A CommVault Business-Value White Paper Understanding and Mitigating the Legal Risks of Cloud Computing
|
|
|
- Milton Doyle
- 10 years ago
- Views:
Transcription
1 A CommVault Business-Value White Paper Understanding and Mitigating the Legal Risks of Cloud Computing Shannon Smith, Esq., ediscovery and Archiving Specialist for CommVault Systems Bennett B. Borden, Partner and Chair of the ediscovery and Information Governance Section, Williams Mullen
2 Contents Impact of Cloud Data on ediscovery Process Idenification, Preservation, and Collection 4 Reducing Other Risks of Cloud Data 5 Record Retention and Backup Policies 5 Types of Data Being Stored in the Cloud 5 and Physical Location Authenticity and Chain of Custody 6 Exit Strategy 6 Conclusion 6
3 This article first appeared in the June 2011 issue of The Corporate Counselor, an ALM Publication. It is no secret that an increasing number of enterprises are investing in cloud computing. Whether they are replacing on-premise applications or traditional outsourcing models, rising costs and technical complexity have led organizations to look to third party providers for some or all of their information technology needs. There can be significant economic efficiencies realized by moving to the cloud. But, just as important are potential benefits associated with data privacy and security, compliance, business intelligence and overall information governance improvements. Entities often struggle with establishing comprehensive information governance programs that capitalize on the value of their information assets while avoiding the risks of ungoverned information. Cloud providers are increasingly aware of these challenges and are shaping cloud solutions to overcome them. That said, there are also potential risks involved if an entity does not adequately consider the information governance implications, especially those involving electronic discovery, when moving to the cloud. Cloud computing leverages economies of scale to reduce inefficiency and improve performance of IT operations. Essentially, there are three categories of cloud service models Infrastructure, Platform, and Software-as-a-Service, commonly referred to as IaaS, PaaS, and SaaS, respectively. Infrastructure-as-a-Service involves outsourcing of equipment or hardware to support IT operations. IaaS providers include Amazon Web Services, Rackspace, and Nirvanix, among others. PaaS also includes outsourcing of hardware and includes providers like Microsoft Azure and Google Apps. The difference between infrastructure- and platformas-a-service is typically around control. With IaaS, a client is usually responsible for the configuration and maintenance of operating systems, whereas with PaaS, the service provider manages those responsibilities. Lastly, there is Software-as-a-Service, which is a software distribution model where applications or programs are hosted by a third party provider and are made available over a network, usually the Internet. SaaS providers include SalesForce.com and CaseCentral, among others. Most enterprises are finding that moving to the cloud may improve overall IT cost-effectiveness, but the shift raises a number of issues on the legal side of the house that often go unrecognized or unaddressed. Although much of the early discussion around cloud computing focused on availability and security, the conversation has now shifted to topics like custody and control, authenticity and legal preservation. The existence of vast amounts of electronically stored information (ESI) housed offsite, the potential lack of control of this data, and the challenges of preserving and processing it in connection with a lawsuit or regulatory investigation is enough to cause concern amongst even the most technically-inclined corporate legal teams. However, when carefully considered, information governance policies and procedures can be developed to reduce the risks and realize the benefits of cloud computing. 3
4 Impact of Cloud Data on ediscovery Process Identification, Preservation, and Collection When corporate data is managed by internal IT resources, the number of data repositories and the physical locations of that data are finite and more or less easy to pinpoint. The enterprise controls how this data is created, stored, distributed and disposed of, and policies and procedures can be developed to respond to litigation or regulatory investigations with some surety. Data stored in the cloud, however, could be stored on multiple servers across multiple jurisdictions, making it more difficult to identify, preserve, and collect for litigation or regulatory investigations. To ensure that an enterprise can demonstrate to a court or regulator that it took reasonable