Trotz Cloud die vergessenen PST Files Marc Ahlgrim Presales consultant
Die Herausforderung Warum sind PST Files problematisch? Warum greifen klassische Lösungsansätze nicht?
Warum sind PST Files problematisch? PST Files sind überall Auf dem Laptop / PC Auf dem Fileserver Angst vor dem Löschen Duplikate PST auf File Server nicht supported Zeitstempel wird auch bei Lesezugriff geändert => Full Backup Verschwenderisches Format 3
Warum greifen klasssische Lösungsansätze nicht? Ansatz 1 : ignorieren Verlagert das Problem in die Zukunft Ansatz 2 : Speicher erweitern / HSM Siehe oben Zusätzliches Risiko Datei auf Laptop -> bei Verlust? Ansatz 3 : cloud -> das Problem hat jemand anders Laptop? Offline Sync? Zeit? 4
Das wirkliche Problem liegt ganz woanders TIME Governance Gap $ 5
Die Lösung : Informationen in Daten sichtbar machen INFORMATION INSIGHT Know what you have Leverage what you know Make better decisions Control costs and risks that become drags on business 6
Create Retrieve Policy Oversight Enterprise Vault Products Automate Retention Lifecycle END USERS MANAGEMENT BENEFITS Move data to lower cost media Retain if required, expire if not Control by rules of policy Email servers PRIMARY STORAGE LONG TERM STORAGE Dodd-Frank compliant supervision Microsoft Office 365 File Servers and other data resources Archiving Policy Expiration Policy 7
Reduce Cost: Information Lifecycle Management BENEFITS 200TB Automatic data migration to long term storage 100 TB Reduce storage infrastructure expense Eliminate unplanned storage expansion costs More efficient applications 30 50% smaller footprint Less time to backup Up to 50% less backup time 8
PST Migrations PST files can be difficult to backup and manage Enterprise Vault has an extensive set of tools to assist with PST Migration projects
PST Migrations Now with Owner Identification What it does Identify potential PST owner by sampling of PST data Benefit Yet another method to identify PST Owner Builds on PST Migration features from 10.0.4 & EV11 Most accurate method of PST owner identification Identify anonymous PST files Symantec Enterprise Vault 11 Customer Presentation
Take Control of PSTs & NSFs Transparent End-User Access PC Dedupe Across Email, Attachments, SharePoint, etc. Network Share Enterprise Vault 1) Locate PST/NSF Network servers PCs 2) Migrate PST/NSF into archive Even with mobile users Limited user action 3) Optionally dispose PST Delete, hide Compact Symantec Enterprise Vault 10 Customer Presentation 11
(+) Business Value of Information Realizing the value of information assets How to address the Governance Gap challenge WHO S RESPONSIBLE? EXPECTED WHAT? WHERE? WHAT TO DO WITH IT? ASSUME CONTROL TIME TAKE ACTION GOV GAP (-) 37% FILE SHARING $5M 1PB 69% - UNNEEDED 7% CDO REALIZED GAIN VISIBILITY 12 12
Product Integration Closes Loop End-to-End VISIBILITY ACTION CONTROL What? Where? Who owns? How old? Important? Archive Preserve Protect Delete Tracked Automated Repeatable 13
Reduce Drags on Your Business And Unlock the Value of Your Assets DATA Establish better control and management practices + + TECHNOLOGY Reduce risk, automate process, and lower costs PEOPLE Improve productivity and align behavior with goals Veritas enables the Governance Journey one step at a time 14
Thank you! Marc Ahlgrim Marc.ahlgrim@veritas.com 0172-941 49 83. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.