SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Symantec Data Insight 3.0


    March 2012


Symantec Proprietary and Confidential   1
Unstructured Information Growth Leads To Challenges

“ Datagrowth during the next 5 years most of
  the
       growth continues unabated…
                                     is
    unstructured data – the most difficult to
    manage from a process or tool point of view.
                                                                 - Gartner, December 2011
                                                                                             ”
 Who Owns the Data?                     How is the Data Used?             Protect the Data

 • Inadequate metadata                  • Who has accessed the         • Who should have access?
   information                            data over time?              • Are there gaps in the
 • Pre-requisite for other              • When is the data no            protection or entitlements
   business initiatives                   longer needed?                 scheme?




Symantec Proprietary and Confidential                                                                 2
Bridging IT And Business Gap Is The Key To Getting
   In Control Of Runaway Data Growth

                                           0001010001011
   Runaway unstructured data growth        1101101010100   … that the business owner is in the
   leads to serious challenges for IT…     1110010101011   best position to solve
                                           1001101010010
                                           1011010100001
                                                           • Business owners are the true
   • “I know I have millions of files that 1011001111001
                                           0101010001010     ‘custodians’
     have not been used for a long time
                                           0101010100101         – How do we identify them?
     – what do I do with them?”            1001010100101         – How do we empower them?
                                           0110101010101
   • “I know there is sensitive            0101010101011   • How can we enable them with
     information out there – where is it 0101010110101
                                                               – The right reports for visibility
     and how is it being used?”            0001010001011
                                           1101101010100       – The right recommendations
                                                                  for decision making
   • “How do I comply with data access 1110010101011
                                                               – The right automation to
     guidelines? I am not sure I am the 1001101010010
                                           1011010100001          simplify remediation
     right person to make the call…”
                                           1011001111001
                                           0101010001010

Symantec Proprietary and Confidential                                                               3
Symantec Data Insight Improves Organization’s Data
Governance
                                Users
                                                                              • Data Insight solution
                                                                                  – Identifies data owners
                                                                                  – Monitors data usage
                                                                                  – Tracks audit trail
              Symantec Data Insight                                               – Reviews permissions
                                                                                  – Integrates with Symantec Data
                                                                                    Loss Prevention and Veritas
            File System Monitoring Technology                                       Storage Foundation
                                                                              • Data ownership/usage drives
                                                                                  – Data security remediation
                                                                                  – Data storage efficiency
                                                                                  – Data management policy and
                        Data (File Servers)                                         compliance
    Microsoft Windows • NetApp DataONTAP • Microsoft Sharepoint
EMC Celerra • UNIX file servers with Veritas Storage Foundation File System



Symantec Proprietary and Confidential                                                                               4
What’s New in Data Insight 3.0
      Data Custodian                        Comprehensive                  Enhanced Scale and
       Management                             Coverage                        Performance




• Discover and manage data              • Veritas Storage Foundation     • Optimized indexing and
  custodians                              integration                      query
• Engage custodians                     • Enhanced NetApp,               • Lower TCO considerations
  automatically                           SharePoint support             • Tuned for very large data
• Enable large-scale                    • Directory services for LDAP,     sets and rates
  automation                              NIS/NIS+ support




Symantec Proprietary and Confidential                                                                  5
Applications Of Data Insight
       Improved Data                           Achieve                  Protect Data from
        Management                            Compliance                  Security Risks




• Identify stale and orphan             • Discover and manage        • Remediate sensitive data
  data and drive cleanup                  custodians                   with Symantec Data Loss
• Build a consumption based             • Automate data access         Prevention integration
  chargeback model                        reviews                    • Audit historical access,
• Understand usage and                  • Adhere to data retention     monitor sensitive data usage
  consumption patterns                    guidelines                 • Find data at greatest risk of
                                                                       exposure and lockdown



Symantec Proprietary and Confidential                                                              6
Automate Data Governance
1    Identify Folders                           2      Assign Custodians             3   Automate Reports




                                            00010100010111101101010100111001010101
                                            11001101010010101101010000110110011110
                                            01010101000101001010101001011001010100
                                            10101101010101010101010101011010101011
                                            01010001010001011110110101010011100101
                                               Symantec Data Insight

    Case Studies
1. Efficiency                     • Confidently delete , archive or move stale/orphan data while adhering
                                    to data retention guidelines
2. Regulatory Compliance • Review access permissions and activity to achieve compliance

3. Risk Reduction                  • Review activity and alerts to spot inappropriate use, notify owner that
                                     data is exposed, streamline Data Loss Prevention remediation

Symantec Proprietary and Confidential                                                                       7
Data Insight/Storage Foundation integration
                          Users




