SM B13: Symantec Data Insight Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager

Similar documents
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Archiving with Enterprise Vault Bruno Ritter

Intelligent Information Management: Archive & ediscovery

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

3 MUST-HAVES IN PUBLIC SECTOR INFORMATION GOVERNANCE

IBM Unstructured Data Identification and Management

10 Things IT Should be Doing (But Isn t)

How to Secure Your SharePoint Deployment

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review

Archive 8.0 for File Systems and NAS Optimize Storage Resources, Reduce Risk and Improve Operational Efficiencies

Data Classification Technical Assessment

To Catch A Thief: Preventing the Next Fortune 500 Data Breach

Symantec Enterprise Vault

10 Building Blocks for Securing File Data

5 Lines of Defense You Need to Secure Your SharePoint Environment SharePoint Security Resource Kit

Efficiently Protect, Manage and Access Big Data. Nigel Tozer Business Development Director EMEA

T E TMcDonough@AInfoSys.com W VARONIS DATA GOVERNANCE SUITE

Better Together: Microsoft Office 365 & Symantec Office 365

Streamlining the ediscovery

Protection & Compliance are you capturing what s going on? Alistair Holmes. Senior Systems Consultant

Security.cloud Configuring DLP on to your flow and applying security to your hosted deployment

NextLabs Rights Management Platform

PCI DSS Reporting WHITEPAPER

Realizing the ROI of Information Governance. Gregory P. Kosinski Director, Product Marketing EMC

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Protecting Business Information With A SharePoint Data Governance Model. TITUS White Paper

Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure

CA Technologies Data Protection

Symantec Enterprise Vault for Microsoft Exchange

Agile enterprise content management and the IBM Information Agenda.

Archiving, Backup, and Recovery for Complete the Promise of Virtualization

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

VARONIS WHITEPAPER Next Generation Enterprise Search

IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

The Impact of HIPAA and HITECH

Securing SharePoint 101. Rob Rachwald Imperva

Miguel Ortiz, Sr. Systems Engineer. Globanet

how can I comprehensively control sensitive content within Microsoft SharePoint?

Symantec Enterprise Vault.cloud Giovanni Alberici

Symantec Enterprise Vault for Microsoft Exchange

Veritas Enterprise Vault Overview

Business-driven governance: Managing policies for data retention

Veritas Enterprise Vault for Microsoft Exchange Server

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation

Quest InTrust for Active Directory. Product Overview Version 2.5

IBM Policy Assessment and Compliance

Microsoft SQL Server Master Data Services Roadmap

Configuring Celerra for Security Information Management with Network Intelligence s envision

Netwrix Auditor. Administrator's Guide. Version: /30/2015

#ITtrends #ITTRENDS SYMANTEC VISION

APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS

IBM Infrastructure for Long Term Digital Archiving

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Marathon Information Management Program

Archiving A Dell Point of View

Symantec Enterprise Vault for Microsoft Exchange Server

Compliance and Security Solutions

SR B10: Improving Antispam Effectiveness and Protecting Against Threats with Submissions 2.0

Effective Storage Management for Cloud Computing

Symantec Enterprise Vault 10.x for File System Archiving: Administration

EMC DATA PROTECTION ADVISOR

Enterprise Vault Whitepaper

Enterprise Vault.cloud. Microsoft Exchange Managed Folder Archiving Guide

Protecting Regulated Information in Cloud Storage with DLP

Brochure. ECM without borders. HP Enterprise Content Management (ECM)

Server Consolidation with SQL Server 2008

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Securing the endpoint and your data

Symantec Enterprise Vault for Lotus Domino

APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS

8 Key Requirements of an IT Governance, Risk and Compliance Solution

The IBM Archive Cloud Project: Compliant Archiving into the Cloud

Symantec Backup Exec 11d for Windows Small Business Server

Reducing the cost and complexity of endpoint management

Altiris Client Management Suite

How To Monitor Your Entire It Environment

ZENworks Asset Management 11. Product Brochure

Transcription:

Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager 1

Agenda 1 2 3 4 Overview Data Management Data Protection and Compliance What s New and Futures SYMANTEC VISION 2012 2

Unstructured Information Growth Leads to Challenges Data growth continues unabated most of the growth during the next 5 years is unstructured data the most difficult to manage from a process or tool point of view. Gartner, Data Center Conference, Top 10 Trends and How They will Impact Data Centers and IT, David Cappuccio, Dec 2011 Who Owns the Data? How is the Data Used? Protect the Data Inadequate metadata information What is the data governance structure? Pre-requisite for other business initiatives Who has accessed the data over time? When is the data no longer needed? What is the optimal method to store data? Contain leakage Who should have access? Are there gaps in the protection or entitlements scheme? SYMANTEC VISION 2012 3

Symantec Data Insight Improves Data Governance Users Symantec Data Insight File Activity Monitoring Technology Data (File Servers) Microsoft Windows NetApp DataONTAP Microsoft Sharepoint EMC Celerra UNIX file servers with Veritas Storage Foundation Data Insight solution Identifies data owners Monitors data usage Tracks audit trail Reviews permissions Data ownership/usage drives Data security remediation Data storage efficiency Data management policy and compliance Integrates with Data Loss Prevention, Storage, and Access Management SYMANTEC VISION 2012 4

Agenda 1 2 3 4 Overview Data Management Data Protection and Compliance What s New and Futures SYMANTEC VISION 2012 5

