SlideShare ist ein Scribd-Unternehmen logo
1 von 45
SharePoint: A Catalyst for Information Governance EMC SourceOne for Microsoft SharePoint Dave Martin, Principal Product Marketing Manager, EMC
The SourceOne Platform PRACTICAL, ACTIONABLE INFORMATION GOVERNANCE Gain Visibility Manage Risk Simplify eDiscovery Cut Costs
Information Governance What is “Information Governance”? Archiving Search & eDiscovery Compliance Source: “The Rise of Information Governance: From Reactive e-Discovery to Proactive Information Management,” The 451 Group, August 2009
The Two Sides of Governance… People Content
SharePoint: A catalyst by design 62.2% Of organizations surveyedare using or planning to use SharePoint IDC research shows that enterprises are increasing the size and scope of their collaboration environments, with SharePointemerging asa major driver of information growth.          May 2010 More than half of organizations are running SharePoint today Sources: “Microsoft Office and SharePoint Traction: An Updated Look at Customer Adoption and Future Plans,” IDC, October 2009
What are we using SharePoint for? For Storing Content! AIIM Industry Watch: “SharePoint Strategies and Experiences,” July 2010
Organizational Pain Points Compliance IT Information Governance Litigation Readiness Operational efficiencies  Content Security Retention & Control Operational Efficiencies Paperless Requirements eDiscovery Information Growth Regulatory Compliance Reduced Costs End-user Access Risk Mitigation Content Control End-user Transparency Single Point of Access  Shorten back-up windows
Thinking about Information Governance for SharePoint? ,[object Object]
How much content are you planning to hold in SharePoint?
What type of content are you trying to capture?
What are your archival requirements?
What are your compliance requirements?
Are you going to break the “experience”?
Do you have other content outside of SharePoint?,[object Object]
Lots of it Mostly unstructured Mostly unmanaged Created by organizations Becoming more regulated  NOTHING!  What is going to stop information from growing  Thinking about Information Governance for SharePoint? ,[object Object],35Zb 95% Information 85% 85% ▲ Source: "The Digital Universe Decade,“ EMC-sponsored IDC White Paper, May 2010
Thinking about Information Governance for SharePoint? ,[object Object],5 Terabytes 12 Terabytes 21,000 Sites!!! 40 Terabytes  + 400 Million Documents
Putting Information Governance on the Map ,[object Object],INFORMATION Information Governance
Thinking about Information Governance for SharePoint? ,[object Object],Active Sites Inactive Sites 75% 25% You need to ask yourself: What information is being stored in these sites and are they being managed long-term? InfoTrends Report: “Gathering MOSS?”; August 2009
Thinking about Information Governance for SharePoint? ,[object Object],Sarbanes-Oxley Act (SOX)  ~ PCAOB  ~ SAS 94  ~ AICPA/CICA Privacy Framework  ~ AICPA Suitable Trust Services Criteria  ~ SEC Retention of Records, 17 CFR 210.2-06  ~ SEC Controls and Procedures, 17 CFR 240.15d-15  ~ SEC Reporting Transactions and Holdings, 17 CFR 240.16a-3  ~ Basel II  ~ BIS Sound Practices for the Management and Supervision of Operational Risk  ~ Gramm-Leach-Bliley Act (GLB)  ~ Standards for Safeguarding Customer Information, FTC 16 CFR 314  ~ Privacy of Consumer Financial Information Rule  ~ Safety and Soundness Standards, Appendix of 12 CFR 30  ~ FFIEC Information Security  ~ FFIEC Development Acquisition  ~ FFIEC Business Continuity Planning  ~ FFIEC Audit  ~ FFIEC Management  ~ FFIEC Operations  ~ NASD  ~ NYSE  ~ Recordkeeping rule for securities exchanges, SEC 17 CFR 240.17a-1  ~ Records to be made by exchange members, SEC 17 CFR 240.17a-3  ~ Records to be preserved by exchange members, SEC 17 CFR 240.17a-4  ~ Recordkeeping, SEC 17 CFR 240.17Ad-6  ~ Record retention, SEC 17 CFR 240.17Ad-7  ~ HIPAA (Health Insurance Portability and Accountability Act)  ~ HIPAA HCFA Internet Security Policy  ~ NIST Introductory Resource Guide for [HIPAA] (800-66)  ~ CMS Core Security Requirements (CSR)  ~ CMS Information Security Acceptable Risk Safeguards (ARS)  ~ CMS Information Security Certification & Accreditation (C&A)  ~ FDA Electronic Records; Electronic Signatures 21 CFR Part 11+D1  ~ Federal Energy Regulatory Commission (FERC)  ~ North American Electric Reliability Council (NERC)  ~ VISA CISP (Cardholder Information Security Program)  ~ Mastercard SDP (Site Data Protection) Program  ~ American Express DSS (Data Security Standard)  ~ PCI DSS (Payment Card Industry Data Security Standard)  ~ FTC ESIGN (Electronic Signatures in Global and National Commerce Act)  ~ Uniform Electronic Transactions Act (UETA)  ~ FISMA (Federal Information Security Management Act)  ~ FISCAM (Federal Information System Controls Audit Manual)  ~ FIPS Security Requirements for Cryptographic Modules 140-2  ~ FIPS Guideline for the Analysis of LAN Security 191  ~ FIPS Application Profile for GILS 192  ~ Clinger-Cohen Act (Information Technology Management Reform Act)  ~ National Strategy to Secure Cyberspace  ~ GAO Financial Audit Manual  ~ DOD ...Standard for Electronic Records Management Software...5015-2  ~ CISWG Report on the Best Practices Subgroup  ~ CISWG Information Security Program Elements  ~ NCUA Guidelines for Safeguarding Member Information 12 CFR 748  ~ IRS Revenue Procedure: Retention of books and records 97-22  ~ IRS Revenue Procedure: Record retention: automatic data processing… 98-25  ~ IRS Internal Revenue Code Section 501(c)(3)  ~ Federal Rules of Civil Procedure  ~ Uniform Rules of Civil Procedure  ~ ISO 15489-1 Information and Documentation: Records management: General  ~ ISO 15489-2 Information and Documentation: Records management: Guidelines  ~ DIRKS: A Strategic Approach to Managing Business Information  ~ Sedona Principles Addressing Electronic Document Production  ~ NIST ...Principles and Practices for Securing IT Systems 800-14  ~ NIST ...Developing Security Plans for Federal Information Systems 800-18  ~ NIST Security Self-Assessment Guide... 