steps to address relevant ESI, it is pertinent that corporate counsel ask the right questions about where and how data is being stored by a potential cloud service provider before making the decision to move to the cloud. The answers to these questions should be documented so that when a lawsuit arises, corporate counsel and IT can work quickly to locate responsive ESI. To this end, it is also important to note what tools are available to support the identification process. For example, does the provider offer search tools or other capabilities that would allow inside counsel to locate a certain subset of data? Just as any prudent organization would develop policies and processes to preserve onsite data, data stored by a third party should also be addressed by corporate information governance policies. Will the cloud provider execute a litigation hold or are there tools available that would allow corporate IT or legal to execute a hold against data in the cloud? If the cloud provider will not implement the hold, it is critical to understand and document the process for preserving ESI prior to facing litigation. This includes understanding your cloud provider s retention and backup policies and how data can be retrieved before it is potentially destroyed. Collection can often pose the trickiest challenges when dealing with data stored in the cloud. Corporate counsel will want to understand what the collection process truly entails. For example, are there tools available to cull down data prior to collection or must all data be collected and then processed internally? Secondly, does the provider allow for self-collection and, if not, are there costs associated with data retrieval? Lastly, it is important to understand the format of the collected data and how, if at all, the authenticity of the data will be affected by the collections process. Will metadata be altered as a result or will the cloud provider be able to demonstrate that the data has been maintained in its original, unaltered state? The key point is to do sufficient due diligence on a potential cloud provider and the specific solution it proposes so that policies and procedures can be developed that are crafted to the specific solution. 4
5 Reducing Other Risks of Cloud Data Knowing the answers to these questions before an enterprise is faced with litigation is critical in reducing risk associated with identification, preservation, and collection. However, the e-discovery process is only one piece of the puzzle in governing corporate data in the cloud. Prior to entering into an agreement with a cloud provider, IT and corporate counsel will also want to jointly address the following subjects: n Record Retention and Backup Policies Part of the identification process involves understanding what data resides in a corporate environment at a given time, which is one of the reasons that organizations develop and regularly update corporate retention policies. Moving to the cloud will likely add to the complexity of adhering to these policies. Will your cloud provider have the ability to execute corporate retention policies? How will the data disposition process be carried out and will it be documented? These are questions to pose to your cloud provider and include in your service agreement to the extent possible. If they cannot be included, then the information governance policies and procedures of the entity should be crafted to work within the strengths and limitations of a particular cloud offering. n Type of Data Being Stored in the Cloud and Physical Location In reality, negotiating the terms of the cloud service agreement may prove challenging. Some cloud providers only offer standard contractual terms while others might be willing to negotiate particular terms. With this in mind, it is important to consider what type of corporate data is being stored in the cloud and whether that data can be appropriately secured and governed. For example, if a provider is unwilling to provide the required level of service around privacy, security and authenticity, it would be unwise to store anything but the least valuable corporate data with a third party. Additionally, understanding and documenting where the data will be physically located is equally important. Companies must ensure their data is governed in accordance with whatever laws pertain to the location where the data might be stored. Additionally, the nature of the data may also trigger location-specific issues, especially if the organization is managing information of foreign nationals where issues of privacy laws and/or blocking statutes may arise. Many cloud providers are facile with foreign privacy restrictions, however, and offer Safe Harbor certification, or will agree to restrict the movement or storage of data through or within specific jurisdictions. In this way, cloud solutions can actually strengthen the information governance policies of an entity. 5
