SlideShare a Scribd company logo
1 of 92
Agenda

What is dark data?

Josef Elliott

Using HP ControlPoint to find, analyse & classify unstructured
enterprise data

Dominic Johnstone

Using AIO to analyse and manage database and application
content

Mark Gower

What do I do with the data I find?

Dominic Johnstone

Securing and managing data with HP Records Manager

Craig Adams

Hosting your data in the secure HP Cloud

Bharat Mistry

Putting it all together DEMO of ControlPoint and Records Manager

Dominic Johnstone
Arthur Leclerc-Chalvet

Q&A and Prize Draw for HP Tablet Device

Josef Elliott
1
Today’s Information Reality
Overload or opportunity?

EXPLOSION OF
DATA
• Data doubling every
12-18 months
• New, unstructured
data types to manage
• Storage growth is
outpacing IT budget
• Growth of
ungoverned
structured data

DATA
EVERYWHERE

REAL-TIME
ACCESS

INCREASED
REGULATIONS

• Mobile, virtual, cloud
joins physical and onpremise
• New Data Security
considerations
• 67% of users have
three or more
computing platforms

• Always-on
applications and users
• Users have high
up time expectations
• Business continuity
moves to forefront

• Escalating regulatory
and higher volumes
• Find the “needle in
haystack”
• Utilize corporate
information assets

Growing IT Burden, Business Inefficiency and Risk Exposure driving Information Governance

2
Enterprise Information Environment

“Missed Opportunity”

Social Media

“Increased Risk”

“Cost & Complexity”

Video

HRMS

Supply Chain
Management/
Inventory
Mgmt

Email
Texts

Messages

Procurement

CRM

ERP
Images

Word, Excel

Audio

Transactional
Data

Human Information

90%

Logs

Clickstream
Data

Structured Information

Organisations need to handle
100% of this information

10%

3
Lots of Systems

4
And it’s growing…

5
Why is it growing…..?

Current behaviour leads to over-retention
The myth of cheap storage, coupled with lack of clear policy creates confusion

We are running out of capacity

Let„s add more disks

Applications are slowing down

Upgrade infrastructure

Backup takes longer and longer

Change backup infrastructure

We need to retain information...

Keep tapes

…For a certain period of time

We keep everything forever

We need to be compliant

Implement archive, DMS, RM,...

We need to retrieve information...

Look into different sources

…Historical information

Recover tapes
6
Dark Data

“like our own physical universe, the digital
universe is rapidly expanding and
incredibly diverse, with vast regions that
are unexplored and some that are,
frankly, scary”.
(IDC, Digital Universe, 2013)

7
Dark Matter

8
Defining Dark Data
Characteristics of dark data
What is it?
•
•
•
•
•
•

Human readable
Unstructured
Not indexed
Unmanaged
Inactive
Orphaned

Where is it?
•
•
•

File Servers
SharePoint
Email Servers

9
Opportunities and Risks of Dark Data
What lies hidden in your dark data?
Understanding your dark data can have significant benefits:
• Cost savings through the reduction of storage and management overhead by allowing the defensible
destruction of non-required data
• Prepares and organizes valuable legacy information to provide insight into current and future
business processes
• Allows you to recognize information types and structures and develop policies to properly govern
information in future

Data that remains dark has the potential risk of:
•
•
•
•

Containing sensitive information that is unprotected from data leakage and misuse
Information being used out of context
Decisions are based on outdated versions of information
Duplicate effort is spent in producing the same information again

10
Confusion, Cost, Risk

The Information Paradox

Information
Gartner Inc 2012
11
Document Production
Document Production Requirement

Applicable for Litigation,
Regulatory Submission or
Internal enquiry purposes

Major financial benefit accrues when “document production” becomes a
repeatable, defensible process
12
It’s actually all about Information Management

13
Six Steps to Redemption

1. Understand the logical information environment
2. Identify existing information repositories
3. Index to understand your existing data
4. Deep dive analysis and advanced content analytics to extract meaning
5. Archive, Protect, Dispose
6. Secure the benefits

14
Applying Information Governance to Dark Data
A stepwise approach to making sense of your dark data
1.
2.
3.
4.

Identify your dark data sources
Create a light metadata index
Reduce obvious ROT
Perform deeper analysis, incorporating advanced data analytics to add
meaning and context to the data (data becomes information)
5. Categorize the information
6. Define and apply auditable policy to the information
Analyse

Execute

Sample

Auditable
Policy

Approve

15

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Tag
Reducing Redundant, Obsolete and Trivial Data
Freeing up space and reducing volumes in preparation for in-depth analysis

Redundant:
•
•

•

16

Obsolete:

Identify duplicate
•
documents
Identify the master
(assess against obvious •
master sources)
Get rid of the copies
•

Identify documents that
haven‟t been accessed for a
long time
Compare against your
retention schedules
Get rid of the ones that are
obviously past their use by
date

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Trivial:
•
•
•
•

Identify documents that have no
valuable content
System Files, Crash Dumps,
Thumbnails etc.
Assess on the basis of file types
Get rid of the obviously trivial
ones
Use Advanced Content Analytics to Extract
Meaning
Develop an understanding of the business context of your dark data
Clustering
•
•

Visualize common content patterns in your dark data
Identify groupings for policy development and application

Trained Categories
•
•
•

Leverage your investment in records management
Use known documents to train categories
Identify category matches in your dark data

Eduction
•
•

Identify sensitive information in documents
e.g. Credit Card Numbers, Social Security Numbers etc.
Secure documents appropriately

17

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Policy Application and Execution
Dealing with the categorized information

Defensible Destruction
•
•

•

Seek approval from identified owners
Provide audit reports on all stages of your decision process (identification,
sampling, tagging etc.)
Maintain audit logs of deletion process

Migration
•
•
•

Migrate to records management, archives or secondary storage system
according to the business value of the information
Migrate metadata and tags if possible
Maintain audit logs of the migration process

In-Place Management
•
•
•
18

Use a policy engine to enforce future application of the policy you have selected
now
Quality of information and policy application depends on the capabilities of the
system under management
Maintain audit trails of any actions applied

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Ongoing Information Governance
Keeping everything under control

Identify how business processes use and generate information
•
•

Adjust ongoing information governance policies according to business and regulatory
requirements
Cover both structured and unstructured information

Keep indexes up to date
•
•
•

Leverage for enterprise searching
Keeps data accessible
Allows ongoing categorisation

Automate as much as possible:
•
•
•
•

19

Implement performance and compliance archives
Apply ongoing policies based on indexed categories
Auto-capture records
Manage records in-place

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Summary
Information Governance is an ongoing business

Leverage the investment in Legacy Data
Cleanup for ongoing Information
Governance – Don’t let new information
get dark!

