SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Can Your Desktop Backup Do This?

                     Compliance, Continuity & Control in the Cloud



Billy Cripe, VP Marketing
Scott Wilson, VP Sales
Chuck Walters, Sales Engineer                          June 12, 2012

                                                       Digitiliti Confidential
Digitiliti Overview

• Based in St. Paul, MN

• 4 patents filed on core intellectual property

• Target Market is the Global 5000
   – Organizations of 100+ people
   – Regulated industries (healthcare, biotech, financial, legal)


• Digitiliti Today
   – Over 1000 customers – Unstructured Active Backup &
     Sharing + Structured Online Backup
                                                      Digitiliti Confidential
AGENDA




         • Challenges

         • Continuity, Compliance & Control

         • Competition

         • Complex Enterprise


                                Digitiliti Confidential
Content Challenges in the Enterprise
   90% -     amount of unstructured Information
    in the enterprise

   25% -   amount of unique business content

   80% - amount of content stored,
    unmanaged, on users’ laptops, desktops,
    mobile devices

   85% - typical amount of inactive                     content

   10 - hours per week employees spend
    searching & re-creating information

   $15,000 – cost* per knowledge worker per
    year in time spent searching & recreating
    existing information

   $1,000 – cost to restore data lost on a
    users laptop
                   Sources: IDC, Gartner, Outsell, EMC             Digitiliti Confidential
AGENDA




         • Challenges

         • Continuity, Compliance & Control

         • Competition

         • Complex Enterprise


                                Digitiliti Confidential
The Problem

Compliance                                  Continuity                                              Control
An organization should be able to     An organization must store and back-     Most organizations have very little
monitor, manage and effectively        up this content yet they typically do knowledge or control over the digital
locate these pieces of content within not know the what is in the files they        content within their network,
their network.                          are backing up, if they are backing     especially on individual desktops,
                                        them up at all (and most are not).             laptops or mobile devices.

                                      Traditional content management tools
                                       are intrusive to end users and force
                                         change in how they work – thus
                                                      failing.




                                                                                           Digitiliti Confidential
The Digitilti Solution
Compliance                                   Continuity                                          Control
True content management, archiving      Manages 100% of an organization's
and backup in the Cloud.                    unstructured content with one               Reduces the total cost of
                                         affordable and easy to use Software-               ownership > 50% of
GARP Compliant                               as-a-Service (SaaS) solution.                 competing systems.

Proactive Discovery, Recovery &      Delivers enterprise-scale functionality and           Reduces the costs of
Reporting                                    product reliability effectively to        maintaining multiple data
                                           enterprise networks of 50 to 50,000            management devices.
                                                          users.
                                                                                   Reduces time spent managing
                                                                                       data search, recover and
                                                                                                         store.




                                                                                          Digitiliti Confidential
AGENDA




         • Challenges

         • Continuity, Compliance & Control

         • Competition

         • Complex Enterprise


                                Digitiliti Confidential
Digitiliti in the Marketplace




                     Backup Solutions                                           Syncing and Sharing Solutions
                     • Backup only, no active use of                            • No central control or enterprise




                                                           Content Management
Storage Management




                       backed up content                                          integration
                     • No search or discovery across all                        • No GRC features
                       data backed up from all devices                          • Copies of all files in every
                     • Storage costs increase quickly                             location, no de-duplication
                     • No sharing or collaboration                              • Limited in terms of # files
                     • Backup and restore to same                                 managed
                       location only                                            • No true backup and disaster
                     • E-Mail archiving not included or                           recovery in the cloud
                       even available                                           • NOT automated, NOT invisible
                     • Cannot transition data from one                            to end-users, NOT IT managed
                       user to another                                            or supported



                                                                                                  Digitiliti Confidential
Digitiliti in the Marketplace

                                       digiLIBE 3.5
                     Backup Solutions                                         Syncing and Sharing Solutions
                     • All content is active and                              • Enterprise integration through
                       available at anytime, from any                           Active Directory or LDAP




                                                         Content Management
Storage Management




                       device                                                 • GRC features - Records
                     • Search and e-discovery across                            management, data loss
                       all data from all devices                                prevention
                     • No additional costs for storage                        • De-duplication at all levels, files
                     • Content can be restored or                               only moved when needed
                       used from any device, not just                         • Scales to billions of files
                       original device                                        • Backup and disaster recovery in
                     • E-Mail archiving is a core                               the cloud – with no additional
                       feature                                                  costs
                     • Content can be re-assigned to                          • Completely automated, invisible
                       other users                                              to end-users if need be