800-26  ~ NIST Risk Management Guide... 800-30  ~ NIST Contingency Planning Guide... 800-34  ~ NIST ...Patch and Vulnerability Management Program 800-40  ~ NIST Guidelines on Firewalls and Firewall Policy 800-41  ~ NIST Security Controls for Federal Information Systems 800-53  ~ NIST ...Mapping...Information and...Systems to Security Categories 800-60  ~ NIST Computer Security Incident Handling Guide 800-61  ~ NIST Security Considerations in...Information System Development 800-64  ~ ISO 73:2002 Risk management -- Vocabulary  ~ ISO 1335 Information technology – Guidelines for management of IT Security  ~ ISO 17799:2000 Code of Practice for Information Security Management  ~ ISO 27001:2005 ...Information Security Management Systems -- Requirements  ~ IT Information Library (ITIL) Planning to Implement Service Management  ~ IT Information Library (ITIL) ICT Infrastructure Management  ~ IT Information Library (ITIL) Service Delivery  ~ IT Information Library (ITIL) Service Support  ~ IT Information Library (ITIL) Application Management  ~ IT Information Library (ITIL) Security Management  ~ COSO Enterprise Risk Management (ERM) Framework  ~ CobiT 3rd Edition  ~ CobiT 4th Edition  ~ ISACA IS Standards, Guidelines, and Procedures for Auditing and Control...  ~ NFPA 1600 ...Disaster/Emergency Management and Business Continuity...  ~ Information Security Forum (ISF) Standard of Good Practice  ~ Information Security Forum (ISF) Security Audit of Networks  ~ A Risk Management Standard, jointly issued by AIRMIC, ALARM, and IRM  ~ Business Continuity Institute (BCI) Good Practice Guidelines  ~ IIA Global Technology Audit Guide - Information Technology Controls  ~ ISSA Generally Accepted Information Security Principles (GAISP)  ~ CERT Operationally Critical Threat, Asset & Vulnerability Evaluation (OCTAVE)  ~ Cable Communications Privacy Act Title 47 § 551  ~ Telemarketing Sales Rule (TSR) amendment 16 CFR 310.4(b)(3)(iv)  ~ CAN SPAM Act  ~ Children's Online Privacy Protection Act (COPPA) 16 CFR 312  ~ Children's Online Privacy Protection Act (COPPA) 16 CFR 312  ~ Driver's Privacy Protection Act (DPPA) 18 USC 2721  ~ Family Education Rights Privacy Act (FERPA) 20 USC 1232  ~ Privacy Act of 1974 5 USC 552a  ~ Telemarketing Sales Rule (TSR) 16 CFR 310  ~ Video Privacy Protection Act (VPPA) 18 USC 2710  ~ Specter-Leahy Personal Data Privacy and Security Act  ~ AR Personal Information Protection Act SB 1167  ~ AZ Amendment to Arizona Revised Statutes 13-2001 HB 2116  ~ CA Information Practice Act SB 1386  ~ CA General Security Standard for Businesses AB 1950  ~ CA Public Records Military Veteran Discharge Documents AB 1798  ~ CA OPP Recommended Practices on Notification of Security Breach  ~ CO Prohibition against Using Identity Information for Unlawful Purpose HB 1134  ~ CO Consumer Credit Solicitation Protection HB 1274  ~ CO Prohibiting Inclusion of Social Security Number HB 1311  ~ CT Requiring Consumer Credit Bureaus to Offer Security Freezes SB 650  ~ CT Concerning Nondisclosure of Private Tenant Information HB 5184  ~ DE Computer Security Breaches HB 116  ~ FL Personal Identification Information/Unlawful Use HB 481  ~ GA Consumer Reporting Agencies SB 230  ~ GA Public employees; Fraud, Waste, and Abuse HB 656  ~ HI Exempting disclosure of Social Security numbers HB 2674  ~ IL Personal Information Protection Act HB 1633  ~ IN Release of Social Security Number, Notice of Security Breach SB 503  ~ LA Database Security Breach Notification Law SB 205 Act 499  ~ ME To Protect Maine Citizens from Identity Theft LD 1671  ~ MN Data Warehouses; Notice Required for Certain Disclosures HF 2121  ~ MO HB 957  ~ MT To Implement Individual Privacy and to Prevent Identity Theft HB 732  ~ NJ Identity Theft Prevention Act A4001/S1914  ~ NY A4254, A3492 [no title]  ~ NV SB 347 [no title]  ~ NC Security Breach Notification Law (Identity Theft Protection Act) SB 1048  ~ ND Personal information protection act SB 2251  ~ OH Personal information -- contact if unauthorized access HB 104  ~ RI Security Breach Notification Law H 6191  ~ TN Security Breach Notification SB 2220  ~ TX Identity Theft Enforcement and Protection Act SB 122  ~ VT Relating to Identity Theft HB 327  ~ VA Identity theft; penalty; restitution; victim assistance HB 872  ~ WA Notice of a breach of the security SB 6043  ~ EU Directive on Privacy and Electronic Communications 2002/58/EC  ~ EU Directive on Data Protection 95/46/EC  ~ US Department of Commerce EU Safe Harbor Privacy Principles  ~ ...Consumer Interests in the Telecommunications Market Act No. 661  ~ Directive On Privacy And Electronic Communications 2002.58.EC  ~ OECD Technology Risk Checklist  ~ OECD Guidelines on...Privacy and Transborder Flows of Personal Data  ~ UN Guidelines for the Regulation of Computerized
