Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager 1
Agenda 1 2 3 4 Overview Data Management Data Protection and Compliance What s New and Futures SYMANTEC VISION 2012 2
Unstructured Information Growth Leads to Challenges Data growth continues unabated most of the growth during the next 5 years is unstructured data the most difficult to manage from a process or tool point of view. Gartner, Data Center Conference, Top 10 Trends and How They will Impact Data Centers and IT, David Cappuccio, Dec 2011 Who Owns the Data? How is the Data Used? Protect the Data Inadequate metadata information What is the data governance structure? Pre-requisite for other business initiatives Who has accessed the data over time? When is the data no longer needed? What is the optimal method to store data? Contain leakage Who should have access? Are there gaps in the protection or entitlements scheme? SYMANTEC VISION 2012 3
Symantec Data Insight Improves Data Governance Users Symantec Data Insight File Activity Monitoring Technology Data (File Servers) Microsoft Windows NetApp DataONTAP Microsoft Sharepoint EMC Celerra UNIX file servers with Veritas Storage Foundation Data Insight solution Identifies data owners Monitors data usage Tracks audit trail Reviews permissions Data ownership/usage drives Data security remediation Data storage efficiency Data management policy and compliance Integrates with Data Loss Prevention, Storage, and Access Management SYMANTEC VISION 2012 4
Agenda 1 2 3 4 Overview Data Management Data Protection and Compliance What s New and Futures SYMANTEC VISION 2012 5
What Data Insight Brings to Data Management? Chargeback to Users Eliminate Orphan Data Improve Data Management Operations Identify data owners and map to business Promote accountability through chargeback Identify stale/orphan data and classify based on owners Guide cleanup, archiving and retention efforts Understand usage and consumption patterns Streamline data migration, growth planning and tiering SYMANTEC VISION 2012 6
Identify Data Owners SYMANTEC VISION 2012 7
Rule-based Inference of Data Owners with Attributes to Classify or Map to Business SYMANTEC VISION 2012 8
Track Actual Consumption at the Business Unit or Department Level SYMANTEC VISION 2012 9
Recognize Stale Data Categorized by Age SYMANTEC VISION 2012 10
Report Consumption by Type SYMANTEC VISION 2012 11
Understand Frequency of Usage SYMANTEC VISION 2012 12
Agenda 1 2 3 4 Overview Data Management Data Protection and Compliance What s New and Futures SYMANTEC VISION 2012 13
How Data Insight Fits into Protection and Compliance For unstructured data Discover Data owner identification Data owner remediation Monitor Data monitoring and access alerts Identify users, notify them and protect with Data Loss Prevention Identify custodians to engage for compliance Investigate data breaches; monitor sensitive data usage Audit activity to data Protect Open share and risk score Effective permissions Find data at greatest risk of exposure and lock it down Review access for compliance SYMANTEC VISION 2012 14
Audit Historical Access SYMANTEC VISION 2012 15
Set Policies to Monitor Sensitive Data Usage Monitor activity to data Select folders or use DLP classification Alert if activity exceeds threshold Monitor activity of users Alert if user activity deviates from baseline SYMANTEC VISION 2012 16
Review Effective Permissions SYMANTEC VISION 2012 17
Locate Open Shares SYMANTEC VISION 2012 18
Data Loss Prevention View for Incident and Data Owner Data Insight John Smith SYMANTEC VISION 2012 19
Data Loss Prevention Risk Scoring Identifies Data at Greatest Risk Score is based on incident type, severity and folder accessibility Highlights the most risky folders Tells the organization where to focus initial data clean up and lock down efforts SYMANTEC VISION 2012 20
Agenda 1 2 3 4 Overview Data Management Data Protection and Compliance What s New and Futures SYMANTEC VISION 2012 21
Bridging IT and Business Gap is the Key to Getting in Control of Runaway Data Growth Runaway unstructured data growth leads to serious challenges for IT I know I have millions of files that have not been used for a long time what do I do with them? I know there is sensitive information out there where is it and how is it being used? How do I comply with data access guidelines? I am not sure I am the right person to make the call 0001010001011 1101101010100 1110010101011 1001101010010 1011010100001 1011001111001 0101010001010 0101010100101 1001010100101 0110101010101 0101010101011 0101010110101 0001010001011 1101101010100 1110010101011 1001101010010 1011010100001 1011001111001 0101010001010 that the business owner is in the best position to solve Business owners are the true custodians How do we identify them? How do we empower them? How can we enable them with The right reports for visibility The right recommendations for decision making The right automation to simplify remediation SYMANTEC VISION 2012 22
Key Enhancements in Data Insight 3.0 Data Custodian Management Comprehensive Coverage Enhanced Scale and Performance Discover and manage data custodians Engage custodians automatically Enable large-scale automation Veritas Storage Foundation integration NetApp NFS, SharePoint permissions support Support for LDAP, NIS/NIS+ directory services Optimized indexing and query Lower TCO considerations Tuned for very large data sets and event rates SYMANTEC VISION 2012 23
Automate Data Governance 1 Identify Folders 2 Assign Custodians 3 Automate Reports 00010100010111101101010100111001010101 11001101010010101101010000110110011110 01010101000101001010101001011001010100 10101101010101010101010101011010101011 01010001010001011110110101010011100101 Symantec Data Insight Case Studies 1. Efficiency 2. Regulatory Compliance Confidently delete, archive or move stale/orphan data while adhering to data retention guidelines Review access permissions and activity to achieve compliance 3. Risk Reduction Review activity and alerts to spot inappropriate use, notify owner that data is exposed, streamline Data Loss Prevention remediation SYMANTEC VISION 2012 24
Adding Custodians SYMANTEC VISION 2012 25
Custodian Centric Reporting Quick view of all data relevant to a single custodian Email relevant data only to custodian automatically SYMANTEC VISION 2012 26
Data Insight and Veritas Storage Foundation from Symantec - Integration NFS Access Register/Scan Users Benefits Data governance for Unix/Storage Foundation servers Data ownership /usage classification to guide tiering and compression Publish events Unix Server with Storage Foundation 6.0 Collectors SYMANTEC VISION 2012 27
NFS/Unix User Activity SYMANTEC VISION 2012 28
Legal Notice and Safe Harbor <Slides Removed> This information is about pre-release software. Any unreleased update to the product or other planned modification is subject to ongoing evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or implied. Customers who purchase Symantec products should make their purchase decision based upon features that are currently available. NEW FEATURE AHEAD Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. SYMANTEC VISION 2012 29 APP7400 - Symantec HA/DR Futures and Roadmap
Symantec Data Insight Training Offering Data Insight training helps you quickly learn how you can reduce storage cost by gaining visibility and control into the ownership and usage of unstructured data. Data Insight web-based training is a 12-month elearning subscription available through the elibrary elibrary offers the most up to date training anytime, anywhere Extend your investment by purchasing Symantec Education Symantec Training is EASY because: Training from Symantec gives you the product knowledge you need to be effective in your job. Shorten your implementations and spend less time with support For more information, visit http://go.symantec.com/education_elibrary Symantec Education Services SYMANTEC VISION 2012 30
Thank you! Copyright 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 31