1100001 111PII0IP01 11100101011 0PCI10PHI0 0111101100 11011111. Addressing Data Governance Requirements in a Dispersed Data Environment

Similar documents
CONVERGED DATA PROTECTION. ITSA Nürnberg

The IT Manager s Guide to Simplifying Microsoft Outlook Backup

Assessing the Opportunities Presented by the Modern Enterprise Archive

17 Business Benefits of Endpoint Backup

The Challenge of Securing and Managing Data While Meeting Compliance

Phoenix backs up servers using Windows and Linux operating systems. Here is a list of Windows servers that Phoenix supports:

What are the compliance challenges of Microsoft Office 365?

How To Backup From Your Computer To Your Phone Or Tablet Or Computer

Druva insync vs. Code42 CrashPlan for Enterprise. Comparison Guide

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud

WHITE PAPER. Deficiencies in Traditional Information Management

28% Top 10 Endpoint Backup Mistakes And how to avoid them. of corporate data resides exclusively on laptops, smartphones, and tablets

The Essential Security Checklist. for Enterprise Endpoint Backup

Empowering Your Business in the Cloud Without Compromising Security

Todd Heythaler Information Governance & ediscovery. Emerging Technologies Work Group

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

10 Threats to Successful. Enterprise Endpoint Backup

The Phoenix Corporate Legal Suite. Efficient Document, , and Matter Management for Law Departments and In-house Counsel

W H I T E P A P E R E X E C U T I V E S U M M AR Y S I T U AT I O N O V E R V I E W. Sponsored by: EMC Corporation. Laura DuBois May 2010

Mobility: Strengthening the Weakest Link in ediscovery

5 Things You Didn t Know About Cloud Backup

CA Service Desk Manager

One Easily Avoidable Pitfall in Your ediscovery and Compliance Strategy

ediscovery AND COMPLIANCE STRATEGY

insync Benefits & Comparison

Symantec Enterprise Vault for Microsoft Exchange

Information Retention and ediscovery Survey GLOBAL FINDINGS

Archiving can prevent average business cost increases of

Data Storage That Looks at Business the Way You Do. Up. cloud

ENVIRONMENTAL PRESSURES DRIVING AN EVOLUTION IN FILE STORAGE

Payment Card Industry Data Security Standard

Guide to Information Governance: A Holistic Approach

The Impact of HIPAA and HITECH

Information Governance in the Cloud

Global Headquarters: 5 Speen Street Framingham, MA USA P F

9 ways to revolutionize HR with paperless productivity

IBM ediscovery Identification and Collection

10 Steps to Establishing an Effective Retention Policy

CA Records Manager. Benefits. CA Advantage. Overview

IBM Unstructured Data Identification and Management

Veritas Enterprise Vault for Microsoft Exchange Server

A BUYER S CHECKLIST ENDPOINT DATA PROTECTION:

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

The Business Value of a Comprehensive All-in-One Data Protection Solution for Your Organization

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Addressing Legal Discovery & Compliance Requirements

IDERA WHITEPAPER. The paper will cover the following ten areas: Monitoring Management. WRITTEN BY Greg Robidoux

Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution

Symantec Enterprise Vault for Microsoft Exchange

APRIL Must-Have Features for Endpoint Backup

5 STEPS TO OPTIMIZING YOUR COMMERCIAL LENDING ORGANIZATION

Archiving Whitepaper. Why Archiving is Essential (and Not the Same as Backup)

Compliance and Security Solutions

The case for cloud-based data backup

Meaning Based Computing: Managing the Avalanche of Unstructured Data

savvisdirect White Papers

5 Critical Considerations for. Enterprise Cloud Backup

The 5-Minute Guide to Customer Support

FIVE TIPS TO ENSURE SALESFORCE CHATTER MEETS COMPLIANCE REQUIREMENTS

Symantec Enterprise Vault for Microsoft Exchange Server

What We Do: Simplify Enterprise Mobility

Powered by. FSS Buyer s Guide Why a File Sync & Sharing Solution is Critical for Your Business

Partner / E-Discovery Team Chair. Craig Roy Director of IT & E-Litigation Services

10 Building Blocks for Securing File Data

Secure HIPAA Compliant Cloud Computing

Track-It! 8.5. The World s Most Widely Installed Help Desk and Asset Management Solution

Data Storage that Looks at Business the Way You Do. Up. cloud

What is OneDrive for Business?

Why Data Management Matters Right Now

IBM Policy Assessment and Compliance

Enforcive / Enterprise Security

The Inevitable Extinction of PSTs

White Paper. HIPAA-Regulated Enterprises. Paper Title Here

WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity

10 Hidden IT Risks That Threaten Your Practice

management solutions

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

Enterprise Security Solutions

How To Manage Security On A Networked Computer System

Boosting enterprise security with integrated log management

Realizing the ROI of Information Governance. Gregory P. Kosinski Director, Product Marketing EMC

Using EMC SourceOne Management in IBM Lotus Notes/Domino Environments

SAME PRINCIPLES APPLY, BUT NEW MANDATES FOR CHANGE

HiSoftware Policy Sheriff. SP HiSoftware Security Sheriff SP. Content-aware. Compliance and Security Solutions for. Microsoft SharePoint

Protecting Business Information With A SharePoint Data Governance Model. TITUS White Paper

Grow Your Business with Confidence

The Smart Archive strategy from IBM

The Sumo Logic Solution: Security and Compliance

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Protecting Data-at-Rest with SecureZIP for DLP

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs

COMPLIANCE BENEFITS OF SAP ARCHIVING

Information Governance Challenges and Solutions

Agile enterprise content management and the IBM Information Agenda.