6 n Authenticity and Chain of Custody Authenticity issues apply to cloud-stored data at any given time during its lifecycle. In order to ensure that the integrity of corporate data is protected at all times, it is critical to understand how the data will be moved into the cloud (if not originally generated in the cloud), out of the cloud, and how it is stored during its life in the cloud. How will the cloud provider ensure that metadata and content remain unchanged and that the data has not been tampered with in the cloud? Equally important is access to logs and reports to verify the security and integrity of the data. Lastly, you will want to include provisions in the service contract to ensure that the provider will comply with requests for declarations or other testimony necessary to establish chain of custody. As with other aspects of cloud computing, understanding these issues and crafting information governance policies and litigation response protocols around the specific cloud solution is critical to the reasonableness and thus defensibility of those policies and protocols. n Exit Strategy Often overlooked, an exit strategy should also be discussed prior to entering a cloud agreement. As technology develops, it is likely that corporate IT may want to move data from one cloud provider to another to service its needs. Whatever the driver, corporate counsel needs to understand the legal ramifications of migrating data. How will authenticity and chain of custody be maintained and documented? What is the timeframe associated with the migration? This latter question is critical given that an enterprise likely faces at least one lawsuit at a given time. Will the corporate legal team be able to respond to discovery demands if IT is in the midst of a large scale migration? Lastly, any costs associated with an exit strategy should be included in the cloud service agreement. Conclusion Although the above discussion may suggest that cloud computing is too risky for undertaking, many organizations will discover that the benefits significantly outweigh these risks and, more importantly, that these risks are indeed manageable. Collaboration between corporate IT and legal teams is key to understanding and planning around both the business and legal risks of cloud computing. By developing a consensus on what data is appropriate for the cloud and how that data should be governed throughout its lifecycle, many of the risks identified above can be reduced to acceptable levels. Moreover, a thorough vetting of a cloud provider and its ability to meet corporate requirements around retention, access, preservation and recoverability assure corporate legal teams that ESI is being governed appropriately and that they will be able to meet the standards set forth around e-discovery. 6
7 Shannon Smith is an experienced attorney who has assisted numerous organizations in developing strategies for record retention, litigation readiness and archiving. Prior to Commvault, she worked as general counsel for an IT firm specializing in data archiving and e-discovery. Smith is an active member of both the EDRM and Sedona Conference Working Groups. She can be reached at Bennett B. Borden co-chairs the firm s e-discovery and Information Governance Section. A litigation attorney, Borden focuses his practice on Electronic Discovery and Information Law. He can be reached at [email protected]. n n [email protected] CommVault Worldwide Headquarters n 2 Crescent Place n Oceanport, NJ n n Fax: CommVault Regional Offices: United States n Europe n Middle East & Africa n Asia-Pacific n Latin America & Caribbean n Canada n India n Oceania CommVault Systems, Inc. All rights reserved. CommVault, CommVault and logo, the CV logo, CommVault Systems, Solving Forward, SIM, Singular Information Management, Simpana, CommVault Galaxy, Unified Data Management, QiNetix, Quick Recovery, QR, CommNet, GridStor, Vault Tracker, InnerVault, QuickSnap, QSnap, SnapProtect, Recovery Director, CommServe, CommCell, ROMS and CommValue are trademarks or registered trademarks of CommVault Systems, Inc. All other third party brands, products, service names, trademarks, or registered service marks are the property of and used to identify the products or services of their respective owners. All specifications are subject to change without notice. 7
Management with Simpana
Efficient, Affordable Data Management with Simpana Software and Microsoft Windows Azure Protect, Manage and Access Your Data Securely and Efficiently: On Premises, In the Cloud, From Anywhere, At Any Time,
