ILM, classification and the Information-Centric Enterprise. Per Sedihn, Vice Chair Nordics Comitte SNIA Europe CTO Proact IT Group
|
|
- Beverly Hines
- 8 years ago
- Views:
Transcription
1 ILM, classification and the Information-Centric Enterprise Per Sedihn, Vice Chair Nordics Comitte SNIA Europe CTO Proact IT Group
2 SN IA Legal N otice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced without modification The SNIA must be acknowledged as source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the author nor the presenter is an attorney and nothing in this presentation is intended to be nor should be construed as legal advice or opinion. If you need legal advice or legal opinion please contact an attorney. The information presented herein represents the author's personal opinion and current understanding of the issues involved. The author, the presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO W ARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OW N RISK. Compliance Practices: Risks of Retention and Deletion 2008 Storage Networking Industry Association Storage Networking All Rights Industry Reserved. Association. All Rights Reserved. 4
3 Important New Datacenter Trends Information Convergence Driven by cost, complexity, and business risk, the operations, practices, and roles in the datacenter are converging around information and its value to the organization, catalyzing the transformation of the datacenter into an Information-Centric Enterprise. The Information-Centric Enterprise is the future of the datacenter Michael Peterson, Chief Strategy Advocate, SNIA
4 Why Create an Information- Centric Enterprise! Expanding Business Requirements Global business, global datacenters, global information sharing and access to information Real-time information integration requirements Growing Cost of Operations Staffing - limited resources and virtual locations Complexity and information overload Information security threats Compliance and legal overhead Risk management and increasing risk Litigation, discovery, privacy & confidentiality, security, and audit Long-term retention & preservation requirements for extremely large amounts of information
5 Creating the Information- Centric Enterprise At the beginning The message was right, but the method is not just better information management or just managing information according to its value Now we need a shift in operating practices based on: Collaboration Clear requirements Service Management Practices Instrumentation & Automation of Services It is time for organizations to begin architecting and implementing practical information management compliance solutions. By managing information according to its value Source: Randy Kahn, Information Nation
6 Creating the Information- Centric Enterprise NEW THINKING Use the value of information to the organization to define the requirements for management and operating practices The solution requires a process approach incorporating technology Information-Centric Management practices If you want to successfully solve the complexity and cost crisis in operating the datacenter, you have to change current practices and begin working together as an organization. Michael Peterson, Collaborate or Die Nov We re discovering how the old, data-centered approach to I.T. really isn t working. The difference between managin data and Information-Centric Management is profound. Large Nordic Company
7 Information-centric strategy Corporate information is simply data to the data center Data is what I.T. manages: files, volumes, bits and bytes Information is data with context: decisions are based on information Use a collaborative process to identify information service requirements Use these requirements to define an SLA Line of Business (LOB) information stakeholders: Application performance, availability, IT response times, asset reporting, Cost (for chargeback) Corporate information stakeholders: Security officer: Secret, confidential, public, Records Manager: retention time, Compliance officer: authorization, retention, Business Process Analyst App Owner DBA SLA IT service delivery stakeholder: Effective resource management based on requirements Service delivery that meets business needs Security Officer Records Legal Manager Information Classification Data Admin IT Architect IT Admins Data Requirements
8 ILM: Information Lifecycle Management From the SNIA Dictionary: The policies, processes, practices and tools used to align the business value of information with the most appropriate and cost effective IT infrastructure from the time information is created through it s final disposition. Information is aligned with business processes through management polices and service levels associated with applications, metadata, information and data Today, let s just talk about ILM Policies: ILM as the policy-based alignment of information requirements and the most appropriate infrastructure using data classification and service level management