Real World Strategies for Migrating and Decommissioning Legacy Applications

What ediscovery challenges exist with Microsoft Office 365?

Transcription:

Executive Brief Addressing Data Governance Requirements in a Dispersed Data Environment 1100001 111PII0IP01 11100101011 0PCI10PHI0 0111101100 11011111 Lorem ipsum ganus metronique elit quesal norit parique et salomin taren ilat mugatoque This paper is for IT executives addressing increasingly complex issues related to data compliance, privacy and security policies, and regulations in large organizations with mobile workforces.

Background With the significant increase of data sprawl brought on by the mobile workforce and cloud services (Office365, Box, Salesforce, Dropbox, and so on), enforcing data governance policies has become increasingly more complicated. Certainly, mobile and cloud support has added to the business burden with the need for locating, tracking, monitoring, securing, and properly preserving sensitive data. Furthermore, data breaches cost organizations millions of dollars in fines, data loss, investigations, and customer backlash. Most IT executives agree that working against the business by instituting a traditional command-and-control environment is no longer viable. They have also realized that new governance models are necessary to manage this risk. Requirements for Governance in Distributed Environments At its most basic, governance is about applying policies related to service use. Every business has to define the organizing principles and rules that determine how it (and its employees or representatives) should behave. Some of these policies are internally-generated, but many of them are mandated by outside agencies: government regulations, court rulings, and industry standards. And, as with all business rules, the IT department instantiates the policies in computing terms by building them into the company s computing functions (whether in-house or in the cloud) as well as including those policies in data and human workflow. Thus, IT governance includes the techniques and policies that measure and control how systems are managed. It ensures that IT assets are implemented according to agreed-upon policies and procedures, makes sure they re properly controlled and maintained, and ideally does its best to affirm that the assets provide value to the organization by supporting the organization s business goals. IT governance has become integral to the modern enterprise. To successfully gain competitive advantage, businesses need to manage the complex technology that is pervasive throughout the organization, in order to respond quickly and safely to business needs. But safely has gotten a bit harder in the past few years. Today, data is everywhere and anywhere, across devices and cloud services. With corporate data regularly stored outside the datacenter, IT has to work harder -- or at least differently -- to ensure data security, compliance with regulations, and business continuity. Each of those challenges are made more urgent as information spreads. For example, the complexity of data privacy regulations adds a new burden to IT staff who have to figure out obfuscated legal language (isn t that fun!... uh, no) and to respond to the complicated and sometimes-contradictory rulings. IT can t get away telling regulators that they don t know where sensitive company data is stored. So, given the rising need for a holistic approach to data governance, what are some of the considerations unique to distributed environments? Among them: Access and visibility to data everywhere it is, across cloud services and mobile devices, which may be anywhere in the world 2

Corporate and IT s ability to respond to compliance inquiries, internal investigation, and other legal department requests Addressing regional data handling and privacy regulations Identifying and taking action on identified data risks Rock-solid security...as just a start. Doing so restores visibility and control to dispersed data, without impacting end-user productivity. In other words: end-users won t have any additional reasons to resent IT. They ll have fewer reasons to grouse, in fact, because their jobs will be easier (and so will IT s). Druva s core technology efficiently and transparently collects data and audits information off of devices and cloud services. It provides a unified view of dispersed data for legal, compliance, information security, and IT teams to achieve their goals in both governance and end-user data recovery. With Druva insync, enterprises achieve: Druva s Approach to Data Governance Druva, which already enjoys the support of 3,000 customers worldwide, sees the management and protection of corporate data with a somewhat wider lens. Druva s business aim is to extend the notion of command and control to where end-user data resides. We see this goal as a better one than forcing data centralization and controls (which hamper end-user productivity and creates more side-stepping of policy by end-users). To accomplish this, Druva insync enables businesses to: Centralize organizational visibility into business data dispersed across laptops, desktops, mobile devices, and cloud application services (such as Office 365). Manage data governance over end-user data for compliance auditing, investigation and ediscovery needs. Automate compliance monitoring for proactive identification of potential data risks across disparate data sources, devices, and users. Druva insync brings together the core business requirement of data protection and availability -- our established expertise, which has earned us several industry awards and astonishing customer loyalty -- with rich data governance capabilities. End user data federation: Druva insync aggregates user data across devices and services to provide a single composite view of information. This enables organizations to identify files on devices by user as well as to access audit trails for understanding data activities and patterns. Minimize data loss: By efficiently collecting and storing time-indexed end-user data, Druva ensures that the data can be immediately recovered by end-users or IT if data is accidentally deleted, a device is lost, or a system failure occurs. We minimize the moments where users or IT have to say, Oh no! (and then lose another weekend in the attempt to retrieve information). Security and privacy support: Druva s extensive security and privacy controls address data on mobile devices (remote wipe, enforced encryption, geo-location of device). These features also provide controls for segmenting access and storing data regionally in order to meet local data regulations. Unified policy management: Centralize data source policy management and enforcement without end user involvement. Administrators can access, understand, and manage user data while ensuring business continuity with self-restore, data access and secure file sharing. Druva s approach streamlines data administration and assessment. 3