20

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Stages of Legacy Data Cleanup
Design structure

1. Identify and
Index

21

2. Analyse

3. Organize

4. Reduce

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

5.
Manage/Migrate
Identify and Index
Getting started
Software Deployment
• Legacy data cleanup volume licensing
• Packaged deployment tool now includes Exchange Connector

Repository registration
• Repositories are automatically registered based on IDOL databases
• File system and SharePoint repositories can be added and configured for indexing through
ControlPoint UI

Indexing
• Different levels of indexing are available
• Preconfigured eduction task to find personally identifiable information

22

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Identify and Index

23

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Analyse
Understanding what is there

Visualise the statistics compiled by the analytics as a summary report:
• Based on file level metadata and hashes:
– Redundant data: statistics on duplicates
– Trivial data: based on file types with no content value (e.g *.exe, system files, thumbnails etc)
– Obsolete data: based on date created, modified, accessed
• Based on advanced content analysis:
– Category matches
– Personally identifiable information (eduction)

Provide detail graphs and linked document grid for:
•
•
•
•

24

Cluster visualisation
Duplicates
Analytical data: By size, type, age, user, categories and custom fields
Applied Tags

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Analyse

25

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Analyse

26

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Organise
Preparing for policy assignment
Supporting a structured approach consisting of:
•
•
•
•

Filtering – to combine main selection criteria with other facets
Sampling – to randomly select fixed size or percentage samples
Document inspection – to view properties, advanced properties or native content
Tagging – to group the documents into actionable categories

Assign policies to tagged categories
• Use the standard ControlPoint policy phases, including workflow policies that can route the data
through an approval process

27

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Organise

28

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Organise

29

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Reduce
Cut down on the data volume
Provide defensible deletion
• Apply deletion and deduplication based on ControlPoint policy
• Standard ControlPoint policy review step is available
• Use ControlPoint workflow policy actions for extended review processes (requires APA)

30

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Manage/Migrate
Taking the step from cleanup to ongoing information governance
Merge legacy data into current information governance policies
• Declare move, secure move, hold, manage in place through ControlPoint policies
• Migration of organised legacy data between repositories(e.g. File System to HP Records Manager
SharePoint, Exchange to ACA etc.)
• Declare legacy data as records (in place or migration)
• Ongoing application of ControlPoint policies to new data identified based on trained categories

31

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Legacy Data Cleanup
Summary

Legacy Data
Inactive
Unknown
Orphaned

Dealing with the past

32

Continuous Information Governance

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Legacy Data Cleanup
Summary

ControlPoint 4.1
Legacy Data
Inactive
Unknown
Orphaned

Dealing with the past

33

Continuous Information Governance

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Case study: auto records classification
Defense Contract Management Agency (DCMA)

Products: HP TRIM, ControlPoint (5000 users)
Use case:
•
•

Working with suppliers to align purchasing of products and services
with policies and requirements.
Seeking to improve management of SharePoint and file shares; also
to improve legal hold programs

Why we won:
•
•
•
•

Made classification and records management transparent to users
File share and SharePoint content under strict policy management
ControlPoint and ALH for identifying content for legal hold
APA to improve program workflows
Case study: SharePoint governance
Product: ControlPoint
Use case:
• Uses ControlPoint to lower operating costs of
SharePoint by:
• Migrating content from SharePoint farms to
Autonomy cloud storage
• Using ControlPoint to identify and move content
from operations to Autonomy cloud

Benefit:
• Achieved significant cost reductions in SharePoint TCO
Case study: Legacy Data Cleanup
Product:
Control Point 4.0
Use case:
• Selected Control Point 4.0 for dark data identification
• Initial project is to identify, analyse and transform 100 terabytes
- full project to include 2 petabytes
• Project sold in conjunction with ES Application
Optimisation program
• Will identify unstructured content with high business
context and records value
• Goal is information footprint reduction AND identification
of unknown high-risk content
HP
Application Information
Optimizer
Mark Gower
31st October 2013

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Application Information Optimizer
Addressing the problems of dark structured data

Exploding Data Growth
Lack of Policy
Management

Performance Issues

Governance and eDiscovery

38

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Classifying Application Data

• Define a broad classification of the data in the app database

Data by Classification

• Eg. Trading Data & Audit information

• Identify structure within classifications
• Analyse by date quantity of data for each classification
• Propose data management policy

Other
1%
Oracle
System
2%

Trading Data
22%

Audit Data
75%

39

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Managing Applications
With Application Information Optimizer
•
•
•

Relocate Data to a second datastore
Relocate Data to external archive / governance platform
Improve Performance & Reduce Risk

Reporting/rendering
tools

Business Application

Retired records

Inactive Data
Primary Datastore

40

HP RM8

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Defensible Disposal
Enterprise Structured Data Management

HP IT‟s ongoing database archiving strategy
powered by HP AIO since November 2009
•Query time reduced by 89%
•Storage reduced by 48%
•Full backup window reduced by 37%

By July 2012 - 122 source databases, 836 db-db jobs, 57+billion rows
archived

41

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
What do I do with the data I find?
•
•
•

Unstructured Data
Repositories

Structured Data
Repositories

•
•
•

Archive
Protect
Dispose

Know what
information you
have

HP Records
Manager

Know where the
information is
located

Autonomy
Consolidated
Archive

Analyse
Classify
Take action

Know your
information is
secure

Additional
Active
Repositories

Know the
information is
managed
appropriately

Autonomy
ControlPoint

HP Application
Information
Optimizer

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Autonomy
Records Management
Strategy
Craig Adams, EMEA Information Governance Manager
31st October 2013

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Records Management - Strategy

Microsoft SharePoint

HP Autonomy Records Manager

44

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Records Manager 8.0
HP Records Manager 8.0
• Next generation, scalable electronic document and records management
solution
• Designed to meet the needs of Government and regulated industry
• Combining the best of HP TRIM, ARM & Meridio
• Standards Compliant platform
• A cornerstone of HP‟s Information Governance framework

Transforming Records Management
for Information Governance

45

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Transforming records management
HP Records Manager use cases supporting information governance

Interactive Document
Management

SharePoint
Governance

ControlPoint Auto-Declare
In-Place Management

Unstructured
Repositories

SAP
ArchiveLin
k

AIO Structured
Records

COM/.NET SDK
Services API

HP Records Manager

46

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Physical
Records

Custom Solutions
HP’s Own Records
Management Journey

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP RM Programme - ERMS Purpose
ERMS will facilitate and enhance HP‟s compliance activities, because we
• Are required by law to manage records
•