                        NFS Access                        Benefits

                                               • Data Governance for
                                                 Unix/Storage Foundation
         Unix Server with Storage Foundation     servers
                                               • Data ownership/usage
            Register                Publish      classification to guide tiering
            or scan                 events       and compression



         Symantec Data Insight Collectors


Symantec Proprietary and Confidential                                              8
Data Insight Key Take-Aways

              Addresses crucial challenges around securing and managing
              data

              Security and storage convergence – delivering on the
              Symantec/Veritas promise

              Provides an information-centric approach to data governance

              Release delivers large-scale automation and enhanced
              performance across comprehensive data sources




Symantec Proprietary and Confidential                                       9
Thank you!




    Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec
    Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Symantec Proprietary and Confidential                                                                                                                                                       10

Weitere ähnliche Inhalte

Was ist angesagt?

Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
Ulf Mattsson
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
Craig Mullins
 

Was ist angesagt? (20)

Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Big security for big data
Big security for big dataBig security for big data
Big security for big data
 
Big data security challenges and recommendations!
Big data security challenges and recommendations!Big data security challenges and recommendations!
Big data security challenges and recommendations!
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat Protection
 
Data Virtualization for Accelerated Digital Transformation in Banking and Fin...
Data Virtualization for Accelerated Digital Transformation in Banking and Fin...Data Virtualization for Accelerated Digital Transformation in Banking and Fin...
Data Virtualization for Accelerated Digital Transformation in Banking and Fin...
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Storing Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesStoring Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance Challenges
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data Pribadi
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Mining
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
 
Security bigdata
Security bigdataSecurity bigdata
Security bigdata
 
Hadoop and Big Data Security
Hadoop and Big Data SecurityHadoop and Big Data Security
Hadoop and Big Data Security
 

Ähnlich wie Symantec Data Insight 3.0

Information Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and SolutionsInformation Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and Solutions
IBMGovernmentCA
 
Metadata Use Cases You Can Use
Metadata Use Cases You Can UseMetadata Use Cases You Can Use
Metadata Use Cases You Can Use
dmurph4
 
Metadata Use Cases
Metadata Use CasesMetadata Use Cases
Metadata Use Cases
dmurph4
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
DATAVERSITY
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
Oracle BH
 

Ähnlich wie Symantec Data Insight 3.0 (20)

Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Information Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and SolutionsInformation Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and Solutions
 
Metadata Use Cases You Can Use
Metadata Use Cases You Can UseMetadata Use Cases You Can Use
Metadata Use Cases You Can Use
 
Metadata Use Cases
Metadata Use CasesMetadata Use Cases
Metadata Use Cases
 
Data Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data ArchitectureData Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data Architecture
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
 
Optimize Your Vertica Data Management Infrastructure
Optimize Your Vertica Data Management InfrastructureOptimize Your Vertica Data Management Infrastructure
Optimize Your Vertica Data Management Infrastructure
 
DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...
DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...
DSS - ITSEC Conference - Protected-Networks - An Open Door May Tempt a Saint ...
 
Symantec - Data Governance in the Cloud
Symantec - Data Governance in the CloudSymantec - Data Governance in the Cloud
Symantec - Data Governance in the Cloud
 
Strata San Jose 2017 - Ben Sharma Presentation
Strata San Jose 2017 - Ben Sharma PresentationStrata San Jose 2017 - Ben Sharma Presentation
Strata San Jose 2017 - Ben Sharma Presentation
 
Data Services Marketplace
Data Services MarketplaceData Services Marketplace
Data Services Marketplace
 
Cloud Computing - Security (BIG Data)
Cloud Computing - Security (BIG Data)Cloud Computing - Security (BIG Data)
Cloud Computing - Security (BIG Data)
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
How to evaluate data protection technologies - Mastercard conference
How to evaluate data protection technologies -  Mastercard conferenceHow to evaluate data protection technologies -  Mastercard conference
How to evaluate data protection technologies - Mastercard conference
 
Data Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management InitiativesData Governance: Keystone of Information Management Initiatives
Data Governance: Keystone of Information Management Initiatives
 
EV9 & NBU5000
EV9 & NBU5000EV9 & NBU5000
EV9 & NBU5000
 
Constant Contact: An Online Marketing Leader’s Data Lake Journey
Constant Contact: An Online Marketing Leader’s Data Lake JourneyConstant Contact: An Online Marketing Leader’s Data Lake Journey
Constant Contact: An Online Marketing Leader’s Data Lake Journey
 
The Journey to Data Mesh with Confluent
The Journey to Data Mesh with ConfluentThe Journey to Data Mesh with Confluent
The Journey to Data Mesh with Confluent
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
 