How To Know If Your Email Archive Is Ready To Be Used For Business
7 REASONS TO WORRY ABOUT YOUR CURRENT EMAIL ARCHIVING STRATEGY The data growth explosion facing most organizations today is coinciding with the mounting demands of stagnant IT budgets and an increased
A CommVault Business-Value White Paper Archiving Strategies for Successful ediscovery
A CommVault Business-Value White Paper Archiving Strategies for Successful ediscovery Gary Cooke Archiving Technical Specialist, CommVault Contents Why Archive When You Have Backups? 3 Archiving Advancements
EMAIL ARCHIVING: A BUYER S CHECKLIST
EMAIL ARCHIVING: A BUYER S CHECKLIST Email is the backbone of today s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers,
Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management
Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management A CommVault Business Value and Technology White Paper which covers leveraging a modern approach to managing snapshots
ediscovery AND COMPLIANCE STRATEGY
ONE EASILY AVOIDABLE PITFALL IN YOUR ediscovery AND COMPLIANCE STRATEGY As the mobile workforce continues to grow and more data gets generated outside of the datacenter, bringing that endpoint data into
The Five Fundamentals of Virtual Server Data Protection. February, 2013
The Five Fundamentals of Virtual Server Data Protection February, 2013 Contents The Drive to Virtualize... 3 The Five Fundamentals... 3 Virtual Server Data Protection Solved... 4 Data Protection and the
Enhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server
PARTNER SOLUTION BRIEF Enhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server Companies relying on the benefits of virtualized environments to reduce
SharePoint Archive Rules Options
Key Capabilities u Control data growth Address common capacity management problems such as database growth. Reduce the time required to make backup copies by archiving old documents out of the primary
Archive 8.0 for File Systems and NAS Optimize Storage Resources, Reduce Risk and Improve Operational Efficiencies
BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH Key Benefits Optimize capacity in primary storage with tiered storage architecture, providing cost and resource benefits Retain transparent
Scheduling Tansaction Log Restores on a Standby SQL Server
Scheduling Tansaction Log Restores on a Standby SQL Server CONTENTS Introduction... 3 Audience... 3 Restore Environment... 3 Goal... 3 Solution... 3 2 INTRODUCTION You can schedule to restore the latest
COMMVAULT SIMPANA 10 SOFTWARE MULTI-TENANCY FEATURES FOR SERVICE PROVIDERS
COMMVAULT SIMPANA 10 SOFTWARE MULTI-TENANCY FEATURES FOR SERVICE PROVIDERS As cloud adoption continues to rise, so has the demand from Service Providers for software products that support their multi-tenant
BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH
BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH Simpana Search Key Benefits Legal Discovery, Business and Compliance Benefits Simplify, speed and reduce the cost of enterprise-wide ediscovery
CommVault Simpana Replication Software Optimized Data Protection and Recovery for Datacenter or Remote/Branch Office Environments
BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH Key Benefits Consolidates data over thin WAN connections and expedites local recovery Eliminates tape management at multiple locations by
Commvault Cloud Solutions
Commvault Cloud Solutions GET STRATEGIC WITH YOUR CLOUD The cloud is changing everything. But even as it transforms IT strategies, the cloud presents real challenges when it comes to operationalizing mainstream
How To Use Simpana Archive For Microsoft Sharepoint Software
BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE NAGEMENT SEARCH Key Benefits Saves disk capacity by moving unused data to secondary, less expensive storage, establishing proactive control over skyrocketing
A CommVault Business Value & Technology White Paper. Snapshot Management & Source-side Deduplication are Vital to Modern Data Protection
A CommVault Business Value & Technology White Paper Snapshot Management & Source-side Deduplication are Vital to Modern Data Protection Contents Executive Summary 3 New Approaches Needed to Tackle Data
Continuous Data Replicator 7.0
DATA PROTECTION ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH Continuous Data Replicator 7.0 Continuous Data Protection (CDP) and Centralized Management of Remote Office Data Key Benefits Reduces management
CommVault Simpana Remote and Branch Office Protection
BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH Key Benefits Consolidate data over thin WAN connections and expedite local recovery with multiple backup and recovery options. Save time