Need to find the right records at the right time

•

Need to produce records swiftly and cost-effectively for tax and other government
audits, regulatory compliance, and legal proceedings

•

Need to delete records we do not need to keep to reduce storage and litigation
production costs

•

Need to meet our global needs across:
•
•

16,000 Records Management / Co-Ordinators

•

173 countries

•

Multiple languages & jurisdictions

•

48

330,000 employees

Stakeholders in Tax, Audit, Legal, IT

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP RM Programme - ERMS Scope

49

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP RM Programme - ERMS Schedule
FY08 Q4 –
FY09 Q1

50

FY09-Q2

Phase I
FY09 Q3 FY10 Q1

Phase II
FY10 Q3 FY13

Phase III
FY11 Q4 FY14

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Beyond Phase III
FY14+
HP RM Programme - FY13 Registered Records

50,000,000
43,515,280

45,000,000
40,000,000 38,203,252
33,817,366

35,000,000
30,000,000

24,946,475 24,370,349

23,373,470

25,000,000

26,573,487

20,000,000
15,000,000
10,000,000
5,000,000
0
Nov

Dec

Jan

Feb

Mar

Apr

May

Jun

Details from registered records report.

51

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Jul

Aug

Sep

Oct
Hosting your data in the
secure HP Cloud
Bharat Mistry
CTO Office – Strategy Group,
HP Enterprise Security Services
October 31, 2013

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
HP Converged Cloud
Hybrid delivery based on common architecture across traditional & all cloud models
Choice
• Open…standards-based across all delivery models
• Heterogeneous…hypervisors, development, infrastructure
• Extensible…partner ecosystem

Confidence

INFORMATION
APPLICATIONS
INFRASTRUCTURE

Traditional

Public Cloud
Private Cloud

53

• Security…across info, apps, infrastructure, delivery models
• Management …end to end
• Automation…for cloud based architectures & processes

Managed Cloud

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.

Consistency
• Common architecture…across all delivery models
• Portability…for flexibility & optimization
• Consumption experience…one simple model
Security Risks with the Cloud
A major concern for the CISO
Uncertain ability to enforce provider site security policies
Questionable privileged access control at provider site
Inadequate training and IT auditing
Proximity of your data to someone elses
Uncertain ability to recover data
Access across an untrusted network
Uncertain provider regulatory compliance
Uncertain continued existence of provider
Uncertain ability to audit provider

0%

5%

10%

15%

20%

25%

Source: 2012 Global State of Information Security Survey, PricewaterhouseCoopers, CIO magazine, CSO magazine, September 2011

54

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.

30%

35%
Cloud Security Challenges
Cloud Service Provider Perspective

IaaS

PaaS

SaaS

• Increasing security responsibilities at
the information, application & user
layers
• Abstraction and automation of
O/S, Network, and Physical layers

User Management

Application

Application

Application
Platform

Application
Platform

O/S

O/S
image

• PaaS: Heroku, Google App.
Engine
• SaaS: SalesForce.com

55

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.

SaaS
PaaS

• Examples:

• IaaS: HP, Amazon EC2

Application

Network

IaaS
Physical
Consumer responsible

Provider responsible
HP Cloud File Management

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Cloud File Management
Secure access, caching, and storage capabilities for your business files

File sync and store
Online workspaces
Data encryption

Base

Device security
SharePoint integration
Storage controllers
Optional

Additional user storage

57

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

File, sync, and
share
anytime, anywhere
, from any device
Cloud File Management
Secure access, caching, and storage capabilities for your business files.

File sync and store

Store files in the secure HP cloud and sync automatically to your
device when connected.

Online workspaces

Setup private and public folders in the cloud with password
protection.

Data encryption

Secure data files with 256-bit encryption both in transit and at
rest in the cloud.

Device security

Set up multiple security configurations with flexible access or
more secure modes to provide options.

SharePoint integration
Storage controllers

Segregated data storage within the HP cloud and on-premise to
meet data governance rules.

Additional user storage

58

Allows users to access SharePoint files from within the Cloud
File Management environment with read/write document access.

Order and configure additional storage in 100 GB blocks, shard
across all users.

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Cloud File Management
Flexible new access across multiple devices

Limited mobile access

ECS–Mobility

Files are shared/stored across systems and
devices
with restricted access.

Files secured in the cloud and synced across
devices
with flexible access.

SharePoint

Email

59

Database

Server

Mobile

Desktop

Notebook

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
File sync and store
Store files in the secure HP cloud and sync automatically

• Users can store files in a secure cloud
• Synchronize data automatically to any device
for offline viewing
• Includes 5GB of user storage in the HP cloud
• Changed files are automatically updated to
the cloud and accessible by any PC or mobile
device
• Files cached on the device are also available
for offline viewing

60

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Online workspaces
Share files securely in the cloud

• Provides private and public folders in the cloud
with password protection
• Users can set access control rights for uploads
and downloads
• Reduces email storage requirements by sending
secure links to files instead of actual attachments.
• Request a file upload from co-workers or third
parties by providing a secure link

61

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Data encryption
Secure data both in transit and at rest in the cloud

• In-transit encryption for file transfers using
256 bit SSL for security
• Cloud storage encryption for files uploaded to
Cloud File Management servers
• File metadata has a unique encryption key, stored
separately from the file itself, and encrypted when
uploaded
• Downloaded files are decrypted before their
contents are sent to your browser

• On-device encryption is available through the
Management Essentials package

62

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Device security
Multiple security configurations for file access

• Provides flexible options for security administration
• Configure a standard mode with flexible access to
files
• Configure a more secure mode with options like pin
locks, file self-destruct, and disabling offline access
• Custom configurations are also available

63

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Configuration
Management
SharePoint integration
Additional integration opportunity

Users get access to SharePoint files from within
Cloud File Management with read and write
access to documents stored there.

64

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Storage controllers
Create and manage local storage centers

• Storage controllers allows administrators to manage
on-premise storage centers alongside cloud-based
storage
• Store select files within the HP converged cloud and/or
on-premise to meet data governance rules
• Integrate storage controllers with any CIFS-based
network share from any storage vendor

• Enable mobile access to file shares and document
management systems through a single interface

65

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
ControlPoint 4.1
Slide Demonstration

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
67

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
68

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
69

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
70

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
71

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
72

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
73

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
74

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
75

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
76

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
HP Records Manager
8.0
Slide Demonstration

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
78

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
79

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
80

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
81

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
82

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
83

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
84

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
85

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
86

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
87

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
88

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
89

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
90

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
91

© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
© Copyright 2012 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.