9 Why Classification? Why Now? Growth of Information hasn t slowed Over a Zettabyte by 2010 Biggest impact is not the storage it s the management! 70% created by individuals 85% responsibility of organizations to ensure privacy, security, reliability & compliance Driven by many federal, state, local and industry-specific regulations Switches focus from capex to opex Exabytes AMOUNT OF DIGITAL INFORMATION CREATED AND REPLICATED EACH YEAR 1,773 exabytes 1,800 1,600 1,400 1,200 1, DVD RFID Digital TV MP3 players Digital cameras Camera phones, VoIP Medical imaging, Laptops, Data center applications, Games Satellite images, GPS, ATMs, Scanners Sensors, Digital radio, DLP theaters, Telematics Peer-to-peer, , Instant messaging, Videoconferencing, CAD/CAM, Toys, Industrial machines, Security systems, Appliances exabytes 10-fold growth in five years! Source: IDC White Paper, "The Diverse and Exploding Digital Universe," Sponsored by EMC, March 2008
10 Why Classification? Why Now? Storage landscape is changing Is the DVD player more important or the movies you watch? Need to answer some basic questions What is all this information? Is anyone managing it? How is authenticity being maintained? Can we delete some of it? Exabytes AMOUNT OF DIGITAL INFORMATION CREATED AND REPLICATED EACH YEAR 1,773 exabytes 1,800 1,600 1,400 1,200 1, DVD RFID Digital TV MP3 players Digital cameras Camera phones, VoIP Medical imaging, Laptops, Data center applications, Games Satellite images, GPS, ATMs, Scanners Sensors, Digital radio, DLP theaters, Telematics Peer-to-peer, , Instant messaging, Videoconferencing, CAD/CAM, Toys, Industrial machines, Security systems, Appliances exabytes 10-fold growth in five years! Source: IDC White Paper, "The Diverse and Exploding Digital Universe," Sponsored by EMC, March 2008
11 What s Driving The Need for Classification TODAY Corporations are saving everything, because They are unsure about the value of their information They are being litigated They are complying with government regulations Resulting in Massive amounts of information growing at fantastic rates Information security breaches Lots of money being spent for governance and compliance Data Growth Corporations are balancing IT Infrastructure and Management Costs against Information Risk Management Capacity Time
12 What s Driving The Need for Classification TODAY Corporations are saving everything, because They are unsure about the value of their information They are being litigated They are complying with government regulations Resulting in Massive amounts of information growing at fantastic rates Information security breaches Lots of money being spent for governance and compliance Three drivers for automated classification: 1.Risk Management 2.Reduce Storage TCO 3.Improve Productivity Capacity Data Growth Time
13 Classification Driver #1 Risk management Compliance: Payment Card Industry Data Security Standard (PCI) Health Insurance Portability and Accountability Act (HIPAA) New Federal Rules of Civil Procedure (FRCP) EU Directive on Privacy and Electronic Communications (2002/58/EC) Information Security Protecting Personally Identifiable Information (PII) Data Leakage Prevention (DLP) $80B spent on compliance by 2009 Compliant records growing 60%/yr at > 2PB in 2007 Fastest growing application segment of storage industry * Source: Fred Moore, Horison, Storage Spectrum 2006 Top 10 Customer Data-Loss Incidents Since 2000* Number of affected customers Date of initial disclosure Company / Organization 94,000, TJX Companies Inc. 40,000, Visa, et al 30,000, America Online 26,500, U.S. Department of Veterans Affairs 25,000, HM Customs and Revenue 8,637, Dai Nippon Printing Company 8,500, Fidelity National Information Services 6,300, TD Ameritrade 6,000, Chilean Ministry of Education 5,000, Data Processors International *From July 2008
14 Litigation Support and ediscovery ediscovery and records management coming together Driven by huge costs and risks Changes to the Federal Rules of Civil Procedure Electronically Stored Information (ESI) is subject to production (the way it is managed from cradle to grave will affect costs and risks of ediscovery) There will be an early meet and confer Word preserving appears in the rules for the first time There is a need to understand the sources of ESI Average ediscovery costs can run into the millions of dollars per event
15 Classification Driver #2 Storage TCO External disk storage purchase projected to grow at 52% annually Capacity is #1 storage issue driven by , unstructured data Significant transition to disk-based archival storage Digital archive capacity will increase nearly tenfold between 2005 and 2010 Total Digital Archived Capacity,WW Database Unstructured 54% CAGR 79% CAGR 68% CAGR * Sources: Merrill Lynch storage forecast & views from CIOs, Enterprise Strategy Groups 2006 Digital Archive study
16 Classification Driver #2 Storage TCO External disk storage purchase projected to grow at 52% annually (capex) Capacity is #1 storage issue driven by & unstructured data Significant transition to diskbased archival storage Digital archive capacity will increase nearly tenfold between 2005 and 2010 IDC report by 2011: zettabytes, ~60% CAGR 70% created by individuals 85% managed by organizations Storage Capex vs. Opex Capex may be as low as 25% of TCO * Impact of data management is rising Greater savings possible through more effective processes *Source wikibon:
17 Classification Driver #3 Improved productivity The average knowledge worker spends six hours per week searching for information 50% of all searches fail to locate desired information 15% of the average knowledge worker s time is spent recreating existing information Need Better organization of information Accurate search Consistent management of information Shortened time-to-information Source: IDC
18 Who Needs to Classify Traditionally Records Information Managers Records retention for regulatory compliance Coordinated records management across the enterprise Now Electronically Stored Information (ESI) forces information-centric collaboration Information Technology: provides service delivery for ESI Line of Business (LOB information stakeholders): Specify ESI & application behavior: performance, availability, recoverability Risk Management Specify application support: staff response time, asset reporting Perspective Identify budget/cost Stakeholder Security & Risk Mitigation Litigation Support Records Mgmt TCO Cost & Performance Mgmt Corporate stakeholders Classification must address multiple perspectives Support both overlapping and non-overlapping requirements Chief Security Officer Chief Legal Officer Corporation Counsel Records Information Manager Chief Compliance Officer Chief Risk Officer Chief Financial Officer Line of business Chief Information Officer
19 Organizing your data into logical groups Define Information Requirements per group High Throughput Five 9 s Availability Fast Recoverability Data may be classified by: - Application or business process - Metadata (e.g., time last accessed) - Content Different performance requirements per classification High Throughput Four 9 s Availability Fast Recoverability Medium Throughput Four 9 s Availability 24 hour recovery
20 Organize the same data into multiple logical groups Multiple classifications allow you to define requirements per aspect Classification perspectives: - Application performance - Records Retention - Archive / Lifecycle Mgmt - Security - Privacy - Information Rights Mgmt - Legal Discovery - and more Retain for 3 years Immutable Retain for 7 years DoD Shred Retain Forever
21 ILM Assessment Phases Prepare Obtain Sponsorship Build a team Set Goals and milestones Analysis Collect/Develop service level objectives Analyze Gaps Recommendations Design Implement Validate Design
22 Defining Classification Online Dictionary (Answers.com): A way or condition of being arranged A subdivision of a larger group Records Management perspective (Indiana University*): Classification is the systematic identification and arrangement of records into categories according to logically structured conventions, methods, and procedural rules represented in a classification scheme SNIA Dictionary (data classification): An organization of data into groups for management purposes. A purpose of a classification scheme is to associate service level objectives with groups of data based on their value to the business. EIW Workshop use of classification : An organization of data, information, or resources into groups for management purposes. A purpose of a classification scheme is to associate requirements or policies for the handling of that data or information *
23 ILM, Classification, and Resources Key characteristics of ILM: 1. Information Classification gathers requirements to guide configurations 2. Standard configurations described using Service Level Metrics 3. Data classification can align data to resources by Service Levels Information Requirements Guides Standard Configurations Service Catalog Capabilities A DR Align B C Defines
24 Value Proposition for ICM $10 X REDUCE THE TCO of Information Today $30 per GB/yr not counting risk factors Reality: TCO is Increasing The Myth TCO is Decreasing $X Time Promise of ILM
Information-centric Policy Management. Edgar StPierre, EMC
Information-centric Policy Management Edgar StPierre, EMC SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in
More informationILM: Tiered Services & The Need For Classification
ILM: Tiered Services & The Need For Classification Edgar StPierre, EMC 2 SNW San Diego April 2007 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
More informationARCHIVING FOR DATA PROTECTION IN THE MODERN DATA CENTER. Tony Walker, Dell, Inc. Molly Rector, Spectra Logic
ARCHIVING FOR DATA PROTECTION IN THE MODERN DATA CENTER Tony Walker, Dell, Inc. Molly Rector, Spectra Logic SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise
More informationThe Secret Sauce of ILM The ILM Assessment Core. Bob Rogers, Application Matrix
The Secret Sauce of ILM The ILM Assessment Core Bob Rogers, Application Matrix SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may
More informationRethinking Archiving: Exploring the path to improved IT efficiency and maximizing value of archiving solution investments
Rethinking Archiving: Exploring the path to improved IT efficiency and maximizing value of archiving solution investments Marshall Amaldas & Brad Nisbet, IDC Authors: Marshall Amaldas & Brad Nisbet, IDC
More informationActive Archive - Data Protection for the Modern Data Center. Molly Rector, Spectra Logic Dr. Rainer Pollak, DataGlobal
Active Archive - Data Protection for the Modern Data Center Molly Rector, Spectra Logic Dr. Rainer Pollak, DataGlobal SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA.