                                                                                                 Digitiliti Confidential
AGENDA




         • Challenges

         • Continuity, Compliance & Control

         • Competition

         • Complex Enterprise


                                Digitiliti Confidential
The Complex Enterprise
Online sharing or
Syncing solution
                                                Online/Cloud Backup
                                                                                           Virtual
                                                                                           Tape Library
                    Lap / Desktop


                                                 De-dupe
                                                 Appliance
                                                                                                    Offsite
                     File Servers                                                                   Tape/Disk
                                                                              Courier



                                    Backup                                           Tape
                     Storage                   Encryption    Tape
                                    Server                                           Archive
                     Appliances                              Library




                       e-mail       E-mail    Document        Index
                       Server       Archive   Management      Appliance



                                                                          Digitiliti Confidential
The Complex Enterprise
Online sharing or
DropBox,
Syncing solution
                                             Carbonite, Mozy,
                                             CrashplanOnline/Cloud Backup         Iron Mountain,
Box.net,
                                                                                         Virtual
SkyDrive,                                                                         other Tape Library
Google Drive        Lap / Desktop                                                 traditional off-
                                                                                  site archive
                                             De-duplication                       and storage
                                                      De-dupe
                                             vendors Appliance                    vendors
                                                                                                           Offsite
                     File Servers                                                                          Tape/Disk
                                    Traditional Backup solutions:                    Courier
                                    CommVault, HP, NetApp, Backup
                                    Exec, etc.
                                        Backup                                              Tape
                     Storage                          Encryption    Tape
                                        Server                                              Archive
                     Appliances                                     Library

                                    Barracuda,      MS,            Google,
                                    McAfee,         Oracle,        MS, HP
                       e-mail       Symantec,
                                         E-mail     EMC,
                                                     Document        Index
                       Server       etc. Archive    IBM
                                                     Management      Appliance



                                                                                 Digitiliti Confidential
It Is Time To Change…
   From multiple piecemeal solutions        To one solution that delivers on its
                                              promise

   From hope-based sharing & saving         To “frictionless” information
    strategies                                management with automated &
                                              validated sharing & saving

   From plug the holes & fill the gaps      To proactive management that makes
                                              information serve you




                                                                   Digitiliti Confidential
The Digitiliti Enterprise
 Client                    Cache                          Cloud




                                                      Existing on premise or
                     Information Director            off-site storage capacity



 Content created          All Unstructured Data Managed, Controlled,
or recalled by any       Backed-Up, Archived and Accessible 100% of
 network device        the time from any device, anywhere in the Cloud

                                                             Digitiliti Confidential
Intelligent Active Archiving In The Cloud


        Storage Management                                                   Information Management
 From Point-of-origin to final disposition                                   From the hard drive to archive



    Continuous Data Protection                                              Human Based (IP)
    Global De-duplication (IP)                                              Data Security
                                                           Information
    Content Indexing                                        Director        Content Search
    Complete Metadata                                                       Virtual File & Email Explorer
     Capture                                                                 File Sharing
    Compliance Policies (IP)                                                File Revision Control
    Encryption & Compression                                                Content Keyword Alert (IP)
    Automated Tiered Storage (IP)                                           Data Governance
    Active Archiving                                                        Workflow Management
                                                  Active Archive
                                             Information Repository

    Simple, Universal, Provides Protection, Assures Compliance
    4 Patents pending

                                                                                         Digitiliti Confidential
End User Experience

 digiLIBE Components

     digiLIBE Agent
     digiLIBE Explorer
     digiLIBE Client

 Typical Use Cases

     Adding content
     Browsing archived content
     Recovering deleted content – without admin/support help
     Searching for content




                                                                Digitiliti Confidential
End User – Key Points
    Simple install – could be part of client image
    Auto-updating – no user involvement required
    Simple client config – by user or by admin/policy
    Targeted ingestion – intended includes and excludes
    Email automatically captured – governed by policy
    No user experience impact during content ingestion
         No extra burden means 100% user adoption
    Integrates with Windows Explorer
    Very little end user training needed
    Very easy and intuitive file recovery – no admin needed
    Version number and age governed by policy
                                                      Digitiliti Confidential
Administrator Experience
  digiLIBE Components

       digiLIBE Web & Mobile Interface
       digiLIBE Explorer
       digiLIBE Client

  Typical Use Cases

       Enterprise Management
       Audit & Compliance
       eDiscovery
       Information Recovery




                                          Digitiliti Confidential
Administrator – Key Points
    Single Point of Control – enterprise performance
    File System Consolidation – cost savings & efficiency
    Compliance Reporting – proactive alerting & audit reports
    Continuity – Instant managed or self-service recovery




                                                    Digitiliti Confidential
The Digitiliti Value
     Network Storage Reduction
         Limit primary storage and archive the rest