More Related Content

What's hot

Setting Up the Data Lake
Setting Up the Data LakeSetting Up the Data Lake
Setting Up the Data LakeCaserta
 
Introduction to Data Mining, Business Intelligence and Data Science
Introduction to Data Mining, Business Intelligence and Data ScienceIntroduction to Data Mining, Business Intelligence and Data Science
Introduction to Data Mining, Business Intelligence and Data ScienceIMC Institute
 
Maximize the Value of Your Data: Neo4j Graph Data Platform
Maximize the Value of Your Data: Neo4j Graph Data PlatformMaximize the Value of Your Data: Neo4j Graph Data Platform
Maximize the Value of Your Data: Neo4j Graph Data PlatformNeo4j
 
Thwart Fraud Using Graph-Enhanced Machine Learning and AI
Thwart Fraud Using Graph-Enhanced Machine Learning and AIThwart Fraud Using Graph-Enhanced Machine Learning and AI
Thwart Fraud Using Graph-Enhanced Machine Learning and AINeo4j
 
Dealing with Dark Data
Dealing with Dark DataDealing with Dark Data
Dealing with Dark DataKazoup
 
DOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCEDOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCEijsptm
 
Data Mining and Business Intelligence Tools
Data Mining and Business Intelligence ToolsData Mining and Business Intelligence Tools
Data Mining and Business Intelligence ToolsMotaz Saad
 
Big Data Evolution
Big Data EvolutionBig Data Evolution
Big Data Evolutionitnewsafrica
 
Big Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data ManagementBig Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data ManagementTony Bain
 
Balancing Data Governance and Innovation
Balancing Data Governance and InnovationBalancing Data Governance and Innovation
Balancing Data Governance and InnovationCaserta
 
What Data Do You Have and Where is It?
What Data Do You Have and Where is It? What Data Do You Have and Where is It?
What Data Do You Have and Where is It? Caserta
 
Mastering Customer Data on Apache Spark
Mastering Customer Data on Apache SparkMastering Customer Data on Apache Spark
Mastering Customer Data on Apache SparkCaserta
 
Making Big Data Easy for Everyone
Making Big Data Easy for EveryoneMaking Big Data Easy for Everyone
Making Big Data Easy for EveryoneCaserta
 
Big data-analytics-cpe8035
Big data-analytics-cpe8035Big data-analytics-cpe8035
Big data-analytics-cpe8035Neelam Rawat
 
Bigdata based fraud detection
Bigdata based fraud detectionBigdata based fraud detection
Bigdata based fraud detectionMk Kim
 
The Emerging Role of the Data Lake
The Emerging Role of the Data LakeThe Emerging Role of the Data Lake
The Emerging Role of the Data LakeCaserta
 

What's hot (20)

Setting Up the Data Lake
Setting Up the Data LakeSetting Up the Data Lake
Setting Up the Data Lake
 
Introduction to Data Mining, Business Intelligence and Data Science
Introduction to Data Mining, Business Intelligence and Data ScienceIntroduction to Data Mining, Business Intelligence and Data Science
Introduction to Data Mining, Business Intelligence and Data Science
 
Maximize the Value of Your Data: Neo4j Graph Data Platform
Maximize the Value of Your Data: Neo4j Graph Data PlatformMaximize the Value of Your Data: Neo4j Graph Data Platform
Maximize the Value of Your Data: Neo4j Graph Data Platform
 
BigData Analysis
BigData AnalysisBigData Analysis
BigData Analysis
 
Thwart Fraud Using Graph-Enhanced Machine Learning and AI
Thwart Fraud Using Graph-Enhanced Machine Learning and AIThwart Fraud Using Graph-Enhanced Machine Learning and AI
Thwart Fraud Using Graph-Enhanced Machine Learning and AI
 
Dealing with Dark Data
Dealing with Dark DataDealing with Dark Data
Dealing with Dark Data
 
DOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCEDOCUMENT SELECTION USING MAPREDUCE
DOCUMENT SELECTION USING MAPREDUCE
 
Data Mining and Business Intelligence Tools
Data Mining and Business Intelligence ToolsData Mining and Business Intelligence Tools
Data Mining and Business Intelligence Tools
 
Big Data Evolution
Big Data EvolutionBig Data Evolution
Big Data Evolution
 
Big Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data ManagementBig Data, NoSQL, NewSQL & The Future of Data Management
Big Data, NoSQL, NewSQL & The Future of Data Management
 
Balancing Data Governance and Innovation
Balancing Data Governance and InnovationBalancing Data Governance and Innovation
Balancing Data Governance and Innovation
 
What Data Do You Have and Where is It?
What Data Do You Have and Where is It? What Data Do You Have and Where is It?
What Data Do You Have and Where is It?
 
Mastering Customer Data on Apache Spark
Mastering Customer Data on Apache SparkMastering Customer Data on Apache Spark
Mastering Customer Data on Apache Spark
 
Big data ppt
Big  data pptBig  data ppt
Big data ppt
 
Making Big Data Easy for Everyone
Making Big Data Easy for EveryoneMaking Big Data Easy for Everyone
Making Big Data Easy for Everyone
 
Big data analysis
Big data analysisBig data analysis
Big data analysis
 
Exploring Big Data Analytics Tools
Exploring Big Data Analytics ToolsExploring Big Data Analytics Tools
Exploring Big Data Analytics Tools
 
Big data-analytics-cpe8035
Big data-analytics-cpe8035Big data-analytics-cpe8035
Big data-analytics-cpe8035
 
Bigdata based fraud detection
Bigdata based fraud detectionBigdata based fraud detection
Bigdata based fraud detection
 
The Emerging Role of the Data Lake
The Emerging Role of the Data LakeThe Emerging Role of the Data Lake
The Emerging Role of the Data Lake
 

Similar to Dealing with Dark Data

Cloudian 451-hortonworks - webinar
Cloudian 451-hortonworks - webinarCloudian 451-hortonworks - webinar
Cloudian 451-hortonworks - webinarHortonworks
 
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationGDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationDenodo
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
[DSC Europe 23] Milos Solujic - Data Lakehouse Revolutionizing Data Managemen...
[DSC Europe 23] Milos Solujic - Data Lakehouse Revolutionizing Data Managemen...[DSC Europe 23] Milos Solujic - Data Lakehouse Revolutionizing Data Managemen...
[DSC Europe 23] Milos Solujic - Data Lakehouse Revolutionizing Data Managemen...DataScienceConferenc1
 
Driving Business Value Through Agile Data Assets
Driving Business Value Through Agile Data AssetsDriving Business Value Through Agile Data Assets
Driving Business Value Through Agile Data AssetsEmbarcadero Technologies
 
Strata San Jose 2017 - Ben Sharma Presentation
Strata San Jose 2017 - Ben Sharma PresentationStrata San Jose 2017 - Ben Sharma Presentation
Strata San Jose 2017 - Ben Sharma PresentationZaloni
 
Data Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data ArchitectureData Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data ArchitectureZaloni
 
Big Data Expo 2015 - HP Information Management & Governance
Big Data Expo 2015 - HP Information Management & GovernanceBig Data Expo 2015 - HP Information Management & Governance
Big Data Expo 2015 - HP Information Management & GovernanceBigDataExpo
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...Everteam
 
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?DevOps.com
 
ADV Slides: Data Pipelines in the Enterprise and Comparison
ADV Slides: Data Pipelines in the Enterprise and ComparisonADV Slides: Data Pipelines in the Enterprise and Comparison
ADV Slides: Data Pipelines in the Enterprise and ComparisonDATAVERSITY
 
The Great Lakes: How to Approach a Big Data Implementation
The Great Lakes: How to Approach a Big Data ImplementationThe Great Lakes: How to Approach a Big Data Implementation
The Great Lakes: How to Approach a Big Data ImplementationInside Analysis
 
Active Governance Across the Delta Lake with Alation
Active Governance Across the Delta Lake with AlationActive Governance Across the Delta Lake with Alation
Active Governance Across the Delta Lake with AlationDatabricks
 
Transforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform StrategyTransforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform StrategyDatabricks
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteEdgar Alejandro Villegas
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital Worlditnewsafrica
 
A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)Denodo
 

Similar to Dealing with Dark Data (20)

Cloudian 451-hortonworks - webinar
Cloudian 451-hortonworks - webinarCloudian 451-hortonworks - webinar
Cloudian 451-hortonworks - webinar
 
Ask bigger questions
Ask bigger questionsAsk bigger questions
Ask bigger questions
 
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data VirtualizationGDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
[DSC Europe 23] Milos Solujic - Data Lakehouse Revolutionizing Data Managemen...
[DSC Europe 23] Milos Solujic - Data Lakehouse Revolutionizing Data Managemen...[DSC Europe 23] Milos Solujic - Data Lakehouse Revolutionizing Data Managemen...
[DSC Europe 23] Milos Solujic - Data Lakehouse Revolutionizing Data Managemen...
 
Driving Business Value Through Agile Data Assets
Driving Business Value Through Agile Data AssetsDriving Business Value Through Agile Data Assets
Driving Business Value Through Agile Data Assets
 
Big Data + PeopleSoft = BIG WIN!
Big Data + PeopleSoft = BIG WIN!Big Data + PeopleSoft = BIG WIN!
Big Data + PeopleSoft = BIG WIN!
 
Strata San Jose 2017 - Ben Sharma Presentation
Strata San Jose 2017 - Ben Sharma PresentationStrata San Jose 2017 - Ben Sharma Presentation
Strata San Jose 2017 - Ben Sharma Presentation
 
Data Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data ArchitectureData Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data Architecture
 
Big Data Expo 2015 - HP Information Management & Governance
Big Data Expo 2015 - HP Information Management & GovernanceBig Data Expo 2015 - HP Information Management & Governance
Big Data Expo 2015 - HP Information Management & Governance
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
 
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?DBAs - Is Your Company’s Personal and Sensitive Data Safe?
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
 
ADV Slides: Data Pipelines in the Enterprise and Comparison
ADV Slides: Data Pipelines in the Enterprise and ComparisonADV Slides: Data Pipelines in the Enterprise and Comparison
ADV Slides: Data Pipelines in the Enterprise and Comparison
 
The Great Lakes: How to Approach a Big Data Implementation
The Great Lakes: How to Approach a Big Data ImplementationThe Great Lakes: How to Approach a Big Data Implementation
The Great Lakes: How to Approach a Big Data Implementation
 
Active Governance Across the Delta Lake with Alation
Active Governance Across the Delta Lake with AlationActive Governance Across the Delta Lake with Alation
Active Governance Across the Delta Lake with Alation
 
Transforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform StrategyTransforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform Strategy
 
Cassie findlay
Cassie findlayCassie findlay
Cassie findlay
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital World
 
A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)
 

Recently uploaded

VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 

Recently uploaded (20)

VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 

Dealing with Dark Data

  • 1. Agenda What is dark data? Josef Elliott Using HP ControlPoint to find, analyse & classify unstructured enterprise data Dominic Johnstone Using AIO to analyse and manage database and application content Mark Gower What do I do with the data I find? Dominic Johnstone Securing and managing data with HP Records Manager Craig Adams Hosting your data in the secure HP Cloud Bharat Mistry Putting it all together DEMO of ControlPoint and Records Manager Dominic Johnstone Arthur Leclerc-Chalvet Q&A and Prize Draw for HP Tablet Device Josef Elliott 1
  • 2. Today’s Information Reality Overload or opportunity? EXPLOSION OF DATA • Data doubling every 12-18 months • New, unstructured data types to manage • Storage growth is outpacing IT budget • Growth of ungoverned structured data DATA EVERYWHERE REAL-TIME ACCESS INCREASED REGULATIONS • Mobile, virtual, cloud joins physical and onpremise • New Data Security considerations • 67% of users have three or more computing platforms • Always-on applications and users • Users have high up time expectations • Business continuity moves to forefront • Escalating regulatory and higher volumes • Find the “needle in haystack” • Utilize corporate information assets Growing IT Burden, Business Inefficiency and Risk Exposure driving Information Governance 2
  • 3. Enterprise Information Environment “Missed Opportunity” Social Media “Increased Risk” “Cost & Complexity” Video HRMS Supply Chain Management/ Inventory Mgmt Email Texts Messages Procurement CRM ERP Images Word, Excel Audio Transactional Data Human Information 90% Logs Clickstream Data Structured Information Organisations need to handle 100% of this information 10% 3
  • 6. Why is it growing…..? Current behaviour leads to over-retention The myth of cheap storage, coupled with lack of clear policy creates confusion We are running out of capacity Let„s add more disks Applications are slowing down Upgrade infrastructure Backup takes longer and longer Change backup infrastructure We need to retain information... Keep tapes …For a certain period of time We keep everything forever We need to be compliant Implement archive, DMS, RM,... We need to retrieve information... Look into different sources …Historical information Recover tapes 6
  • 7. Dark Data “like our own physical universe, the digital universe is rapidly expanding and incredibly diverse, with vast regions that are unexplored and some that are, frankly, scary”. (IDC, Digital Universe, 2013) 7
  • 9. Defining Dark Data Characteristics of dark data What is it? • • • • • • Human readable Unstructured Not indexed Unmanaged Inactive Orphaned Where is it? • • • File Servers SharePoint Email Servers 9
  • 10. Opportunities and Risks of Dark Data What lies hidden in your dark data? Understanding your dark data can have significant benefits: • Cost savings through the reduction of storage and management overhead by allowing the defensible destruction of non-required data • Prepares and organizes valuable legacy information to provide insight into current and future business processes • Allows you to recognize information types and structures and develop policies to properly govern information in future Data that remains dark has the potential risk of: • • • • Containing sensitive information that is unprotected from data leakage and misuse Information being used out of context Decisions are based on outdated versions of information Duplicate effort is spent in producing the same information again 10
  • 11. Confusion, Cost, Risk The Information Paradox Information Gartner Inc 2012 11
  • 12. Document Production Document Production Requirement Applicable for Litigation, Regulatory Submission or Internal enquiry purposes Major financial benefit accrues when “document production” becomes a repeatable, defensible process 12
  • 13. It’s actually all about Information Management 13
  • 14. Six Steps to Redemption 1. Understand the logical information environment 2. Identify existing information repositories 3. Index to understand your existing data 4. Deep dive analysis and advanced content analytics to extract meaning 5. Archive, Protect, Dispose 6. Secure the benefits 14
  • 15. Applying Information Governance to Dark Data A stepwise approach to making sense of your dark data 1. 2. 3. 4. Identify your dark data sources Create a light metadata index Reduce obvious ROT Perform deeper analysis, incorporating advanced data analytics to add meaning and context to the data (data becomes information) 5. Categorize the information 6. Define and apply auditable policy to the information Analyse Execute Sample Auditable Policy Approve 15 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Tag
  • 16. Reducing Redundant, Obsolete and Trivial Data Freeing up space and reducing volumes in preparation for in-depth analysis Redundant: • • • 16 Obsolete: Identify duplicate • documents Identify the master (assess against obvious • master sources) Get rid of the copies • Identify documents that haven‟t been accessed for a long time Compare against your retention schedules Get rid of the ones that are obviously past their use by date © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Trivial: • • • • Identify documents that have no valuable content System Files, Crash Dumps, Thumbnails etc. Assess on the basis of file types Get rid of the obviously trivial ones
  • 17. Use Advanced Content Analytics to Extract Meaning Develop an understanding of the business context of your dark data Clustering • • Visualize common content patterns in your dark data Identify groupings for policy development and application Trained Categories • • • Leverage your investment in records management Use known documents to train categories Identify category matches in your dark data Eduction • • Identify sensitive information in documents e.g. Credit Card Numbers, Social Security Numbers etc. Secure documents appropriately 17 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 18. Policy Application and Execution Dealing with the categorized information Defensible Destruction • • • Seek approval from identified owners Provide audit reports on all stages of your decision process (identification, sampling, tagging etc.) Maintain audit logs of deletion process Migration • • • Migrate to records management, archives or secondary storage system according to the business value of the information Migrate metadata and tags if possible Maintain audit logs of the migration process In-Place Management • • • 18 Use a policy engine to enforce future application of the policy you have selected now Quality of information and policy application depends on the capabilities of the system under management Maintain audit trails of any actions applied © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 19. Ongoing Information Governance Keeping everything under control Identify how business processes use and generate information • • Adjust ongoing information governance policies according to business and regulatory requirements Cover both structured and unstructured information Keep indexes up to date • • • Leverage for enterprise searching Keeps data accessible Allows ongoing categorisation Automate as much as possible: • • • • 19 Implement performance and compliance archives Apply ongoing policies based on indexed categories Auto-capture records Manage records in-place © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 20. Summary Information Governance is an ongoing business Leverage the investment in Legacy Data Cleanup for ongoing Information Governance – Don’t let new information get dark! 20 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 21. Stages of Legacy Data Cleanup Design structure 1. Identify and Index 21 2. Analyse 3. Organize 4. Reduce © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 5. Manage/Migrate
  • 22. Identify and Index Getting started Software Deployment • Legacy data cleanup volume licensing • Packaged deployment tool now includes Exchange Connector Repository registration • Repositories are automatically registered based on IDOL databases • File system and SharePoint repositories can be added and configured for indexing through ControlPoint UI Indexing • Different levels of indexing are available • Preconfigured eduction task to find personally identifiable information 22 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 23. Identify and Index 23 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 24. Analyse Understanding what is there Visualise the statistics compiled by the analytics as a summary report: • Based on file level metadata and hashes: – Redundant data: statistics on duplicates – Trivial data: based on file types with no content value (e.g *.exe, system files, thumbnails etc) – Obsolete data: based on date created, modified, accessed • Based on advanced content analysis: – Category matches – Personally identifiable information (eduction) Provide detail graphs and linked document grid for: • • • • 24 Cluster visualisation Duplicates Analytical data: By size, type, age, user, categories and custom fields Applied Tags © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 25. Analyse 25 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 26. Analyse 26 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 27. Organise Preparing for policy assignment Supporting a structured approach consisting of: • • • • Filtering – to combine main selection criteria with other facets Sampling – to randomly select fixed size or percentage samples Document inspection – to view properties, advanced properties or native content Tagging – to group the documents into actionable categories Assign policies to tagged categories • Use the standard ControlPoint policy phases, including workflow policies that can route the data through an approval process 27 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 28. Organise 28 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 29. Organise 29 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 30. Reduce Cut down on the data volume Provide defensible deletion • Apply deletion and deduplication based on ControlPoint policy • Standard ControlPoint policy review step is available • Use ControlPoint workflow policy actions for extended review processes (requires APA) 30 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 31. Manage/Migrate Taking the step from cleanup to ongoing information governance Merge legacy data into current information governance policies • Declare move, secure move, hold, manage in place through ControlPoint policies • Migration of organised legacy data between repositories(e.g. File System to HP Records Manager SharePoint, Exchange to ACA etc.) • Declare legacy data as records (in place or migration) • Ongoing application of ControlPoint policies to new data identified based on trained categories 31 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 32. Legacy Data Cleanup Summary Legacy Data Inactive Unknown Orphaned Dealing with the past 32 Continuous Information Governance © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 33. Legacy Data Cleanup Summary ControlPoint 4.1 Legacy Data Inactive Unknown Orphaned Dealing with the past 33 Continuous Information Governance © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 34. Case study: auto records classification Defense Contract Management Agency (DCMA) Products: HP TRIM, ControlPoint (5000 users) Use case: • • Working with suppliers to align purchasing of products and services with policies and requirements. Seeking to improve management of SharePoint and file shares; also to improve legal hold programs Why we won: • • • • Made classification and records management transparent to users File share and SharePoint content under strict policy management ControlPoint and ALH for identifying content for legal hold APA to improve program workflows
  • 35. Case study: SharePoint governance Product: ControlPoint Use case: • Uses ControlPoint to lower operating costs of SharePoint by: • Migrating content from SharePoint farms to Autonomy cloud storage • Using ControlPoint to identify and move content from operations to Autonomy cloud Benefit: • Achieved significant cost reductions in SharePoint TCO
  • 36. Case study: Legacy Data Cleanup Product: Control Point 4.0 Use case: • Selected Control Point 4.0 for dark data identification • Initial project is to identify, analyse and transform 100 terabytes - full project to include 2 petabytes • Project sold in conjunction with ES Application Optimisation program • Will identify unstructured content with high business context and records value • Goal is information footprint reduction AND identification of unknown high-risk content
  • 37. HP Application Information Optimizer Mark Gower 31st October 2013 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 38. Application Information Optimizer Addressing the problems of dark structured data Exploding Data Growth Lack of Policy Management Performance Issues Governance and eDiscovery 38 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 39. Classifying Application Data • Define a broad classification of the data in the app database Data by Classification • Eg. Trading Data & Audit information • Identify structure within classifications • Analyse by date quantity of data for each classification • Propose data management policy Other 1% Oracle System 2% Trading Data 22% Audit Data 75% 39 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 40. Managing Applications With Application Information Optimizer • • • Relocate Data to a second datastore Relocate Data to external archive / governance platform Improve Performance & Reduce Risk Reporting/rendering tools Business Application Retired records Inactive Data Primary Datastore 40 HP RM8 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Defensible Disposal
  • 41. Enterprise Structured Data Management HP IT‟s ongoing database archiving strategy powered by HP AIO since November 2009 •Query time reduced by 89% •Storage reduced by 48% •Full backup window reduced by 37% By July 2012 - 122 source databases, 836 db-db jobs, 57+billion rows archived 41 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 42. What do I do with the data I find? • • • Unstructured Data Repositories Structured Data Repositories • • • Archive Protect Dispose Know what information you have HP Records Manager Know where the information is located Autonomy Consolidated Archive Analyse Classify Take action Know your information is secure Additional Active Repositories Know the information is managed appropriately Autonomy ControlPoint HP Application Information Optimizer © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 43. HP Autonomy Records Management Strategy Craig Adams, EMEA Information Governance Manager 31st October 2013 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 44. HP Records Management - Strategy Microsoft SharePoint HP Autonomy Records Manager 44 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 45. HP Records Manager 8.0 HP Records Manager 8.0 • Next generation, scalable electronic document and records management solution • Designed to meet the needs of Government and regulated industry • Combining the best of HP TRIM, ARM & Meridio • Standards Compliant platform • A cornerstone of HP‟s Information Governance framework Transforming Records Management for Information Governance 45 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 46. Transforming records management HP Records Manager use cases supporting information governance Interactive Document Management SharePoint Governance ControlPoint Auto-Declare In-Place Management Unstructured Repositories SAP ArchiveLin k AIO Structured Records COM/.NET SDK Services API HP Records Manager 46 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Physical Records Custom Solutions
  • 47. HP’s Own Records Management Journey © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 48. HP RM Programme - ERMS Purpose ERMS will facilitate and enhance HP‟s compliance activities, because we • Are required by law to manage records • Need to find the right records at the right time • Need to produce records swiftly and cost-effectively for tax and other government audits, regulatory compliance, and legal proceedings • Need to delete records we do not need to keep to reduce storage and litigation production costs • Need to meet our global needs across: • • 16,000 Records Management / Co-Ordinators • 173 countries • Multiple languages & jurisdictions • 48 330,000 employees Stakeholders in Tax, Audit, Legal, IT © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 49. HP RM Programme - ERMS Scope 49 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 50. HP RM Programme - ERMS Schedule FY08 Q4 – FY09 Q1 50 FY09-Q2 Phase I FY09 Q3 FY10 Q1 Phase II FY10 Q3 FY13 Phase III FY11 Q4 FY14 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Beyond Phase III FY14+
  • 51. HP RM Programme - FY13 Registered Records 50,000,000 43,515,280 45,000,000 40,000,000 38,203,252 33,817,366 35,000,000 30,000,000 24,946,475 24,370,349 23,373,470 25,000,000 26,573,487 20,000,000 15,000,000 10,000,000 5,000,000 0 Nov Dec Jan Feb Mar Apr May Jun Details from registered records report. 51 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Jul Aug Sep Oct
  • 52. Hosting your data in the secure HP Cloud Bharat Mistry CTO Office – Strategy Group, HP Enterprise Security Services October 31, 2013 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 53. HP Converged Cloud Hybrid delivery based on common architecture across traditional & all cloud models Choice • Open…standards-based across all delivery models • Heterogeneous…hypervisors, development, infrastructure • Extensible…partner ecosystem Confidence INFORMATION APPLICATIONS INFRASTRUCTURE Traditional Public Cloud Private Cloud 53 • Security…across info, apps, infrastructure, delivery models • Management …end to end • Automation…for cloud based architectures & processes Managed Cloud © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Consistency • Common architecture…across all delivery models • Portability…for flexibility & optimization • Consumption experience…one simple model
  • 54. Security Risks with the Cloud A major concern for the CISO Uncertain ability to enforce provider site security policies Questionable privileged access control at provider site Inadequate training and IT auditing Proximity of your data to someone elses Uncertain ability to recover data Access across an untrusted network Uncertain provider regulatory compliance Uncertain continued existence of provider Uncertain ability to audit provider 0% 5% 10% 15% 20% 25% Source: 2012 Global State of Information Security Survey, PricewaterhouseCoopers, CIO magazine, CSO magazine, September 2011 54 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 30% 35%
  • 55. Cloud Security Challenges Cloud Service Provider Perspective IaaS PaaS SaaS • Increasing security responsibilities at the information, application & user layers • Abstraction and automation of O/S, Network, and Physical layers User Management Application Application Application Platform Application Platform O/S O/S image • PaaS: Heroku, Google App. Engine • SaaS: SalesForce.com 55 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. SaaS PaaS • Examples: • IaaS: HP, Amazon EC2 Application Network IaaS Physical Consumer responsible Provider responsible
  • 56. HP Cloud File Management © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 57. Cloud File Management Secure access, caching, and storage capabilities for your business files File sync and store Online workspaces Data encryption Base Device security SharePoint integration Storage controllers Optional Additional user storage 57 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. File, sync, and share anytime, anywhere , from any device
  • 58. Cloud File Management Secure access, caching, and storage capabilities for your business files. File sync and store Store files in the secure HP cloud and sync automatically to your device when connected. Online workspaces Setup private and public folders in the cloud with password protection. Data encryption Secure data files with 256-bit encryption both in transit and at rest in the cloud. Device security Set up multiple security configurations with flexible access or more secure modes to provide options. SharePoint integration Storage controllers Segregated data storage within the HP cloud and on-premise to meet data governance rules. Additional user storage 58 Allows users to access SharePoint files from within the Cloud File Management environment with read/write document access. Order and configure additional storage in 100 GB blocks, shard across all users. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 59. Cloud File Management Flexible new access across multiple devices Limited mobile access ECS–Mobility Files are shared/stored across systems and devices with restricted access. Files secured in the cloud and synced across devices with flexible access. SharePoint Email 59 Database Server Mobile Desktop Notebook © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 60. File sync and store Store files in the secure HP cloud and sync automatically • Users can store files in a secure cloud • Synchronize data automatically to any device for offline viewing • Includes 5GB of user storage in the HP cloud • Changed files are automatically updated to the cloud and accessible by any PC or mobile device • Files cached on the device are also available for offline viewing 60 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 61. Online workspaces Share files securely in the cloud • Provides private and public folders in the cloud with password protection • Users can set access control rights for uploads and downloads • Reduces email storage requirements by sending secure links to files instead of actual attachments. • Request a file upload from co-workers or third parties by providing a secure link 61 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 62. Data encryption Secure data both in transit and at rest in the cloud • In-transit encryption for file transfers using 256 bit SSL for security • Cloud storage encryption for files uploaded to Cloud File Management servers • File metadata has a unique encryption key, stored separately from the file itself, and encrypted when uploaded • Downloaded files are decrypted before their contents are sent to your browser • On-device encryption is available through the Management Essentials package 62 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 63. Device security Multiple security configurations for file access • Provides flexible options for security administration • Configure a standard mode with flexible access to files • Configure a more secure mode with options like pin locks, file self-destruct, and disabling offline access • Custom configurations are also available 63 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Configuration Management
  • 64. SharePoint integration Additional integration opportunity Users get access to SharePoint files from within Cloud File Management with read and write access to documents stored there. 64 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 65. Storage controllers Create and manage local storage centers • Storage controllers allows administrators to manage on-premise storage centers alongside cloud-based storage • Store select files within the HP converged cloud and/or on-premise to meet data governance rules • Integrate storage controllers with any CIFS-based network share from any storage vendor • Enable mobile access to file shares and document management systems through a single interface 65 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 66. ControlPoint 4.1 Slide Demonstration © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 67. 67 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 68. 68 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 69. 69 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 70. 70 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 71. 71 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 72. 72 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 73. 73 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 74. 74 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 75. 75 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 76. 76 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 77. HP Records Manager 8.0 Slide Demonstration © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 78. 78 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 79. 79 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 80. 80 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 81. 81 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 82. 82 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 83. 83 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 84. 84 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 85. 85 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 86. 86 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 87. 87 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 88. 88 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 89. 89 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 90. 90 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 91. 91 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 92. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Editor's Notes

  1. Get numbers – how many repositories, how many classifications?How much have they reclassifiedWhat brought them to buy more
  2. Transition: AIO – how it works Three highlights:AIO can access inactive data sitting in both production and legacy databases and has a pre-built integrations to a robust selection of repositoriesAn intuitive UI and natural language universal search (not requiring without SQL queries) allows users to identify data to be move and then extract this dataTargeted data can then be migrated to a variety of repositories, including HP Autonomy’s information archiving and ECM offerings. Main Point:AIO presents a clear opportunity to defensibly dispose of legacy data and migrate it to a variety of places for additional analysis and long-term management
  3. Transition: Unless a customer manages this data, their footprint and storage costs will continue to increase Three highlights:AIO solves this issue by reducing the cloned and legacy data stored – as much as 50%This results in lower storage costsMaintenance and administration costs are reduced as well.  Main Point: Reducing footprint and storage costs is a priority among IT departments
  4. The launch of HP Records Manager 8.0 demonstrates HP’s focus on transforming records management and taking it to a new level in order to achieve information governance.Moving records and document management from a departmental issue into the boardroom
  5. The interactive document management is aimed at highly regulated processes under the constant scrutiny of regulators, the media or the public, for which you need to be able to provide quick and accurate evidence of all the actions that you have taken at any stage. These documents are managed in the context of the corporate records management policies right from creation.HP Records Manager’s out of the box integration captures SharePoint information based on life cycle management policies, without impacting the users in their day to day information sharing and collaboration.For unstructured data in legacy data stores or data archives, the HP Information Governance solution provides data analysis and auto-categorization through ControlPoint to automatically identify business records and migrate them to HP Records Manager, or manage them as records in place. The categorization rules applied to the legacy data can be carried forward for the ongoing auto-declaration of new records to get your repositories into an evergreen state of information governance.For legal and professional services firms that want to take advantage of the client/matter based project collaboration that WorkSite provides, HP Records Manager provides an out of the box integration that allows users to declare records from WorkSite directly into the corporate records management structures.HP Records Manager readily integrates with existing business systems to capture records from structured business processes such as ERP or CRM, order processing, accounting and HR. Whenever records are created they can be captured automatically.HP Records Manager also takes care of your paper records. It has fully featured barcode processing, warehousing and storage vendor integration. Requests placed on boxes in HP Records Manager are automatically processed and transmitted to Iron Mountain.While HP Records Manager covers the majority of enterprise records management use cases, there is always scope for custom processes or integration into customer specific processes. HP Records Managers software development kit allow you or your system integrator of choice to write tailor made records and document solutions. Naturally our own services teams are happy to get involved with this as well.