Thinking about Information Governance for SharePoint? ,[object Object],[object Object],[object Object]
The Ideal Provideretention and control of archived business-relevant SharePoint content Help manage the growing number of outdated/orphaned SharePoint sites and content Shorten our backup windows and maintain performance Enable centralized management & access for content from SharePoint
The Operational Requirements To scale to 100s of millions of documents customers need to distribute the data to several databases and sites – or “remove” / “move” data Ensure scalability Maintain performance Meet backup windows
Big savings through Externalization SharePoint  End User SQL Server BLOB Handler Metadata Metadata Content Leverage Microsoft’s preferred method for externalization Reduce load on SQL Reduce costs via tiered storage Maintain end-user experience Ensure performance & scalability Object Object
The Information Governance Requirements To manage the 100s of sites and millions of documents that are orphaned or inactive customers must ensure policies are in place for governing the content once it has left SharePoint Maintain retention & control Litigation readiness Content accessibility
Supplemental ECMEmbrace and Extend Workloads with Partners Foundational ECM Physical Records Management Scanning and Capture Transactional Content Management Business Process Management Archiving and Library Services Document Output Management Rich Media Management Web Content Management Records Management Document Management Human Centric Workflow SharePoint ECM
Information Intelligence for SharePoint Physical Records Management Scanning and Capture Transactional Content Management Business Process Management Archiving and Library Services
Information Intelligence for SharePoint Physical Records Management Scanning and Capture Transactional Content Management Business Process Management Archiving and Library Services Information Access Information Governance Intelligent Capture Maintain the SharePoint experience while connecting active content to active processes  Enable instant access by moving physical documents into SharePoint Ensure centralized compliance, archival & eDiscovery and maintain retention and control on inactive data Custom Consulting Requirements Storage
Information Intelligence for SharePoint Physical Records Management Scanning and Capture Transactional Content Management Business Process Management Archiving and Library Services EMC SourceOne for Microsoft SharePoint
EMC SourceOne for Microsoft SharePoint Archiving and Library Services Operational Efficiencies Information Governance End-User Transparency For Microsoft SharePoint Information Governance Ensure centralized compliance, archival & eDiscovery and maintain retention and control on inactive data
The Operational Value To scale to 100s of millions of documents customers need to distribute the data across several databases and sites – or  “move” the data Enhanced scalability Improved performance Shorter backup For Microsoft SharePoint
Externalization for Operational Efficiencies SharePoint  End User EMC EBS Handler Metadata Metadata Content SQL Server Leverage Microsoft’s preferred method for externalization Reduce load on SQL Reduce costs via tiered storage Maintain end-user experience Ensure performance & scalability Object Object
The Information Governance Value To manage the 100s of sites and millions of documents that are orphaned or inactive customers must ensure policies are in place for governing the content once it has left SharePoint Maintain retention & control Litigation readiness Content accessibility For Microsoft SharePoint
Leverage the Power of SourceOne Centralized Information Governance SourceOne supports multiple content types for archival including Email & SharePoint Centrally manage and administrate all archived content
Data Sources and Scopes Select required data source Choose any combination of scopes, such as:  An entire farm A specific site within a farm http://moss2007 Automatically include new scopes added in the future Or exclude child scopes as required
Content Types for Archival Choose specific content types, from Libraries to List items, folders and custom When parent types are selected, child types are automatically also included Child types can be explicitly excluded Types can be imported to retrieve metadata column information
Content for archival can be defined by: ,[object Object]
VersionContent for archival can be filtered by: ,[object Object]
File SizeContent Selection & Filtering
Select specific business folders for content destination Content inherits retention policy based on folder Select processing option: ,[object Object]
Copy & DeleteArchive Action
Outline specific schedule for individual archive activities Define how often the process recurs and when the activity ends Archive Schedule
Consistent SharePoint user experience  Advanced search of “archived” content Get search results from multiple locations: SourceOne archive  SharePoint farm Leverage search to find list items (e.g., contacts, documents, tasks, Wikis, meetings, etc.) SharePoint Search Portal
Migrating to SharePoint 2010:A story of good housekeeping EMC SourceOne + Microsoft SharePoint 2010
Understand what you have using File Intelligence What type of content do you have? When was the last time it was accessed?
Create 3 Simple Buckets… Active Inactive Delete …Maintain Good Information Governance