     Disaster Recovery Solution
         Archive net shares and end user files

     Lost File Recovery
         End user self-service search and recover

     Lost/Stolen/Damaged Hard Drive Recovery
         Replace drive with standard build and recover archived files

     Email Archiving
         Limit primary storage and archive the rest

     eDiscovery
         Fast, easy search across files (local and shares) and email



                                                                         Digitiliti Confidential
DOWNLOAD & SCHEDULE TODAY
Continuity, Compliance & Control Guides
   www.digitiliti.com/download


Request a Demo: info@digitiliti.com

Cloud Solutions from SaaS to Private




                                       Digitiliti Confidential
Engage
FB: facebook.com/digitiliti | Twitter: @digilibe | Web: www.digitiliti.com



                                  Contact
              Email: info@digitiliti.com | Phone: +1 888.292. 3396



                                                                     Digitiliti Confidential

Weitere ähnliche Inhalte

Was ist angesagt?

Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Private Cloud
 
WICSA 2012 tutorial
WICSA 2012 tutorialWICSA 2012 tutorial
WICSA 2012 tutorialLen Bass
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldApperian
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateNovell
 
Zenith Infotech Mirror Cloud Presentation. 112211
Zenith Infotech    Mirror Cloud Presentation. 112211Zenith Infotech    Mirror Cloud Presentation. 112211
Zenith Infotech Mirror Cloud Presentation. 112211hdmchughgmailcom
 
Smith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition OverviewSmith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition Overviewdfeldbaum
 
Symantec Appliances Strategy Launch
Symantec Appliances Strategy LaunchSymantec Appliances Strategy Launch
Symantec Appliances Strategy LaunchSymantec
 
Data Center Efficiency and Security - Access, Control and Remote Management M...
Data Center Efficiency and Security - Access, Control and Remote Management M...Data Center Efficiency and Security - Access, Control and Remote Management M...
Data Center Efficiency and Security - Access, Control and Remote Management M...tsilber
 
Manage Engine - Real-time it for the new speed of business
Manage Engine - Real-time it for the new speed of businessManage Engine - Real-time it for the new speed of business
Manage Engine - Real-time it for the new speed of businessGlobal Business Events
 
Teamspace - virtual office management
Teamspace - virtual office managementTeamspace - virtual office management
Teamspace - virtual office managementMohammed Abdul Hafez
 
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudIDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudNovell
 
Bcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidisBcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidiszakmackraken
 
BSM201.pdf
BSM201.pdfBSM201.pdf
BSM201.pdfNovell
 
Customer Success - A Government Security Agency
Customer Success - A Government Security AgencyCustomer Success - A Government Security Agency
Customer Success - A Government Security AgencyBloombase
 
Well Managed Systems - Endpoint Management and Mobility
Well Managed Systems - Endpoint Management and MobilityWell Managed Systems - Endpoint Management and Mobility
Well Managed Systems - Endpoint Management and MobilitySymantec APJ
 
Yorktel Capabilities Briefing 2012
Yorktel Capabilities Briefing  2012Yorktel Capabilities Briefing  2012
Yorktel Capabilities Briefing 2012RolandNC1
 

Was ist angesagt? (20)

Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution Presentation
 
WICSA 2012 tutorial
WICSA 2012 tutorialWICSA 2012 tutorial
WICSA 2012 tutorial
 
Avante Brochure
Avante BrochureAvante Brochure
Avante Brochure
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM World
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 
Zenith Infotech Mirror Cloud Presentation. 112211
Zenith Infotech    Mirror Cloud Presentation. 112211Zenith Infotech    Mirror Cloud Presentation. 112211
Zenith Infotech Mirror Cloud Presentation. 112211
 
Smith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition OverviewSmith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition Overview
 
Symantec Appliances Strategy Launch
Symantec Appliances Strategy LaunchSymantec Appliances Strategy Launch
Symantec Appliances Strategy Launch
 
Data Center Efficiency and Security - Access, Control and Remote Management M...
Data Center Efficiency and Security - Access, Control and Remote Management M...Data Center Efficiency and Security - Access, Control and Remote Management M...
Data Center Efficiency and Security - Access, Control and Remote Management M...
 
Manage Engine - Real-time it for the new speed of business
Manage Engine - Real-time it for the new speed of businessManage Engine - Real-time it for the new speed of business
Manage Engine - Real-time it for the new speed of business
 
Manage engine it360
Manage engine it360Manage engine it360
Manage engine it360
 
Lots of tools keep stuff safe: The Swiss Army knife approach to digital stewa...
Lots of tools keep stuff safe: The Swiss Army knife approach to digital stewa...Lots of tools keep stuff safe: The Swiss Army knife approach to digital stewa...
Lots of tools keep stuff safe: The Swiss Army knife approach to digital stewa...
 
