epoch Data Protection feature in Senergy 6.0. It's entertaining and informative! 

Read the Blog

Product Demo Videos


What are the tasks that Senergy automates?

Through Active Directory identity-based policies, Senergy automates the following:


  • Home folders
  • Profile paths
  • Remote Desktop Services home folders
  • Remote Desktop Services profile paths
  • User auxiliary home folders
  • Collaborative home folders

On-Going Management

  • Security analysis
  • Quota management
  • Storage relocation
  • Storage load balancing
  • Storage redistribution
  • Content analysis
  • Storage reporting
  • File grooming


  • Immediate or deferred home folder deletion
  • Home folder vaulting
  • Filtered file removal prior to vaulting


How can Senergy help address my organization’s mandates for compliance to industry and government regulations?

Senergy enables you to you demonstrate regulatory compliance for data retention, security, and access.

First, you can specify, within the Active Directory identity-based policies themselves, where user and collaborative storage will reside. This could be on shares or servers where sensitive corporate data is not stored.

Additionally, Senergy lets you set and then the product enforces file system rights when the user home folder and collaborative storage folders are created. Full Control is not a default right that Senergy grants to the user and thus, prevents potential security threats. If users have been previously been given Full Control, or any other right you wish to revoke, you can simply perform a Manage Operation in Senergy to enforce all users into compliance with the rights as indicated in the policy.

Finally, Senergy lets you indicate when and where to vault the user home folders when users leave the organization. With this knowledge, you can easily retrieve and restore this data when needed.

How does Senergy manage collaborative storage?

First of all, let’s define what we mean by “collaborative storage.” Collaborative storage is a shared storage area where a group of people in an organization can collaborate by sharing files. For example, a cross-functional project team in an organization might need a collaborative storage area where all members could access and submit project files.

Senergy lets you easily create collaborative storage areas through collaborative storage policies that you can assign to group objects or to an organizational unit (also known as a container). You can structure the collaborative storage in one of two ways:

  • Creating a single project folder where all project members have access and have the same rights.
  • Creating a project folder with a specified owner. The project folder has subfolders for each of the members of the group. This configuration is done through a process called “Dynamic Template Processing.”

Senergy works with Active Directory to ensure that only members of the Group object have access to collaborative storage. As new members are added to the group, they are automatically granted access to the collaborative storage. As members are removed, they are denied access, but the files that they submitted to the collaborative storage folder remain.

Why is the Cross-Empire Data Migration functionality sold as a separate add-on to Senergy?

The Cross-Empire Data Migration subsystem is intended for those customers that are undergoing a migration project from one platform to another. We recognize that this feature is not needed by all customers, so we have decided to only make this feature available to those customers that actually need it.

Is Senergy available only through direct purchase through Condrey Corporation?

The product may be purchased and delivered through one of the many great Condrey Corporation partners and resellers. A list of Condrey Corporation partners and resellers is available here.

Does the Active Directory schema have to be extended to support Senergy?

To enable collaborative storage or auxiliary storage management, you must extend the Active Directory schema to enable Senergy attributes. If you do not intend to have Senergy manage collaborative storage or auxiliary storage, there is no need to extend the Active Directory schema.

Note: You extend the Active Directory schema using SchemaTool.exe