Mehr von Symantec

Mehr von Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Symantec Data Insight 3.0

  • 1. Symantec Data Insight 3.0 March 2012 Symantec Proprietary and Confidential 1
  • 2. Unstructured Information Growth Leads To Challenges “ Datagrowth during the next 5 years most of the growth continues unabated… is unstructured data – the most difficult to manage from a process or tool point of view. - Gartner, December 2011 ” Who Owns the Data? How is the Data Used? Protect the Data • Inadequate metadata • Who has accessed the • Who should have access? information data over time? • Are there gaps in the • Pre-requisite for other • When is the data no protection or entitlements business initiatives longer needed? scheme? Symantec Proprietary and Confidential 2
  • 3. Bridging IT And Business Gap Is The Key To Getting In Control Of Runaway Data Growth 0001010001011 Runaway unstructured data growth 1101101010100 … that the business owner is in the leads to serious challenges for IT… 1110010101011 best position to solve 1001101010010 1011010100001 • Business owners are the true • “I know I have millions of files that 1011001111001 0101010001010 ‘custodians’ have not been used for a long time 0101010100101 – How do we identify them? – what do I do with them?” 1001010100101 – How do we empower them? 0110101010101 • “I know there is sensitive 0101010101011 • How can we enable them with information out there – where is it 0101010110101 – The right reports for visibility and how is it being used?” 0001010001011 1101101010100 – The right recommendations for decision making • “How do I comply with data access 1110010101011 – The right automation to guidelines? I am not sure I am the 1001101010010 1011010100001 simplify remediation right person to make the call…” 1011001111001 0101010001010 Symantec Proprietary and Confidential 3
  • 4. Symantec Data Insight Improves Organization’s Data Governance Users • Data Insight solution – Identifies data owners – Monitors data usage – Tracks audit trail Symantec Data Insight – Reviews permissions – Integrates with Symantec Data Loss Prevention and Veritas File System Monitoring Technology Storage Foundation • Data ownership/usage drives – Data security remediation – Data storage efficiency – Data management policy and Data (File Servers) compliance Microsoft Windows • NetApp DataONTAP • Microsoft Sharepoint EMC Celerra • UNIX file servers with Veritas Storage Foundation File System Symantec Proprietary and Confidential 4
  • 5. What’s New in Data Insight 3.0 Data Custodian Comprehensive Enhanced Scale and Management Coverage Performance • Discover and manage data • Veritas Storage Foundation • Optimized indexing and custodians integration query • Engage custodians • Enhanced NetApp, • Lower TCO considerations automatically SharePoint support • Tuned for very large data • Enable large-scale • Directory services for LDAP, sets and rates automation NIS/NIS+ support Symantec Proprietary and Confidential 5
  • 6. Applications Of Data Insight Improved Data Achieve Protect Data from Management Compliance Security Risks • Identify stale and orphan • Discover and manage • Remediate sensitive data data and drive cleanup custodians with Symantec Data Loss • Build a consumption based • Automate data access Prevention integration chargeback model reviews • Audit historical access, • Understand usage and • Adhere to data retention monitor sensitive data usage consumption patterns guidelines • Find data at greatest risk of exposure and lockdown Symantec Proprietary and Confidential 6
  • 7. Automate Data Governance 1 Identify Folders 2 Assign Custodians 3 Automate Reports 00010100010111101101010100111001010101 11001101010010101101010000110110011110 01010101000101001010101001011001010100 10101101010101010101010101011010101011 01010001010001011110110101010011100101 Symantec Data Insight Case Studies 1. Efficiency • Confidently delete , archive or move stale/orphan data while adhering to data retention guidelines 2. Regulatory Compliance • Review access permissions and activity to achieve compliance 3. Risk Reduction • Review activity and alerts to spot inappropriate use, notify owner that data is exposed, streamline Data Loss Prevention remediation Symantec Proprietary and Confidential 7
  • 8. Data Insight/Storage Foundation integration Users NFS Access Benefits • Data Governance for Unix/Storage Foundation Unix Server with Storage Foundation servers • Data ownership/usage Register Publish classification to guide tiering or scan events and compression Symantec Data Insight Collectors Symantec Proprietary and Confidential 8
  • 9. Data Insight Key Take-Aways Addresses crucial challenges around securing and managing data Security and storage convergence – delivering on the Symantec/Veritas promise Provides an information-centric approach to data governance Release delivers large-scale automation and enhanced performance across comprehensive data sources Symantec Proprietary and Confidential 9
  • 10. Thank you! Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Symantec Proprietary and Confidential 10