Facilitating Data Governance for Legal and Compliance Requirements Druva s core data aggregation and protection capabilities have created admirable results and steadfast customer loyalty. (Just ask us for references!) However, that s just the start. By extending the capabilities of what can be accomplished with our data protection tools, businesses can achieve greater data governance, particularly in the area of supporting legal needs and compliance. Doing so enables control of data for legal requests; it also provides auditable and verifiable system logs on administrative and end-user data interactions to meet compliance inquiries. Druva isn t just bolting on this functionality as an afterthought. It s a consequence of insync s architectural design. The core technology that enables us to extend data protection features into governance, compliance, and legal requirements is the result of Druva s zero-latency, time-indexed file system. As the software is implemented, information that is collected from devices is instantly retrievable and referable across any collection point stored in the system. For example, a company can instantly jump back to the state of its data (in the small or large sense) from six months back. In addition to storing retention policies, to meet various data regulations and legal requirements, Druva insync also permits terminating employee data to be held as long as necessary (as part of a system legal hold, or necessary for archiving purposes). Elements of Druva insync s data governance capabilities include: Legal hold management: End-user data increasingly is becoming the subject of legal inquiries for investigations or litigation purposes. Druva insync provides legal teams access to manage legal holds on aggregated end-user (custodian) data that is held in-place for the period of the legal matter. Detailed auditing: The system keeps full audit trails of user data and administrator actions. It integrates logging information from cloud-based services to provide a composite of user data interactions. Federated search: Organizations can search across multiple meta-data fields and parameters to identify information across the information base. This helps organizations identify potential risks when facilitating investigation or compliance requests. ediscovery connectivity: For data placed on legal hold, Druva insync provides secure, direct connectivity with third-party ediscovery platforms to ingest the data without having to move the data to an intermediary server first. This reduces the risk of data spoliation. Proactive Compliance: Automated Data Monitoring Although the core capabilities of Druva s insync facilitate many enterprise governance needs, these actions and inquiries are reactive in nature. They re done when legal or compliance teams inquire after an uh-oh event or some other incident occurs. To address these challenges, Druva solves this problem with proactive compliance, enabling organizations to avoid data risks by gaining insights into the information flowing around end-user devices and cloud services. Traditional data loss prevention (DLP) technologies monitor in-transit streams. Instead, proactive compliance assesses data at-rest, where it resides on devices or services. Most of today s data risks are less in-flight than on-device or -service. With proactive compliance, organizations benefit from deeper analysis and notification capabilities, including: Full-text data indexing: Organizations can look deeper into their data, beyond meta-data, and dive into the business s investigative needs. You can identify files that contain intellectual property (IP), personal health information (PHI), personally-identifiable information (PII), or other data buried within unstructured data sources that you don t want escaping into the wild. 4

Druva Compliance Management Dashboard Automated compliance monitoring: The system, based on templates, can automatically scan aggregated data and alert the organization as necessary. Predefined compliance templates: Organizations administrators can select from pre-configured templates for common regulatory definitions (such as HIPAA or GLBA) The system applies these business rules when scanning the federated data set, making automatic a once-arduous, timeconsuming effort to build customized query expressions for standard regulatory policies. Federated visibility of compliance risks: Compliance, legal, and IT teams see a single dashboard displaying the potential data risks by service, by user, and by device. Administrators can drill-down levels of detail as necessary to better assess and take action on those risks. Conclusion Druva insync s extensive governance capabilities address the growing challenges in data tracking and monitoring to meet regulatory and legal requirements on dispersed data. Proactive compliance better equips enterprises to stay on top of their data, with awareness of where the data is located and how it s handled, while at the same time ensuring the integrity of that information for data availability needs. 5

About Druva Druva is the leader in data protection and governance at the edge, bringing visibility and control to business information in the increasingly mobile and distributed enterprise. Built for public and private clouds, Druva s award-winning insync and Phoenix solutions prevent data loss and address governance, compliance, and ediscovery needs on laptops, smart devices and remote servers. As the industry s fastest growing edge data protection provider, Druva is trusted by over 3,000 global organizations on over 3 million devices. Learn more at www.druva.com and join the conversation at twitter.com/druvainc. Copyright 2015 Druva, Inc. All rights reserved Q116-CON-10513 Druva, Inc. Americas: +1 888-248-4976 Europe: +44(0)20.3750.9440 APJ: +919886120215 sales@druva.com www.druva.com