More informationEMC Backup Solutions for Virtualized Environments
EMC Solutions for Virtualized Environments Dumitru Taraianu Presales, EMC 1 VMWare Present & Future Present Agent installed in each host ESX Console-level backup VCB Future vstorage API for Data Protection
More informationEMC SourceOne Email Management and ediscovery Overview
EMC SourceOne Email Management and ediscovery Overview Deanna Hoover EMC SourceOne Systems Engineer 1 Agenda Value of Good Information Governance Introduction to EMC SourceOne Information Governance Email
More informationUniveristà La Sapienza Laurea Magistrale Ingegneria Informatica
Univeristà La Sapienza Laurea Magistrale Ingegneria Informatica Seminario Beyond Green: EMC and Energy Efficient IT Franco Martino EMC Consulting Manager 21 May 2010 1 EMC s Broad Product and Solutions
More informationIBM Cloud Computing mraky nad Českou republikou. Petr Plodík high-end/blade product manager IBM Central and Eastern Europe
IBM Cloud Computing mraky nad Českou republikou Petr Plodík high-end/blade product manager IBM Central and Eastern Europe 1 Exabytes A crisis of complexity. The need for progress is clear. 300 250 200
More informationCreating a Catalog for ILM Services. Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel
Creating a Catalog for ILM Services Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel SNIA Legal Notice The material contained in this tutorial is copyrighted
More informationArchive and Preservation in the Cloud - Business Case, Challenges and Best Practices. Chad Thibodeau, Cleversafe, Inc. Sebastian Zangaro, HP
Archive and Preservation in the Cloud - Business Case, Challenges and Best Chad Thibodeau, Cleversafe, Inc. Sebastian Zangaro, HP SNIA Legal Notice The material contained in this tutorial is copyrighted
More informationIn ediscovery and Litigation Support Repositories MPeterson, June 2009
XAM PRESENTATION (extensible TITLE Access GOES Method) HERE In ediscovery and Litigation Support Repositories MPeterson, June 2009 Contents XAM Introduction XAM Value Propositions XAM Use Cases Digital
More informationJourney to Private Cloud
Journey to Private Cloud Ferdinando Caputo Sales & Partner Development Manager Italia caputo_ferdinando@emc.com Roma, La Sapienza 23 Aprile 2010 1 Q4 and Full Year 2009 Highlights Thriving in a Challenging
More informationCloud Computing. Jean-Claude DISPENSA IBM Distinguished Engineer
Cloud Computing Jean-Claude DISPENSA IBM Distinguished Engineer Best Student Recognition Event July 6-8, 2011 EMEA IBM Innovation Center La Gaude, France Business needs are growing - IT costs are increasing
More informationin the Cloud - What To Do and What Not To Do Chad Thibodeau / Cleversafe Sebastian Zangaro / HP
Digital PRESENTATION Data Archive TITLE and GOES Preservation HERE in the Cloud - What To Do and What Not To Do Chad Thibodeau / Cleversafe Sebastian Zangaro / HP SNIA Legal Notice The material contained
More informationLong Term Record Retention and XAM
Long Term Record Retention and XAM Wayne M. Adams Chair Emeritus, SNIA www.snia.org Agenda Market Trends and Drivers SNIA Survey SNIA XAM Standard SNIA Meta Data Work Summary Information Challenge Escalating
More informationPreparing for a Security Audit: Best Practices for Storage Professionals
Preparing for a Security Audit: Best Practices for Storage Professionals Blair Semple, CISSP-ISSEP Vice Chair, SNIA Storage Security Industry Forum, Security Evangelist, NetApp SNIA Legal Notice The material
More informationCloud Archive & Long Term Preservation Challenges and Best Practices
Cloud Archive & Long Term Preservation Challenges and Best Practices Chad Thibodeau, Cleversafe, Inc. Sebastian Zangaro, HP Author: Chad Thibodeau, Cleversafe, Inc. Author: Sebastian Zangaro, HP SNIA Legal
More informationBest Practices for Long-Term Retention & Preservation. Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance
Best Practices for Long-Term Retention & Preservation Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance SNIA Legal Notice The material contained in this tutorial is copyrighted
More informationRealizing the ROI of Information Governance. Gregory P. Kosinski Director, Product Marketing EMC
Realizing the ROI of Information Governance Gregory P. Kosinski Director, Product Marketing EMC Copyright 2009 2010 EMC Corporation. All rights reserved. 1 2 Just How Important IS this? Technologies That
More informationStorage Considerations for Database Archiving. Julie Lockner, Vice President Solix Technologies, Inc.