Weitere ähnliche Inhalte

Was ist angesagt?

GDPR & SAP: practical data governance & management activities
GDPR & SAP: practical data governance & management activitiesGDPR & SAP: practical data governance & management activities
GDPR & SAP: practical data governance & management activitiesNico J.W. Kuijper ECMm BPMs ERMp
 
GDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping ELGDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping ELEugene Lee
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersIT Governance Ltd
 
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...Ardoq
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slidesNaomi Holmes
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?Christiana Kozakou
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPRTim Hyman LLB
 
Getting Started with GDPR Compliance
Getting Started with GDPR ComplianceGetting Started with GDPR Compliance
Getting Started with GDPR ComplianceDATAVERSITY
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines Skyhigh Networks
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 
Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processingTim Gough
 
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?DATUM LLC
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...IT Governance Ltd
 
GDPR and Irish SMEs May 2017
GDPR and Irish SMEs May 2017GDPR and Irish SMEs May 2017
GDPR and Irish SMEs May 2017Amarach Research
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentationPriyanka Aash
 
EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance Tom Haynes
 
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...TrustArc
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPRIT Governance Ltd
 

Was ist angesagt? (20)

GDPR & SAP: practical data governance & management activities
GDPR & SAP: practical data governance & management activitiesGDPR & SAP: practical data governance & management activities
GDPR & SAP: practical data governance & management activities
 
GDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping ELGDPR and ISO27001 mapping EL
GDPR and ISO27001 mapping EL
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud Providers
 