5 Benefits of Disaster Recovery in the Cloud.
5 Benefits of Disaster Recovery in the Cloud. One of the biggest use cases for the cloud in fact, the biggest, in the case of hosted private cloud is for backup and disaster recovery. It adds up to one
CommVault Search Web Interface 7.0 for Users
DATA PROTECTION ARCHIVE REPLICATION RESOURCE MANAGEMENT SEARCH CommVault Search Web Interface 7.0 for Users Singular Search of Files and e-mail Managed by CommVault Unified Data Management Software Key
Combining the Manageability and Efficiency of CommVault Simpana Software With the Speed of Native Snapshots
Combining the Manageability and Efficiency of CommVault Simpana Software With the Speed of Native Snapshots Leverage Snapshot Integration to Protect Data, Meet SLAs, and Improve RPOs and RTOs Contents
A CommVault Business-Value White Paper Unlocking the Value of Global Deduplication for Enterprise Data Management
Unlocking the Value of Global Deduplication for Enterprise Data Management Reduce Costs, Reduce Complexity, Reduce Recovery Times Contents Executive Summary 3 Redundant Data Reduces Storage Efficiency
Automated Proactive Solution System (APSS) INSTALLATION GUIDE
Automated Proactive Solution System (APSS) INSTALLATION GUIDE Table of Contents Table of Contents... 2 Overview... 3 Pre-Requisites... 3 Installation Process... 3 Post Installation... 10 Log Monitoring
Simpana Archive for IBM Lotus Domino Server Mailboxes
BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE NAGEMENT SEARCH Simpana Archive for IBM Lotus Domino Server Mailboxes Key Benefits Saves disk capacity by moving unused data to secondary, less expensive
A CommVault White Paper: Business Continuity: Commserve Licensing & Recovery Procedure
A CommVault White Paper: Business Continuity: Commserve Licensing & Recovery Procedure CommVault Corporate Headquarters 2 Crescent Place Oceanport, New Jersey 07757-0900 USA Telephone: 888.746.3849 or
Simpana Archive for File Systems and NAS
BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE NAGEMENT SEARCH Simpana Archive for File Systems and NAS Key Benefits Optimize Storage Resources, Reduce Risk and Improve Operational Efficiencies Optimize
Using Live Sync to Support Disaster Recovery
Using Live Sync to Support Disaster Recovery SIMPANA VIRTUAL SERVER AGENT FOR VMWARE Live Sync uses backup data to create and maintain a warm disaster recovery site. With backup and replication from a
COMMVAULT SIMPANA SOFTWARE SOLUTION SETS FOR MODERN INFORMATION INFRASTRUCTURE AND CLOUD ENVIRONMENTS
FACT SHEET: COMMVAULT SIMPANA SOFTWARE SOLUTION SETS FOR MODERN INFORMATION INFRASTRUCTURE AND CLOUD ENVIRONMENTS CommVault has introduced new Simpana software solution sets that are purpose-built to modernize
A CommVault White Paper Traditional Backup is Dead Are You Prepared?
Traditional Backup is Dead Are You Prepared? Conventional backup and recovery approaches clearly can t keep up with ever-growing storage rates. It s time to take on a new strategy. Contents Executive Summary
BALANCING COST, RISK AND COMPLEXITY IN YOUR DR STRATEGY
BALANCING COST, RISK AND COMPLEXITY IN YOUR DR STRATEGY James Brissenden: CommVault Services Development Manager Jeff Dorr: CommVault Marketing Manager Abstract: In the face of more frequent disaster situations
CommVault Simpana Software with SnapBackup
BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE NAGEMENT SEARCH Key Benefits Provides better RPO/RTOs for critical data, even for the largest datasets and databases. CommVault Simpana Software with SnapBackup
Using VM Archiving to Solve VM Sprawl
Using VM Archiving to Solve VM Sprawl Today s VMware environments are plagued by out-of-control growth of virtual machines, increasing costs and wasting valuable resources. This whitepaper discusses how
Hidden Costs of Virtualization Backup Solutions, Revealed