Storage Considerations for Database Archiving Julie Lockner, Vice President Solix Technologies, Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
More informationPractical Storage Security With Key Management. Russ Fellows, Evaluator Group
Practical Storage Security With Key Management Russ Fellows, Evaluator Group SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies
More informationInformation Classification: The Cornerstone to Information Management. Sheila Childs, EMC Corporation
Information Classification: The Cornerstone to Information Management Sheila Childs, EMC Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
More informationIntroduction to Cloud Computing
Frans Baas IBM Innovation Center Benelux January 2011 V1.2 Introduction to Cloud Computing Content Why Cloud and why now? What is Cloud Computing? Customer Cloud case Developing Cloud workflows Developing
More informationARMA CENTRAL IOWA APRIL 25, 2013 MAKING THE BUSINESS CASE FOR INFORMATION GOVERNANCE: MORE CARROT, LESS STICK
ARMA CENTRAL IOWA APRIL 25, 2013 MAKING THE BUSINESS CASE FOR INFORMATION GOVERNANCE: MORE CARROT, LESS STICK AGENDA The information imperative The time is NOW Why RIM Making the case for IG 2 THE INFORMATION
More informationDeduplication s Role in Disaster Recovery. Gene Nagle, EXAR Thomas Rivera, SEPATON
Gene Nagle, EXAR Thomas Rivera, SEPATON SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations
More informationCloud Archiving. Paul Field Consultant
Paul Field Consultant SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations and literature
More informationMobile World. Chris Winter SafeNet Inc.
Securing PRESENTATION File Data TITLE in GOES a Distributed HERE or Mobile World Chris Winter SafeNet Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER The IT Manager's Role in Proactive Information Retention and Disposition Management: Balancing ediscovery and Compliance Obligations with IT Operational and Budget Constraints Sponsored by:
More informationData Center Technologies
Data Center Technologies Ing. Marcel Kuza mkuza@uy.ibm.com Agosto, 2010 XI Jornadas de Actualización Tecnológica: Networking, Punta del Este, Uruguay Agenda Introduction to Data Center Solutions (by IBM)
More informationHow to Cost Effectively Retain Reference Data for Analytics and Big Data. Molly Rector, EVP Product Management & WW Marketing, Spectra Logic
How to Cost Effectively Retain Reference Data for Analytics and Big Data Molly Rector, EVP Product Management & WW Marketing, Spectra Logic SNIA Legal Notice The material contained in this tutorial is
More informationAccelerating HIPAA Compliance with EMC Healthcare Solutions
Accelerating HIPAA Compliance with EMC Healthcare Solutions A HealthCIO White Paper Sponsored by the EMC Corporation by Jonathan Bogen 2003 E-mail: Info@HealthCIO.com www.healthcio.com Accelerating HIPAA
More informationRestoration Technologies. Mike Fishman / EMC Corp.
Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Mike Fishman / EMC Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
More informationSecurity Information Lifecycle
Security Information Lifecycle By Eric Ogren Security Analyst, April 2006 Copyright 2006. The, Inc. All Rights Reserved. Table of Contents Executive Summary...2 Figure 1... 2 The Compliance Climate...4
More informationData Center Transformation. Russ Fellows, Managing Partner Evaluator Group Inc.
Russ Fellows, Managing Partner Evaluator Group Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in
More informationHP Adaptive Backup and Recovery
HP Adaptive Backup and Recovery Addressing Your BURA Strategy Today Reflects Your Business Purposes Tomorrow Scott Baker - Director, Enterprise Data Protection Andrew Dickerson Senior Manager, Backup,
More informationPartner / E-Discovery Team Chair. Craig Roy Director of IT & E-Litigation Services
E-Discovery Business Readiness Drew Sorrell, Esq. Partner / E-Discovery Team Chair Craig Roy Director of IT & E-Litigation Services What is Business Readiness in terms of E-Discovery? Risk Adjusted Management
More informationProactive Data Management for ediscovery
Proactive Data Management for ediscovery Simon Taylor Snr. Director Information Management CommVault Systems Inc. Why ediscovery sucks for IT The US Federal Rules of Civil Procedure Rule 34(a), (b) Definition
More informationManaging Storage and Compliance Costs through E-mail Archiving and ediscovery
Managing Storage and Compliance Costs through E-mail Archiving and ediscovery Gregory P. Kosinski Director, Product Marketing EMC Heidi Maher, Esq. Compliance and ediscovery Advisor EMC Copyright 2009
More informationToday s Agile, Complex and Heterogeneous Data Centers
Managing PRESENTATION Backup TITLE and GOES Recovery HERE in Today s Agile, Complex and Heterogeneous Data Centers Maria Pressley, Chief Evangelist Unitrends Gene Nagle, Vice President Technical Services
More informationUNDERSTANDING DATA DEDUPLICATION. Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s.
UNDERSTANDING DATA DEDUPLICATION Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual
More informationDeveloping an Integrated e-discovery and Corporate Records Management Program. Presented by: Janeine Charpiat Information Security Professional
Developing an Integrated e-discovery and Corporate Records Management Program Presented by: Janeine Charpiat Information Security Professional What is ediscovery? any process in which electronic data is
More information15 Best Practices For Comparing Data Protection With Cloud Media Server
The Changing PRESENTATION Role TITLE of GOES Data HERE Protection In a Virtual World Gene Nagle, BridgeSTOR Thomas Rivera, Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial
More informationHealthcare Information Management: A New Urgency
Healthcare Information Management: A New Urgency A Proofpoint White Paper threat protection compliance archiving & governance secure communication Contents The Problem: Too much information, too little
More informationUsing Classification to manage File Servers. Nir Ben-Zvi, Microsoft Corporation
Using Classification to manage File Servers Nir Ben-Zvi, Microsoft Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
More informationDeduplication s Role in Disaster Recovery. Thomas Rivera, SEPATON
Thomas Rivera, SEPATON SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations and literature
More informationThe Importance of Information Governance and Risk Management
Information Governance what it is and how it relates to your customers Julie J. Colgan, IGP, CRM 2015 PRISM Annual Conference How much of the world s data was created in the last 2 years? 30% 50% 70% 90%
More informationCOMPLIANCE PRACTICES:
COMPLIANCE PRACTICES: The risks of retention and deletion in the face of FRCP Michael Peterson, Strategic Research Corp. and the SNIA s Data Management Forum SNIA Legal Notice The material contained in
More informationUNDERSTANDING DATA DEDUPLICATION. Thomas Rivera SEPATON
UNDERSTANDING DATA DEDUPLICATION Thomas Rivera SEPATON SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
More informationplantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
More informationDeduplication s Role in Disaster Recovery. Thomas Rivera, SEPATON
Thomas Rivera, SEPATON SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations and literature
More informationUnderstanding ediscovery and Electronically Stored Information (ESI)
Copyright The information transmitted in this document is intended only for the addressee and may contain confidential and/or privileged material. Any interception, review, retransmission, dissemination
More informationInformation Governance Challenges and Solutions
Challenges and Solutions In this modern information age, organizations struggle with two things: the problem of too much electronic data and how to govern the data. Each year, the speed of information
More informationUtica College. Information Security Plan
Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles
More informationComputer Security Incident Response Plan. Date of Approval: 23- FEB- 2015
Name of Approver: Mary Ann Blair Date of Approval: 23- FEB- 2015 Date of Review: 22- FEB- 2015 Effective Date: 23- FEB- 2015 Name of Reviewer: John Lerchey Table of Contents Table of Contents... 2 Introduction...
More informationInformation Archiving
Information Archiving Drinking from the firehose. Raymond Lambie Product Marketing Manager, HP Autonomy AP/J Archive or Backup What is the difference? Ctrl-X or Ctrl-C An archive is a primary copy of inactive
More informationStorage Clouds. Karthik Ramarao. Director of Strategy and Technology and CTO Asia Pacific, NetApp Board Director SNIA South Asia
Deploying PRESENTATION Public, TITLE Private, GOES HERE and Hybrid Storage Clouds Karthik Ramarao Director of Strategy and Technology and CTO Asia Pacific, NetApp Board Director SNIA South Asia SNIA Legal
More informationTO BE OR NOT TO BE (Archiving), That is the question!