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
How does GDPR affect your business?
How does GDPR affect your business?How does GDPR affect your business?
How does GDPR affect your business?
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
Getting Started with GDPR Compliance
Getting Started with GDPR ComplianceGetting Started with GDPR Compliance
Getting Started with GDPR Compliance
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processing
 
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?GDPR: Is Your Organization Ready for the General Data Protection Regulation?
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
 
20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here20170323 are you ready the new gdpr is here
20170323 are you ready the new gdpr is here
 
GDPR and Irish SMEs May 2017
GDPR and Irish SMEs May 2017GDPR and Irish SMEs May 2017
GDPR and Irish SMEs May 2017
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentation
 
EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance
 
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPR
 

Andere mochten auch

SourceOne_CamlockCouplings
SourceOne_CamlockCouplingsSourceOne_CamlockCouplings
SourceOne_CamlockCouplingsGaurav Gupta
 
V center application discovery manager customer facing technical presentation
V center application discovery manager customer facing technical presentationV center application discovery manager customer facing technical presentation
V center application discovery manager customer facing technical presentationsolarisyourep
 
Information Analytics: Know What Is In Your E-files To Save Millions and Mana...
Information Analytics: Know What Is In Your E-files To Save Millions and Mana...Information Analytics: Know What Is In Your E-files To Save Millions and Mana...
Information Analytics: Know What Is In Your E-files To Save Millions and Mana...Paragon Solutions
 
Dr. Bob Hayes Big Data and the Total Customer Experience
Dr. Bob Hayes Big Data and the Total Customer ExperienceDr. Bob Hayes Big Data and the Total Customer Experience
Dr. Bob Hayes Big Data and the Total Customer ExperienceJ. David Morris
 
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...J. David Morris
 

Andere mochten auch (7)

Apps Preso
Apps PresoApps Preso
Apps Preso
 
SourceOne_CamlockCouplings
SourceOne_CamlockCouplingsSourceOne_CamlockCouplings
SourceOne_CamlockCouplings
 
EMC SOURCE ONE
EMC SOURCE ONEEMC SOURCE ONE
EMC SOURCE ONE
 
V center application discovery manager customer facing technical presentation
V center application discovery manager customer facing technical presentationV center application discovery manager customer facing technical presentation
V center application discovery manager customer facing technical presentation
 
Information Analytics: Know What Is In Your E-files To Save Millions and Mana...
Information Analytics: Know What Is In Your E-files To Save Millions and Mana...Information Analytics: Know What Is In Your E-files To Save Millions and Mana...
Information Analytics: Know What Is In Your E-files To Save Millions and Mana...
 
Dr. Bob Hayes Big Data and the Total Customer Experience
Dr. Bob Hayes Big Data and the Total Customer ExperienceDr. Bob Hayes Big Data and the Total Customer Experience
Dr. Bob Hayes Big Data and the Total Customer Experience
 
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
 

Ähnlich wie EMC SourceOne for SharePoint

IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.J. David Morris
 
CIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
CIS 2015- Assessing the Risk of Identity and Access- Venkat RajajiCIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
CIS 2015- Assessing the Risk of Identity and Access- Venkat RajajiCloudIDSummit
 
Assessing the Risk of Identity and Access
Assessing the Risk of Identity and AccessAssessing the Risk of Identity and Access
Assessing the Risk of Identity and AccessCourion Corporation
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CloudIDSummit
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
BigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at BrighttalkBigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at BrighttalkUlf Mattsson
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...Ulf Mattsson
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Lance Michalson
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyUlf Mattsson
 
Guide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in ChinaGuide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in ChinaAlibaba Cloud
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
Cloud Expo pci-hipaa deck 053111
Cloud Expo   pci-hipaa deck 053111Cloud Expo   pci-hipaa deck 053111
Cloud Expo pci-hipaa deck 053111stacygriggs
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystemkpatrickwheeler
 
CIP IT Governance 5.0 Solution Guide for ArcSight Logger
CIP IT Governance 5.0 Solution Guide for ArcSight LoggerCIP IT Governance 5.0 Solution Guide for ArcSight Logger
CIP IT Governance 5.0 Solution Guide for ArcSight Loggerprotect724rkeer
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance MonitoringControlCase
 
apidays New York - API Data Protection in Gateways, Sonal Rattan, eXate
apidays New York - API Data Protection in Gateways, Sonal Rattan, eXateapidays New York - API Data Protection in Gateways, Sonal Rattan, eXate
apidays New York - API Data Protection in Gateways, Sonal Rattan, eXateapidays
 
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
Infragard atlanta   ulf mattsson - cloud security - regulations and data prot...Infragard atlanta   ulf mattsson - cloud security - regulations and data prot...
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...Ulf Mattsson
 

Ähnlich wie EMC SourceOne for SharePoint (20)

IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.IQPC eDiscovery Goverment - Washington D.C.
IQPC eDiscovery Goverment - Washington D.C.
 
CIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
CIS 2015- Assessing the Risk of Identity and Access- Venkat RajajiCIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
CIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
 
Assessing the Risk of Identity and Access
Assessing the Risk of Identity and AccessAssessing the Risk of Identity and Access
Assessing the Risk of Identity and Access
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
BigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at BrighttalkBigData and Privacy webinar at Brighttalk
BigData and Privacy webinar at Brighttalk
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
Guide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in ChinaGuide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in China
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
Cloud Expo pci-hipaa deck 053111
Cloud Expo   pci-hipaa deck 053111Cloud Expo   pci-hipaa deck 053111
Cloud Expo pci-hipaa deck 053111
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
 
CIP IT Governance 5.0 Solution Guide for ArcSight Logger
CIP IT Governance 5.0 Solution Guide for ArcSight LoggerCIP IT Governance 5.0 Solution Guide for ArcSight Logger
CIP IT Governance 5.0 Solution Guide for ArcSight Logger
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
 
apidays New York - API Data Protection in Gateways, Sonal Rattan, eXate
apidays New York - API Data Protection in Gateways, Sonal Rattan, eXateapidays New York - API Data Protection in Gateways, Sonal Rattan, eXate
apidays New York - API Data Protection in Gateways, Sonal Rattan, eXate
 
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
Infragard atlanta   ulf mattsson - cloud security - regulations and data prot...Infragard atlanta   ulf mattsson - cloud security - regulations and data prot...
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 

Mehr von J. David Morris

Wayne Eckerson: Secrets of Analytical Leaders webinar
Wayne Eckerson: Secrets of Analytical Leaders webinarWayne Eckerson: Secrets of Analytical Leaders webinar
Wayne Eckerson: Secrets of Analytical Leaders webinarJ. David Morris
 
Laura Madsen Healthcare Webinar - Big Answers
Laura Madsen Healthcare Webinar - Big AnswersLaura Madsen Healthcare Webinar - Big Answers
Laura Madsen Healthcare Webinar - Big AnswersJ. David Morris
 
Cetas Analytics as a Service for Predictive Analytics
Cetas Analytics as a Service for Predictive AnalyticsCetas Analytics as a Service for Predictive Analytics
Cetas Analytics as a Service for Predictive AnalyticsJ. David Morris
 
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...J. David Morris
 
The Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscoveryThe Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscoveryJ. David Morris
 
Overcoming In-house Politics to Implement eDiscovery
Overcoming In-house Politics to Implement eDiscoveryOvercoming In-house Politics to Implement eDiscovery
Overcoming In-house Politics to Implement eDiscoveryJ. David Morris
 
Esoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinarEsoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinarJ. David Morris
 
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...J. David Morris
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011J. David Morris
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!J. David Morris
 
LegalTech Cross Border Disputes
LegalTech Cross Border DisputesLegalTech Cross Border Disputes
LegalTech Cross Border DisputesJ. David Morris
 
eDiscovery Turf Wars at LegalTech 2011
eDiscovery Turf Wars at LegalTech 2011eDiscovery Turf Wars at LegalTech 2011
eDiscovery Turf Wars at LegalTech 2011J. David Morris
 
Mc Carterand English 06152010 F
Mc Carterand English 06152010 FMc Carterand English 06152010 F
Mc Carterand English 06152010 FJ. David Morris
 
US eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosureUS eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosureJ. David Morris
 
NYLJ Social Media Webinar J. Shook
NYLJ Social Media Webinar   J. ShookNYLJ Social Media Webinar   J. Shook
NYLJ Social Media Webinar J. ShookJ. David Morris
 

Mehr von J. David Morris (20)

Wayne Eckerson: Secrets of Analytical Leaders webinar
Wayne Eckerson: Secrets of Analytical Leaders webinarWayne Eckerson: Secrets of Analytical Leaders webinar
Wayne Eckerson: Secrets of Analytical Leaders webinar
 
Laura Madsen Healthcare Webinar - Big Answers
Laura Madsen Healthcare Webinar - Big AnswersLaura Madsen Healthcare Webinar - Big Answers
Laura Madsen Healthcare Webinar - Big Answers
 
Cetas Analytics as a Service for Predictive Analytics
Cetas Analytics as a Service for Predictive AnalyticsCetas Analytics as a Service for Predictive Analytics
Cetas Analytics as a Service for Predictive Analytics
 
KMWorld Presentation
KMWorld PresentationKMWorld Presentation
KMWorld Presentation
 
eDiscovery Infographic
eDiscovery InfographiceDiscovery Infographic
eDiscovery Infographic
 
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
 
The Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscoveryThe Catch 22 of Cross Border eDiscovery
The Catch 22 of Cross Border eDiscovery
 
Overcoming In-house Politics to Implement eDiscovery
Overcoming In-house Politics to Implement eDiscoveryOvercoming In-house Politics to Implement eDiscovery
Overcoming In-house Politics to Implement eDiscovery
 
Esoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinarEsoteric ESI eDiscovery webinar
Esoteric ESI eDiscovery webinar
 
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
 
It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011It takes a village - LegalTech NY 2011
It takes a village - LegalTech NY 2011
 
eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!
 
LegalTech Cross Border Disputes
LegalTech Cross Border DisputesLegalTech Cross Border Disputes
LegalTech Cross Border Disputes
 
Pardon the eDiscovery
Pardon the eDiscoveryPardon the eDiscovery
Pardon the eDiscovery
 
eDiscovery Turf Wars at LegalTech 2011
eDiscovery Turf Wars at LegalTech 2011eDiscovery Turf Wars at LegalTech 2011
eDiscovery Turf Wars at LegalTech 2011
 
Mc Carterand English 06152010 F
Mc Carterand English 06152010 FMc Carterand English 06152010 F
Mc Carterand English 06152010 F
 
US eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosureUS eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosure
 
Webinar Win In Court V3
Webinar Win In Court V3Webinar Win In Court V3
Webinar Win In Court V3
 
NYLJ Social Media Webinar J. Shook
NYLJ Social Media Webinar   J. ShookNYLJ Social Media Webinar   J. Shook
NYLJ Social Media Webinar J. Shook
 
Shonka Webinar V3
Shonka Webinar V3Shonka Webinar V3
Shonka Webinar V3
 

Kürzlich hochgeladen

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Kürzlich hochgeladen (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

EMC SourceOne for SharePoint

  • 1. SharePoint: A Catalyst for Information Governance EMC SourceOne for Microsoft SharePoint Dave Martin, Principal Product Marketing Manager, EMC
  • 2. The SourceOne Platform PRACTICAL, ACTIONABLE INFORMATION GOVERNANCE Gain Visibility Manage Risk Simplify eDiscovery Cut Costs
  • 3. Information Governance What is “Information Governance”? Archiving Search & eDiscovery Compliance Source: “The Rise of Information Governance: From Reactive e-Discovery to Proactive Information Management,” The 451 Group, August 2009
  • 4. The Two Sides of Governance… People Content
  • 5. SharePoint: A catalyst by design 62.2% Of organizations surveyedare using or planning to use SharePoint IDC research shows that enterprises are increasing the size and scope of their collaboration environments, with SharePointemerging asa major driver of information growth. May 2010 More than half of organizations are running SharePoint today Sources: “Microsoft Office and SharePoint Traction: An Updated Look at Customer Adoption and Future Plans,” IDC, October 2009
  • 6. What are we using SharePoint for? For Storing Content! AIIM Industry Watch: “SharePoint Strategies and Experiences,” July 2010
  • 7. Organizational Pain Points Compliance IT Information Governance Litigation Readiness Operational efficiencies Content Security Retention & Control Operational Efficiencies Paperless Requirements eDiscovery Information Growth Regulatory Compliance Reduced Costs End-user Access Risk Mitigation Content Control End-user Transparency Single Point of Access Shorten back-up windows
  • 8.
  • 9. How much content are you planning to hold in SharePoint?
  • 10. What type of content are you trying to capture?
  • 11. What are your archival requirements?
  • 12. What are your compliance requirements?
  • 13. Are you going to break the “experience”?
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. The Ideal Provideretention and control of archived business-relevant SharePoint content Help manage the growing number of outdated/orphaned SharePoint sites and content Shorten our backup windows and maintain performance Enable centralized management & access for content from SharePoint
  • 22. The Operational Requirements To scale to 100s of millions of documents customers need to distribute the data to several databases and sites – or “remove” / “move” data Ensure scalability Maintain performance Meet backup windows
  • 23. Big savings through Externalization SharePoint End User SQL Server BLOB Handler Metadata Metadata Content Leverage Microsoft’s preferred method for externalization Reduce load on SQL Reduce costs via tiered storage Maintain end-user experience Ensure performance & scalability Object Object
  • 24. The Information Governance Requirements To manage the 100s of sites and millions of documents that are orphaned or inactive customers must ensure policies are in place for governing the content once it has left SharePoint Maintain retention & control Litigation readiness Content accessibility
  • 25. Supplemental ECMEmbrace and Extend Workloads with Partners Foundational ECM Physical Records Management Scanning and Capture Transactional Content Management Business Process Management Archiving and Library Services Document Output Management Rich Media Management Web Content Management Records Management Document Management Human Centric Workflow SharePoint ECM
  • 26. Information Intelligence for SharePoint Physical Records Management Scanning and Capture Transactional Content Management Business Process Management Archiving and Library Services
  • 27. Information Intelligence for SharePoint Physical Records Management Scanning and Capture Transactional Content Management Business Process Management Archiving and Library Services Information Access Information Governance Intelligent Capture Maintain the SharePoint experience while connecting active content to active processes Enable instant access by moving physical documents into SharePoint Ensure centralized compliance, archival & eDiscovery and maintain retention and control on inactive data Custom Consulting Requirements Storage
  • 28. Information Intelligence for SharePoint Physical Records Management Scanning and Capture Transactional Content Management Business Process Management Archiving and Library Services EMC SourceOne for Microsoft SharePoint
  • 29. EMC SourceOne for Microsoft SharePoint Archiving and Library Services Operational Efficiencies Information Governance End-User Transparency For Microsoft SharePoint Information Governance Ensure centralized compliance, archival & eDiscovery and maintain retention and control on inactive data
  • 30. The Operational Value To scale to 100s of millions of documents customers need to distribute the data across several databases and sites – or “move” the data Enhanced scalability Improved performance Shorter backup For Microsoft SharePoint
  • 31. Externalization for Operational Efficiencies SharePoint End User EMC EBS Handler Metadata Metadata Content SQL Server Leverage Microsoft’s preferred method for externalization Reduce load on SQL Reduce costs via tiered storage Maintain end-user experience Ensure performance & scalability Object Object
  • 32. The Information Governance Value To manage the 100s of sites and millions of documents that are orphaned or inactive customers must ensure policies are in place for governing the content once it has left SharePoint Maintain retention & control Litigation readiness Content accessibility For Microsoft SharePoint
  • 33. Leverage the Power of SourceOne Centralized Information Governance SourceOne supports multiple content types for archival including Email & SharePoint Centrally manage and administrate all archived content
  • 34. Data Sources and Scopes Select required data source Choose any combination of scopes, such as: An entire farm A specific site within a farm http://moss2007 Automatically include new scopes added in the future Or exclude child scopes as required
  • 35. Content Types for Archival Choose specific content types, from Libraries to List items, folders and custom When parent types are selected, child types are automatically also included Child types can be explicitly excluded Types can be imported to retrieve metadata column information
  • 36.
  • 37.
  • 39.
  • 41. Outline specific schedule for individual archive activities Define how often the process recurs and when the activity ends Archive Schedule
  • 42. Consistent SharePoint user experience Advanced search of “archived” content Get search results from multiple locations: SourceOne archive SharePoint farm Leverage search to find list items (e.g., contacts, documents, tasks, Wikis, meetings, etc.) SharePoint Search Portal
  • 43. Migrating to SharePoint 2010:A story of good housekeeping EMC SourceOne + Microsoft SharePoint 2010
  • 44. Understand what you have using File Intelligence What type of content do you have? When was the last time it was accessed?
  • 45. Create 3 Simple Buckets… Active Inactive Delete …Maintain Good Information Governance
  • 46.
  • 48. Archive based on object state – not just historical
  • 49. Complete end user transparency
  • 50. Built on next generation architecture
  • 53.
  • 54. SourceOne Archiving for Microsoft SharePoint gives customers a building block approach
  • 56. Using the Microsoft recommended approach for externalizing content organizations can start with the operational challenges – Leveraging only pieces of the SourceOne architecture instead of an “all or nothing” approach
  • 57. Leverage the power of the SourceOne archiving platform
  • 58. Provides a scalable, distributed architecture
  • 60. Consolidates retention policies across content types
  • 61. End-to-end solutions – One-stop shop
  • 62.
  • 63.
  • 64. Questions? Dave Martin davidm.martin@emc.com