Hidden Costs of Virtualization Backup Solutions, Revealed 5 WAYS VIRTUAL BACKUP PRODUCTS CAN SURPRISE YOU LATER Today, nearly every datacenter has become heavily virtualized. In fact, according to Gartner
JANUARY 2015 EDUCATION PROGRAM GUIDE PARTNER PARTN ADVANTAGE
JANUARY 2015 PARTN ADVANT EDUCATION PROGRAM GUIDE R S Table of Contents Introduction Sales Tracks Accreditation CommVault Sales Professional Accreditation...4 Knowledge Transfer Simpana Sales Enablement
Simplifying ediscovery & Compliance in the Big Data Era
Simplifying ediscovery & Compliance in the Big Data Era A Holistic Approach to Information Management Means Big Benefits in Cost Reduction and Risk Management for Legal and Compliance Teams Emily Wojcik
Enhanced Data Protection and Manageability of Virtual Servers Using CommVault Simpana Solutions
BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE NAGEMENT SEARCH Enhanced Data Protection and Manageability of Virtual Servers Using CommVault Simpana Solutions Key Benefits Offload backup operations from
Simpana Archive for Microsoft Exchange Systems
BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE NAGEMENT SEARCH Key Reduce TCO and maintain availability as data ages with tiered storage polices. Simpana Archive for Microsoft Exchange Systems Centralized
Simpana Education Services
Simpana Education Services COURSE CATALOG Outside S I M P A N North A v10 America April June 2013 What s Inside: Article on CommVault Simpana OnePass Agent for Exchange NEW! Courses NEW! Certification
SOLUTION OVERVIEW COMMVAULT SIMPANA INTELLISNAP SNAPSHOT MANAGEMENT TECHNOLOGY:
COMMVAULT SIMPANA INTELLISNAP SNAPSHOT MANAGEMENT TECHNOLOGY: SOLUTION OVERVIEW Enterprises today increasingly turn to arraybased snapshots and replication to augment or replace legacy data protection
A CommVault White Paper Simpana Software A Unique Cloud-Enabled Platform
Simpana Software A Unique Cloud-Enabled Platform From a single console, Simpana software seamlessly extends local backup and archive to a new tier of cloud-based storage. Virtually unlimited storage capacity
How To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
Automated Proactive Solution System (APSS) AUTOMATIC AND HEALTH SOLUTIONS
Automated Proactive Solution System (APSS) AUTOMATIC AND HEALTH SOLUTIONS Table of Contents Table of Contents... 2 Overview... 3 Automatic Solutions... 3 Using Automatic Solutions... 3 Interactive Session...
Kroll Ontrack VMware Forum. Survey and Report
Kroll Ontrack VMware Forum Survey and Report Contents I. Defining Cloud and Adoption 4 II. Risks 6 III. Challenging Recoveries with Loss 7 IV. Questions to Ask Prior to Engaging in Cloud storage Solutions
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review
Accelerate e-discovery and simplify review Overview provides IT/Legal liaisons, investigators, lawyers, paralegals and HR professionals the ability to search, preserve and review information across the
IBM Unstructured Data Identification and Management
IBM Unstructured Data Identification and Management Discover, recognize, and act on unstructured data in-place Highlights Identify data in place that is relevant for legal collections or regulatory retention.
AskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
A CommVault Business-Value White Paper Aligning IT and Data Management Technology with Enterprise Business Requirements and Objectives
Aligning IT and Data Management Technology with Enterprise Business Requirements and Objectives IT that Focuses on the Business and its Information, Rather than Technology Contents Abstract 3 Executive
Efficient Data Management in 3 Simple Steps. Transform your Data Management Operations with CommVault Simpana 10 Software
Efficient Data Management in 3 Simple Steps Transform your Data Management Operations with CommVault Simpana 10 Software Contents The Perfect Storm for Data Management: Big Data, Cloud and Mobility...