Why SourceOne Series TO BE OR NOT TO BE (Archiving), That is the question! The Business Value of SourceOne TM for Archive and E-discovery Why you should take the time to read this paper Get control of
More information10 Building Blocks for Securing File Data
hite Paper 10 Building Blocks for Securing File Data Introduction Securing file data has never been more important or more challenging for organizations. Files dominate the data center, with analyst firm
More informationImproving Unstructured Data Governance. Ryan Jancaitis Product Management Symantec
Improving Unstructured Data Governance Ryan Jancaitis Product Management Symantec Agenda 1 2 3 4 Overview Data Management Data Protection and Compliance Summary Unstructured Information Growth Leads to
More informationand the world is built on information
Let s Build a Smarter Planet Starting with a more dynamic and the world is built on information Guy England Storage sales manager CEEMEA englag@ae.ibm.com Tel: +971 50 55 77 614 IBM Building a Smarter
More informationOptimizing Information Management in the Cloud
I D C E X E C U T I V E B R I E F Optimizing Information Management in the Cloud June 2011 Adapted from Cloud Storage Impacted by Datacenter Transformations and the Changing Role of IT by Laura DuBois,
More informationCloud File Services: October 1, 2014
Cloud File Services: SMB/CIFS and TITLE NFS in the Cloud PRESENTATION GOES HERE October 1, 2014 Webcast Presenters David Fair, SNIA ESF Business Development Chair - Intel John Reed Product Manager, Windows
More informationPutting IT at e s: Considerations for ediscovery, ECM, & ERM
Government IT June 25, 2008 Putting IT at e s: Considerations for ediscovery, ECM, & ERM Julie Gable Baron Gemmer Gable Consulting, ICS 2008 1 ESI: Not just documents Record Record Types Types File File
More informationUNDERSTANDING DATA DEDUPLICATION. Tom Sas Hewlett-Packard
UNDERSTANDING DATA DEDUPLICATION Tom Sas Hewlett-Packard SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
More informationAn Introduction to Storage Management. Raymond A. Clarke, Oracle
An Introduction to Storage Management Raymond A. Clarke, Oracle SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this
More informationRSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief
RSA Solution Brief RSA Managing Data Loss the Lifecycle of Prevention Encryption Suite Keys with Uncover your risk, establish control. RSA Key Manager RSA Solution Brief 1 Executive Summary RSA Data Loss
More information巨 量 資 料 分 層 儲 存 解 決 方 案
巨 量 資 料 分 層 儲 存 解 決 方 案 Lower Costs and Improve Efficiencies Cano Lei Senior Sales Consulting Manager Oracle Systems Oracle Confidential Internal/Restricted/Highly Restricted Agenda 1 2 3 Why Tiered Storage?
More informationHow To Create A Cloud Backup Service
Cloud Backup Recovery and Restore Requirements Ashar Baig, Asigra Chairman, SNIA Cloud Backup Recovery and Restore (BURR) Special Interest Group (SIG) SNIA Legal Notice The material contained in this tutorial
More informationTrends in Application Recovery. Andreas Schwegmann, HP
Andreas Schwegmann, HP SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations
More informationWhite Paper. Enterprise Information Governance. Date Released: September 2014. Author/s: Astral Consulting. www.astral.com.au.
White Paper Enterprise Information Governance Date Released: September 2014 Author/s: Astral Consulting Disclaimer This White Paper is published for general information purposes only. Nothing in the White
More informationInformation Governance
Information Governance in-fər-ˈmā-shən\ˈgə-vər-nən(t)s: a holistic approach to managing business information by implementing processes, roles, controls and metrics that treat information as a valuable
More informationMEEC Webinar Daly and EMC BRS - EMC Backup & Archive Solutions
MEEC Webinar Daly and EMC BRS - EMC Backup & Archive Solutions Accelerating Transformation Presented By: Gabe Sales-Smith Backup & Recovery Specialist EMC Jim Rowland Senior System Architect and Project
More informationEMC Academic Alliance (EAA)
EMC Academic Alliance (EAA) Developing tomorrow s information storage professionals today! Kim Yohannan EMC Education Services 1 World s Top 10 Product Technology Companies Top 10 IT Product Technology
More informationInformation Governance in the Cloud
Information Governance in the Cloud TABLE OF CONTENTS Executive Summary...3 Information Governance: Building a Trusted Foundation for Business Content...5 The Challenge...5 The Solution....5 Content and
More informationReal World Strategies for Migrating and Decommissioning Legacy Applications
Real World Strategies for Migrating and Decommissioning Legacy Applications Final Draft 2014 Sponsored by: Copyright 2014 Contoural, Inc. Introduction Historically, companies have invested millions of
More informationGuide to Information Governance: A Holistic Approach
E-PAPER DECEMBER 2014 Guide to Information Governance: A Holistic Approach A comprehensive strategy allows agencies to create more reliable processes for ediscovery, increase stakeholder collaboration,
More informationIBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk
Amir Jaibaji - Product Management Program Director IBM Information Lifecycle Governance IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk Enterprise big
More informationGOT LAWYERS? THEY'VE GOT STORAGE AND ESI IN THE CROSS-HAIRS!
Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems GOT LAWYERS? THEY'VE GOT STORAGE AND ESI IN THE CROSS-HAIRS! David Stevens Dell SNIA Legal Notice The material contained in
More information3 "C" Words You Need to Know: Custody - Control - Cloud
3 "C" Words You Need to Know: Custody - Control - Cloud James Christiansen Chief Information Security Officer Evantix, Inc. Bradley Schaufenbuel Director of Information Security Midland States Bank Session
More informationRSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively
RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively Arrow ECS DLP workshop, Beograd September 2011 Marko Pust marko.pust@rsa.com 1 Agenda DLP in general What to expect from
More information3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks;
Enterprise Content Management (ECM) Policy Version Information A. Introduction Purpose 1. Outline and articulate the strategy for enterprise content management across Redland City Council (RCC). This document
More informationSM B13: Symantec Data Insight Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager
Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager 1 Agenda 1 2 3 4 Overview Data Management Data Protection and Compliance What s New and Futures SYMANTEC VISION 2012
More informationIntegration of E-Discovery and FOIA
Integration of E-Discovery and FOIA April 4, 2013 Tom Kennedy Director, Symantec Archiving and E-Discovery Team Digital Government Institute s E-Discovery, Records & Information Management Conference,
More informationStorage Clouds. Enterprise Architecture and the Cloud. Author and Presenter: Marty Stogsdill, Oracle
Deploying PRESENTATION Public, TITLE Private, GOES HERE and Hybrid Storage Clouds Enterprise Architecture and the Cloud Author and Presenter: Marty Stogsdill, Oracle SNIA Legal Notice The material contained
More informationWHITE PAPER. Deficiencies in Traditional Information Management
WHITE PAPER Deficiencies in Traditional Information Management Table of Contents 3 Abstract 3 Information Management Defined 7 Problems with Traditional Approaches 8 Conclusion Table of Figures 5 Figure
More informationEMC DATA DOMAIN EXTENDED RETENTION SOFTWARE: MEETING NEEDS FOR LONG-TERM RETENTION OF BACKUP DATA ON EMC DATA DOMAIN SYSTEMS
SOLUTION PROFILE EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE: MEETING NEEDS FOR LONG-TERM RETENTION OF BACKUP DATA ON EMC DATA DOMAIN SYSTEMS MAY 2012 Backups are essential for short-term data recovery
More informationVisions for Ethernet Connected Drives. Vice President, Dell Oro Group chris@delloro.com March 25, 2015
Visions for Ethernet Connected Drives PRESENTATION TITLE GOES HERE Chris DePuy, Vice President, Dell Oro Group chris@delloro.com March 25, 2015 Webcast Presenters David Fair, SNIA ESF Chair Intel Vice
More informationHow To Migrate To A Network (Wan) From A Server To A Server (Wlan)
The Role of WAN Optimization in Infrastructures Josh Tseng, Riverbed SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use
More informationHow To Understand And Understand The Risks Of Configuration Drift
How to: Eliminate Configuration Drift Risk Gil Hecht, CEO Continuity Software SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
More informationDefensible Disposition Strategies for Disposing of Structured Data - etrash
Defensible Disposition Strategies for Disposing of Structured Data - etrash Presented by John Isaza, Esq., FAI Co-Founder & CEO, Information Governance Solutions, LLC Tom Reding, CRM Executive Consultant,
More information7Seven Things You Need to Know About Long-Term Document Storage and Compliance
7Seven Things You Need to Know About Long-Term Document Storage and Compliance Who Is Westbrook? Westbrook Technologies, based in Branford on the Connecticut coastline, is an innovative software company
More informationEnterprise Architecture and the Cloud. Marty Stogsdill, Oracle
Marty Stogsdill, Oracle SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations
More informationTechnology Assisted Review Goes Left: Predictive Analytics In Information Governance
BEIJING BOSTON BRUSSELS CHICAGO DALLAS FRANKFURT GENEVA HONG KONG HOUSTON LONDON LOS ANGELES NEW YORK PALO ALTO SAN FRANCISCO SHANGHAI SINGAPORE SYDNEY TOKYO WASHINGTON, D.C. Technology Assisted Review
More informationAnalyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
More informationSecure Data Transmission Solutions for the Management and Control of Big Data
Secure Data Transmission Solutions for the Management and Control of Big Data Get the security and governance capabilities you need to solve Big Data challenges with Axway and CA Technologies. EXECUTIVE
More informationEmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
More informationMeaning Based Computing: Managing the Avalanche of Unstructured Data
Meaning Based Computing: Managing the Avalanche of Unstructured Data Bill Tolson, Director of Information Governance POWER PROTECT PROMOTE Moving away from structured data Accelerated unstructured information
More informationData Center Storage... Spend Less, Deliver More. Hubbert Smith, LSI
Data Center Storage... Spend Less, Deliver More Hubbert Smith, LSI SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual
More information