What Data Insight Brings to Data Management? Chargeback to Users Eliminate Orphan Data Improve Data Management Operations Identify data owners and map to business Promote accountability through chargeback Identify stale/orphan data and classify based on owners Guide cleanup, archiving and retention efforts Understand usage and consumption patterns Streamline data migration, growth planning and tiering SYMANTEC VISION 2012 6

Identify Data Owners SYMANTEC VISION 2012 7

Rule-based Inference of Data Owners with Attributes to Classify or Map to Business SYMANTEC VISION 2012 8

Track Actual Consumption at the Business Unit or Department Level SYMANTEC VISION 2012 9

Recognize Stale Data Categorized by Age SYMANTEC VISION 2012 10

Report Consumption by Type SYMANTEC VISION 2012 11

Understand Frequency of Usage SYMANTEC VISION 2012 12

Agenda 1 2 3 4 Overview Data Management Data Protection and Compliance What s New and Futures SYMANTEC VISION 2012 13

How Data Insight Fits into Protection and Compliance For unstructured data Discover Data owner identification Data owner remediation Monitor Data monitoring and access alerts Identify users, notify them and protect with Data Loss Prevention Identify custodians to engage for compliance Investigate data breaches; monitor sensitive data usage Audit activity to data Protect Open share and risk score Effective permissions Find data at greatest risk of exposure and lock it down Review access for compliance SYMANTEC VISION 2012 14

Audit Historical Access SYMANTEC VISION 2012 15

Set Policies to Monitor Sensitive Data Usage Monitor activity to data Select folders or use DLP classification Alert if activity exceeds threshold Monitor activity of users Alert if user activity deviates from baseline SYMANTEC VISION 2012 16

Review Effective Permissions SYMANTEC VISION 2012 17

Locate Open Shares SYMANTEC VISION 2012 18

Data Loss Prevention View for Incident and Data Owner Data Insight John Smith SYMANTEC VISION 2012 19

Data Loss Prevention Risk Scoring Identifies Data at Greatest Risk Score is based on incident type, severity and folder accessibility Highlights the most risky folders Tells the organization where to focus initial data clean up and lock down efforts SYMANTEC VISION 2012 20

Agenda 1 2 3 4 Overview Data Management Data Protection and Compliance What s New and Futures SYMANTEC VISION 2012 21

Bridging IT and Business Gap is the Key to Getting in Control of Runaway Data Growth Runaway unstructured data growth leads to serious challenges for IT I know I have millions of files that have not been used for a long time what do I do with them? I know there is sensitive information out there where is it and how is it being used? How do I comply with data access guidelines? I am not sure I am the right person to make the call 0001010001011 1101101010100 1110010101011 1001101010010 1011010100001 1011001111001 0101010001010 0101010100101 1001010100101 0110101010101 0101010101011 0101010110101 0001010001011 1101101010100 1110010101011 1001101010010 1011010100001 1011001111001 0101010001010 that the business owner is in the best position to solve Business owners are the true custodians How do we identify them? How do we empower them? How can we enable them with The right reports for visibility The right recommendations for decision making The right automation to simplify remediation SYMANTEC VISION 2012 22

Key Enhancements in Data Insight 3.0 Data Custodian Management Comprehensive Coverage Enhanced Scale and Performance Discover and manage data custodians Engage custodians automatically Enable large-scale automation Veritas Storage Foundation integration NetApp NFS, SharePoint permissions support Support for LDAP, NIS/NIS+ directory services Optimized indexing and query Lower TCO considerations Tuned for very large data sets and event rates SYMANTEC VISION 2012 23

Automate Data Governance 1 Identify Folders 2 Assign Custodians 3 Automate Reports 00010100010111101101010100111001010101 11001101010010101101010000110110011110 01010101000101001010101001011001010100 10101101010101010101010101011010101011 01010001010001011110110101010011100101 Symantec Data Insight Case Studies 1. Efficiency 2. Regulatory Compliance Confidently delete, archive or move stale/orphan data while adhering to data retention guidelines Review access permissions and activity to achieve compliance 3. Risk Reduction Review activity and alerts to spot inappropriate use, notify owner that data is exposed, streamline Data Loss Prevention remediation SYMANTEC VISION 2012 24

Adding Custodians SYMANTEC VISION 2012 25

Custodian Centric Reporting Quick view of all data relevant to a single custodian Email relevant data only to custodian automatically SYMANTEC VISION 2012 26

Data Insight and Veritas Storage Foundation from Symantec - Integration NFS Access Register/Scan Users Benefits Data governance for Unix/Storage Foundation servers Data ownership /usage classification to guide tiering and compression Publish events Unix Server with Storage Foundation 6.0 Collectors SYMANTEC VISION 2012 27

NFS/Unix User Activity SYMANTEC VISION 2012 28

Legal Notice and Safe Harbor <Slides Removed> This information is about pre-release software. Any unreleased update to the product or other planned modification is subject to ongoing evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or implied. Customers who purchase Symantec products should make their purchase decision based upon features that are currently available. NEW FEATURE AHEAD Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. SYMANTEC VISION 2012 29 APP7400 - Symantec HA/DR Futures and Roadmap

Symantec Data Insight Training Offering Data Insight training helps you quickly learn how you can reduce storage cost by gaining visibility and control into the ownership and usage of unstructured data. Data Insight web-based training is a 12-month elearning subscription available through the elibrary elibrary offers the most up to date training anytime, anywhere Extend your investment by purchasing Symantec Education Symantec Training is EASY because: Training from Symantec gives you the product knowledge you need to be effective in your job. Shorten your implementations and spend less time with support For more information, visit http://go.symantec.com/education_elibrary Symantec Education Services SYMANTEC VISION 2012 30

Thank you! Copyright 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 31