10 Steps to Establishing an Effective Email Retention Policy
WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION
CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS. Review Business and Technology Series www.cumulux.com
` CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS Review Business and Technology Series www.cumulux.com Table of Contents Cloud Computing Model...2 Impact on IT Management and
Hitachi Cloud Service for Content Archiving. Delivered by Hitachi Data Systems
SOLUTION PROFILE Hitachi Cloud Service for Content Archiving, Delivered by Hitachi Data Systems Improve Efficiencies in Archiving of File and Content in the Enterprise Bridging enterprise IT infrastructure
LEGAL ISSUES IN CLOUD COMPUTING
LEGAL ISSUES IN CLOUD COMPUTING RITAMBHARA AGRAWAL INTELLIGERE 1 CLOUD COMPUTING Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing
Director, Value Engineering
Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software
From Solving Forward. philosophy to game-changing software. CommVault s Solving Forward Philosophy
Who is CommVault? There was a time when asking the question Who is CommVault? would have put you in good company with the majority of the data management world. People asking that question these days,
Veritas Enterprise Vault.cloud for Microsoft Office 365
TM Veritas Enterprise Vault.cloud for Microsoft Office 365 Assume control over your information ecosystem Benefits at a glance Satisfies email retention requirements by journaling an immutable copy of
ediscovery Solutions
The Radicati Group, Inc. www.radicati.com ediscovery Solutions A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright November 2010, Reproduction Prohibited 9:30 am, PT November 4, 2010
Symantec Enterprise Vault and Symantec Enterprise Vault.cloud
Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Better store, manage, and discover business-critical information Solution Overview: Archiving Introduction The data explosion that has burdened
Smarter Deduplication with CommVault Simpana Software
BACKUP & RECOVERY ARCHIVE REPLICATION RESOURCE NAGEMENT SEARCH Smarter Deduplication with CommVault Simpana Software Key Benefits Global deduplication across all data, regardless of data type, source or
IBM ediscovery Identification and Collection
IBM ediscovery Identification and Collection Turning unstructured data into relevant data for intelligent ediscovery Highlights Analyze data in-place with detailed data explorers to gain insight into data
Meeting E-Discovery Challenges with Confidence
Meeting E-Discovery Challenges with Confidence Meeting today s e-discovery and information governance challenges while setting the foundation for tomorrow s requirements is the goal of every legal team.
NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services
EnCase Enterprise/ ediscovery Strategic Consulting EnCase customers now have a trusted expert advisor to meet their discovery goals. NightOwl Discovery offers complete support for the EnCase Enterprise
EnCase ediscovery. Automatically search, identify, collect, preserve, and process electronically stored information across the network.
TM GUIDANCE SOFTWARE EnCASE ediscovery EnCase ediscovery Automatically search, identify, collect, preserve, and process electronically stored information across the network. GUIDANCE SOFTWARE EnCASE ediscovery
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
Securing The Cloud With Confidence. Opinion Piece
Securing The Cloud With Confidence Opinion Piece 1 Securing the cloud with confidence Contents Introduction 03 Don t outsource what you don t understand 03 Steps towards control 04 Due diligence 04 F-discovery
How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )
The Electronic Discovery Reference Model (EDRM) How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) December 2011
Enforce Governance, Risk, and Compliance Programs for Database Data
Enforce Governance, Risk, and Compliance Programs for Database Data With an Information Lifecycle Management Strategy That Includes Database Archiving, Application Retirement, and Data Masking WHITE PAPER
Information Governance Challenges and Solutions
Challenges and Solutions In this modern information age, organizations struggle with two things: the problem of too much electronic data and how to govern the data. Each year, the speed of information
Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)
University of California, Merced Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) Responsible Officials: Executive Vice Chancellor and Provost Vice Chancellor
RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management
RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES Cost-Effective, Legally Defensible Records Management Does This Sound Familiar? A data breach could send our share price tumbling. I need to minimise our
Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
3 "C" Words You Need to Know: Custody - Control - Cloud
3 "C" Words You Need to Know: Custody - Control - Cloud James Christiansen Chief Information Security Officer Evantix, Inc. Bradley Schaufenbuel Director of Information Security Midland States Bank Session
> Solution Overview COGNIZANT CLOUD STEPS TRANSFORMATION FRAMEWORK THE PATH TO GROWTH
> Solution Overview COGNIZANT CLOUD STEPS TRANSFORMATION FRAMEWORK A comprehensive, tool-based framework speeds up the time to value for your cloud-enabled business transformation projects. It s accepted:
Considerations for Outsourcing Records Storage to the Cloud
Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage
Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure
Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure Businesses benefit from streamlined data management both on premises and in the cloud. White Paper Published:
