SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Agenda Slide Email and File Classification 3 Customer Benefits 4 FileTek Overview 1 FileTek Trusted Edge® ICE and Enterprise Vault 2
FileTek’s Trusted Edge ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FileTek’s Trusted Edge ICE and Symantec Enterprise Vault ,[object Object],[object Object],[object Object],[object Object],[object Object]
Trusted Edge Ice and Enterprise Vault 3 ECM Repository MS SharePoint Open Text Livelink IBM Content/Records Manager WebDAV and file shares Symantec Enterprise Vault™ 2 2 Trusted Edge Admin Server and Database  MS SQL Server or Oracle 9 1 Email Documents Files Workstations Laptops File shares
Email Classification 30% Discount Promotion 2 Click send  button
Archive to Enterprise Vault
2 Select File Save Document Classification
Archive to Enterprise Vault
[object Object],[object Object],[object Object],[object Object],[object Object],Customer Benefits

Weitere ähnliche Inhalte

Was ist angesagt?

SPSTC18 Laying Down the Law - Governing Your Data in O365
SPSTC18  Laying Down the Law - Governing Your Data in O365SPSTC18  Laying Down the Law - Governing Your Data in O365
SPSTC18 Laying Down the Law - Governing Your Data in O365David Broussard
 
OpenText eDOCS – What’s new in CE 21.2
OpenText eDOCS – What’s new in CE 21.2OpenText eDOCS – What’s new in CE 21.2
OpenText eDOCS – What’s new in CE 21.2OpenText
 
Writing Code To Interact With Enterprise Search
Writing Code To Interact With Enterprise SearchWriting Code To Interact With Enterprise Search
Writing Code To Interact With Enterprise SearchCorey Roth
 
Office 2010 for IT Pros
Office 2010 for IT ProsOffice 2010 for IT Pros
Office 2010 for IT ProsStephen Rose
 
Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018Albert Hoitingh
 
Azure for IaaS - Global Windows Azure Bootcamp (GWAB)
Azure for IaaS - Global Windows Azure Bootcamp (GWAB)Azure for IaaS - Global Windows Azure Bootcamp (GWAB)
Azure for IaaS - Global Windows Azure Bootcamp (GWAB)Loryan Strant
 
SPS Geneva - Azure information protection
SPS Geneva - Azure information protectionSPS Geneva - Azure information protection
SPS Geneva - Azure information protectionAlbert Hoitingh
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityAlbert Hoitingh
 
Enterprise vault - Top 5 Enterprise Vault 12 Upgrade Must-Haves
Enterprise vault - Top 5 Enterprise Vault 12 Upgrade Must-HavesEnterprise vault - Top 5 Enterprise Vault 12 Upgrade Must-Haves
Enterprise vault - Top 5 Enterprise Vault 12 Upgrade Must-HavesdcVAST
 
Ether solutions implements Oracle Document Cloud
Ether solutions   implements Oracle Document CloudEther solutions   implements Oracle Document Cloud
Ether solutions implements Oracle Document CloudEther Solutions
 
Search for All with Elastic Workplace Search
Search for All with Elastic Workplace SearchSearch for All with Elastic Workplace Search
Search for All with Elastic Workplace SearchElasticsearch
 
How to Migrate G Suite to Office 365 Readily!
 How to Migrate G Suite to Office 365 Readily! How to Migrate G Suite to Office 365 Readily!
How to Migrate G Suite to Office 365 Readily!Dee Negi
 
2 Modern Security - Microsoft Information Protection
2   Modern Security - Microsoft Information Protection2   Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information ProtectionAndrew Bettany
 
Windows Server 2012 Active Directory Rights Management Services
Windows Server 2012 Active Directory Rights Management ServicesWindows Server 2012 Active Directory Rights Management Services
Windows Server 2012 Active Directory Rights Management ServicesSerhad MAKBULOĞLU, MBA
 
Microsoft Enterprise Search
Microsoft Enterprise SearchMicrosoft Enterprise Search
Microsoft Enterprise Searchportalevent
 
Eryem Talks Paris Avril 2013 - Titus
Eryem Talks Paris Avril 2013 - TitusEryem Talks Paris Avril 2013 - Titus
Eryem Talks Paris Avril 2013 - TitusGuillaume Meyer
 
Take the fud out of implementing share point
Take the fud out of implementing share pointTake the fud out of implementing share point
Take the fud out of implementing share pointQuentin Christensen
 
Azure information protection and SharePoint
Azure information protection and SharePoint Azure information protection and SharePoint
Azure information protection and SharePoint Albert Hoitingh
 
1 Modern Security - Keynote
1  Modern Security - Keynote1  Modern Security - Keynote
1 Modern Security - KeynoteAndrew Bettany
 

Was ist angesagt? (20)

SPSTC18 Laying Down the Law - Governing Your Data in O365
SPSTC18  Laying Down the Law - Governing Your Data in O365SPSTC18  Laying Down the Law - Governing Your Data in O365
SPSTC18 Laying Down the Law - Governing Your Data in O365
 
OpenText eDOCS – What’s new in CE 21.2
OpenText eDOCS – What’s new in CE 21.2OpenText eDOCS – What’s new in CE 21.2
OpenText eDOCS – What’s new in CE 21.2
 
Writing Code To Interact With Enterprise Search
Writing Code To Interact With Enterprise SearchWriting Code To Interact With Enterprise Search
Writing Code To Interact With Enterprise Search
 
Office 2010 for IT Pros
Office 2010 for IT ProsOffice 2010 for IT Pros
Office 2010 for IT Pros
 
Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018Azure Information Protection at the Cybercrime and Security Forum 2018
Azure Information Protection at the Cybercrime and Security Forum 2018
 
Azure for IaaS - Global Windows Azure Bootcamp (GWAB)
Azure for IaaS - Global Windows Azure Bootcamp (GWAB)Azure for IaaS - Global Windows Azure Bootcamp (GWAB)
Azure for IaaS - Global Windows Azure Bootcamp (GWAB)
 
SPS Geneva - Azure information protection
SPS Geneva - Azure information protectionSPS Geneva - Azure information protection
SPS Geneva - Azure information protection
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App Security
 
Enterprise vault - Top 5 Enterprise Vault 12 Upgrade Must-Haves
Enterprise vault - Top 5 Enterprise Vault 12 Upgrade Must-HavesEnterprise vault - Top 5 Enterprise Vault 12 Upgrade Must-Haves
Enterprise vault - Top 5 Enterprise Vault 12 Upgrade Must-Haves
 
Ether solutions implements Oracle Document Cloud
Ether solutions   implements Oracle Document CloudEther solutions   implements Oracle Document Cloud
Ether solutions implements Oracle Document Cloud
 
Search for All with Elastic Workplace Search
Search for All with Elastic Workplace SearchSearch for All with Elastic Workplace Search
Search for All with Elastic Workplace Search
 
Data Loss Prevention in Office 365
Data Loss Prevention in Office 365Data Loss Prevention in Office 365
Data Loss Prevention in Office 365
 
How to Migrate G Suite to Office 365 Readily!
 How to Migrate G Suite to Office 365 Readily! How to Migrate G Suite to Office 365 Readily!
How to Migrate G Suite to Office 365 Readily!
 
2 Modern Security - Microsoft Information Protection
2   Modern Security - Microsoft Information Protection2   Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information Protection
 
Windows Server 2012 Active Directory Rights Management Services
Windows Server 2012 Active Directory Rights Management ServicesWindows Server 2012 Active Directory Rights Management Services
Windows Server 2012 Active Directory Rights Management Services
 
Microsoft Enterprise Search
Microsoft Enterprise SearchMicrosoft Enterprise Search
Microsoft Enterprise Search
 
Eryem Talks Paris Avril 2013 - Titus
Eryem Talks Paris Avril 2013 - TitusEryem Talks Paris Avril 2013 - Titus
Eryem Talks Paris Avril 2013 - Titus
 
Take the fud out of implementing share point
Take the fud out of implementing share pointTake the fud out of implementing share point
Take the fud out of implementing share point
 
Azure information protection and SharePoint
Azure information protection and SharePoint Azure information protection and SharePoint
Azure information protection and SharePoint
 
1 Modern Security - Keynote
1  Modern Security - Keynote1  Modern Security - Keynote
1 Modern Security - Keynote
 

Andere mochten auch

Down syndrome
Down syndromeDown syndrome
Down syndromejhkeuhn
 
I search[1]
I search[1]I search[1]
I search[1]cpost7
 
พระราชบัญญัติว่าด้วยการกระทำความผิดเกี่ยวกับคอมพิวเตอร์
พระราชบัญญัติว่าด้วยการกระทำความผิดเกี่ยวกับคอมพิวเตอร์พระราชบัญญัติว่าด้วยการกระทำความผิดเกี่ยวกับคอมพิวเตอร์
พระราชบัญญัติว่าด้วยการกระทำความผิดเกี่ยวกับคอมพิวเตอร์Lookkate Pichawee
 
Codifiche Audio Percettive
Codifiche Audio PercettiveCodifiche Audio Percettive
Codifiche Audio PercettiveDavide Cilano
 
Maria Grazia Maffucci - analisi libri
Maria Grazia Maffucci - analisi libriMaria Grazia Maffucci - analisi libri
Maria Grazia Maffucci - analisi libriMaria Grazia Maffucci
 
Chaska High School Class Of 1989
Chaska High School Class Of 1989Chaska High School Class Of 1989
Chaska High School Class Of 1989amykoconnor
 
Down syndrome
Down syndromeDown syndrome
Down syndromejhkeuhn
 

Andere mochten auch (9)

Down syndrome
Down syndromeDown syndrome
Down syndrome
 
I search[1]
I search[1]I search[1]
I search[1]
 
พระราชบัญญัติว่าด้วยการกระทำความผิดเกี่ยวกับคอมพิวเตอร์
พระราชบัญญัติว่าด้วยการกระทำความผิดเกี่ยวกับคอมพิวเตอร์พระราชบัญญัติว่าด้วยการกระทำความผิดเกี่ยวกับคอมพิวเตอร์
พระราชบัญญัติว่าด้วยการกระทำความผิดเกี่ยวกับคอมพิวเตอร์
 
Codifiche Audio Percettive
Codifiche Audio PercettiveCodifiche Audio Percettive
Codifiche Audio Percettive
 
Maria Grazia Maffucci - analisi libri
Maria Grazia Maffucci - analisi libriMaria Grazia Maffucci - analisi libri
Maria Grazia Maffucci - analisi libri
 
Tarea 1
Tarea 1Tarea 1
Tarea 1
 
Chaska High School Class Of 1989
Chaska High School Class Of 1989Chaska High School Class Of 1989
Chaska High School Class Of 1989
 
Down syndrome
Down syndromeDown syndrome
Down syndrome
 
Trabajo imperactivida xochitl
Trabajo imperactivida xochitlTrabajo imperactivida xochitl
Trabajo imperactivida xochitl
 

Ähnlich wie Jsp Presentation Ev Trusted Edge Final 3 13 09

Exchange 2007 Overview Son Vu
Exchange 2007 Overview Son VuExchange 2007 Overview Son Vu
Exchange 2007 Overview Son Vuvncson
 
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange ArchivingCoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange ArchivingCoLaboraDK
 
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...Vaultastic
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptxkovec2684
 
Webinar Presentation: Why Enterprises Need Email Archiving
Webinar Presentation: Why Enterprises Need Email ArchivingWebinar Presentation: Why Enterprises Need Email Archiving
Webinar Presentation: Why Enterprises Need Email ArchivingVaultastic
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonJoel Oleson
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1AgileIT
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfMassimo Bertaccini
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Ravikumar Sathyamurthy
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should HaveBoxHQ
 
Hp trim vs objective
Hp trim vs objectiveHp trim vs objective
Hp trim vs objectivetraciep
 
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...Morgan Simonsen
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend
 
Doccept - Electronic Document Management System - Features List
Doccept - Electronic Document Management System - Features ListDoccept - Electronic Document Management System - Features List
Doccept - Electronic Document Management System - Features ListKensium Solutions
 
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosGina Montgomery, V-TSP
 
Trusted Edge Ice For Owa 2009
Trusted Edge Ice For Owa 2009Trusted Edge Ice For Owa 2009
Trusted Edge Ice For Owa 2009Alexis Brown
 

Ähnlich wie Jsp Presentation Ev Trusted Edge Final 3 13 09 (20)

Exchange 2007 Overview Son Vu
Exchange 2007 Overview Son VuExchange 2007 Overview Son Vu
Exchange 2007 Overview Son Vu
 
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange ArchivingCoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
 
Evcloud infographic
Evcloud infographicEvcloud infographic
Evcloud infographic
 
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
Featured Webinar: Why Cloud Archiving is Best Suited for On Premise Mail Serv...
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
 
Webinar Presentation: Why Enterprises Need Email Archiving
Webinar Presentation: Why Enterprises Need Email ArchivingWebinar Presentation: Why Enterprises Need Email Archiving
Webinar Presentation: Why Enterprises Need Email Archiving
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel Oleson
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
HMSC_AD Event V3
HMSC_AD Event V3HMSC_AD Event V3
HMSC_AD Event V3
 
Cryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdfCryptolab cse datasheet v1.1.pdf
Cryptolab cse datasheet v1.1.pdf
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
Secure File Sharing Basics - What Every File Sharing Provider Should Have
Secure File Sharing Basics -  What Every File Sharing Provider Should HaveSecure File Sharing Basics -  What Every File Sharing Provider Should Have
Secure File Sharing Basics - What Every File Sharing Provider Should Have
 
[SEG] SHIELDEX Email Gateway
[SEG] SHIELDEX Email Gateway[SEG] SHIELDEX Email Gateway
[SEG] SHIELDEX Email Gateway
 
Hp trim vs objective
Hp trim vs objectiveHp trim vs objective
Hp trim vs objective
 
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
Doccept feature-list
Doccept feature-listDoccept feature-list
Doccept feature-list
 
Doccept - Electronic Document Management System - Features List
Doccept - Electronic Document Management System - Features ListDoccept - Electronic Document Management System - Features List
Doccept - Electronic Document Management System - Features List
 
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
 
Trusted Edge Ice For Owa 2009
Trusted Edge Ice For Owa 2009Trusted Edge Ice For Owa 2009
Trusted Edge Ice For Owa 2009
 

Jsp Presentation Ev Trusted Edge Final 3 13 09

  • 1. Agenda Slide Email and File Classification 3 Customer Benefits 4 FileTek Overview 1 FileTek Trusted Edge® ICE and Enterprise Vault 2
  • 2.
  • 3.
  • 4. Trusted Edge Ice and Enterprise Vault 3 ECM Repository MS SharePoint Open Text Livelink IBM Content/Records Manager WebDAV and file shares Symantec Enterprise Vault™ 2 2 Trusted Edge Admin Server and Database MS SQL Server or Oracle 9 1 Email Documents Files Workstations Laptops File shares
  • 5. Email Classification 30% Discount Promotion 2 Click send button
  • 7. 2 Select File Save Document Classification
  • 9.

Hinweis der Redaktion

  1. The agenda of this presentation includes introducing you to the Trusted Edge Information Classification Engine from Filetek. We will cover the following: Content Compliance and Governance at the Edge of the enterprise. 80% of the content is created on desktops, laptops and PDAs The Business Scenario and the challenges corporations face today The FileTek Trusted Edge ICE for Symantec EV The Customer Benefits Alternatives and Competitors
  2. FileTek develops, markets, and supports integrated data storage and access management systems that enable companies and government agencies worldwide to manage high volumes of fixed content data (petabytes) more efficiently and at lower costs than traditional approaches. For over 20 years, FileTek has delivered proven and stable solutions for the following business drivers: information lifecycle management (ILM) initiatives, regulatory compliance, digital preservation, active archives, and database extension systems. In April 2007, FileTek purchased substantially all the assets, including the intellectual property, of www.Trusted Edge.com Inc., a provider of ECompliance/Discovery solutions. Deployed at the network's edge, where 80% of information is created, Trusted Edge is a desktop solution that classifies all types of data (e-mails, documents, and files) upon creation and works within policy parameters to help companies/organizations meet today's stringent regulatory requirements
  3. Trusted Edge provides a desktop agent which monitors the Trusted Edge administrative policy engine and provides for user and roll based classification on all devices including laptops, desktops and file shares. Trusted Edge has expanded our support to both emails and all file types. The ability to automatically collect the content metadata and embed a unique tag within the document ensures chain of custody auditing of content. Trusted Edge enables all content to be proactively classifed and routed to the Symantec Enterprise Vault.
  4. 1) Administrators create policies on the Trusted Edge Administration Server and publish them to end-user workstations. 2) At asset creation, Trusted Edge enforces classification policies, brands assets with a unique identifier, and routes them to the proper retention category or archive in Symantec Enterprise Vault. Trusted Edge can also retain a convenience copy or a desktop shortcut for assets on a user workstation. In addition, the software can archive an asset shortcut to one repository and have that shortcut point to an asset in Symantec Enterprise Vault (for example, a shortcut in SharePoint can link to an asset in Enterprise Vault). 3) The Trusted Edge Administration Server stores unique asset identifiers and asset metadata to provide a complete audit trail.
  5. Lets look at two use case scenarios. 1) A salesperson creates an email 2) Upon send the user is presented with a classification screen based on the users Active Directory Group 3) The user then selects the category which best describes the email “Promotional” 4) Trusted Edge will then route the content based on policy to EV and the content is archived with the proper retention for a promotional classification
  6. As you can see once the content has been classified, the Trusted Edge Policy routes the content to the proper location within EV and you can see the proper Retention has been applied.
  7. When a user creates a document, upon save they are once again presented with a classification list based on their active directory credentials and they can select the proper classification such as Financial Statement Trusted Edge then routes the content to the proper locations within Enterprise Vault.
  8. Since a Financial Statement is a permanent records of the corporation, it placed within EV with permanent preservation and a stub can be provided for easy access.
  9. Trusted Edge Benefits Trusted Edge provides the following benefits to departments across the enterprise: Compliance/litigation support – Reduces risk and eDiscovery costs by adding business context to information Enterprise content management – Increases productivity through comprehensive information capture and structured data organization Intelligent archiving – Reduces archive size and management costs by retaining information aligned with business objectives Intelligent storage management – Reduces storage costs by intelligently filing documents and email into appropriate storage tiers based on policy and business needs