Teamspace - virtual office management
Teamspace - virtual office managementTeamspace - virtual office management
Teamspace - virtual office management
 
Succor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackupSuccor's MyMedCloud& MyMedBackup
Succor's MyMedCloud& MyMedBackup
 
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudIDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The Cloud
 
Bcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidisBcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidis
 
BSM201.pdf
BSM201.pdfBSM201.pdf
BSM201.pdf
 
Customer Success - A Government Security Agency
Customer Success - A Government Security AgencyCustomer Success - A Government Security Agency
Customer Success - A Government Security Agency
 
Well Managed Systems - Endpoint Management and Mobility
Well Managed Systems - Endpoint Management and MobilityWell Managed Systems - Endpoint Management and Mobility
Well Managed Systems - Endpoint Management and Mobility
 
Yorktel Capabilities Briefing 2012
Yorktel Capabilities Briefing  2012Yorktel Capabilities Briefing  2012
Yorktel Capabilities Briefing 2012
 

Andere mochten auch

BloomThink - The Social Media Shift - Tech Talk
BloomThink - The Social Media Shift - Tech TalkBloomThink - The Social Media Shift - Tech Talk
BloomThink - The Social Media Shift - Tech TalkBilly Cripe
 
Mobility in the Enterprise
Mobility in the EnterpriseMobility in the Enterprise
Mobility in the EnterpriseBilly Cripe
 
If e20 is the shiznit why are we still using email slide share
If e20 is the shiznit why are we still using email slide shareIf e20 is the shiznit why are we still using email slide share
If e20 is the shiznit why are we still using email slide shareBilly Cripe
 
QR Codes: Hyperlinks for Meatspace
QR Codes: Hyperlinks for MeatspaceQR Codes: Hyperlinks for Meatspace
QR Codes: Hyperlinks for MeatspaceBilly Cripe
 
Christiania Parent Circle - Understanding How Kids Communicate social media
Christiania Parent Circle - Understanding How Kids Communicate social mediaChristiania Parent Circle - Understanding How Kids Communicate social media
Christiania Parent Circle - Understanding How Kids Communicate social mediaBilly Cripe
 
Collaborate2010 buzz fishbowl_solutions
Collaborate2010 buzz fishbowl_solutionsCollaborate2010 buzz fishbowl_solutions
Collaborate2010 buzz fishbowl_solutionsBilly Cripe
 
Saying Hello To The World
Saying Hello To The WorldSaying Hello To The World
Saying Hello To The WorldBilly Cripe
 

Andere mochten auch (8)

BloomThink - The Social Media Shift - Tech Talk
BloomThink - The Social Media Shift - Tech TalkBloomThink - The Social Media Shift - Tech Talk
BloomThink - The Social Media Shift - Tech Talk
 
Mobility in the Enterprise
Mobility in the EnterpriseMobility in the Enterprise
Mobility in the Enterprise
 
If e20 is the shiznit why are we still using email slide share
If e20 is the shiznit why are we still using email slide shareIf e20 is the shiznit why are we still using email slide share
If e20 is the shiznit why are we still using email slide share
 
Bible Tech 2008
Bible Tech 2008Bible Tech 2008
Bible Tech 2008
 
QR Codes: Hyperlinks for Meatspace
QR Codes: Hyperlinks for MeatspaceQR Codes: Hyperlinks for Meatspace
QR Codes: Hyperlinks for Meatspace
 
Christiania Parent Circle - Understanding How Kids Communicate social media
Christiania Parent Circle - Understanding How Kids Communicate social mediaChristiania Parent Circle - Understanding How Kids Communicate social media
Christiania Parent Circle - Understanding How Kids Communicate social media
 
Collaborate2010 buzz fishbowl_solutions
Collaborate2010 buzz fishbowl_solutionsCollaborate2010 buzz fishbowl_solutions
Collaborate2010 buzz fishbowl_solutions
 
Saying Hello To The World
Saying Hello To The WorldSaying Hello To The World
Saying Hello To The World
 

Ähnlich wie Desktop Backup Solution Offers Compliance, Continuity and Control

Digitiliti launches enhanced DigiLIBE
Digitiliti launches enhanced DigiLIBEDigitiliti launches enhanced DigiLIBE
Digitiliti launches enhanced DigiLIBEwadeswanson
 
DSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYDSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYAndris Soroka
 
INCONTRI AL CINEMA - HUS VM: la nuova piattaforma unificata di Hitachi Data...
 INCONTRI AL CINEMA - HUS VM: la nuova piattaforma unificata di Hitachi Data... INCONTRI AL CINEMA - HUS VM: la nuova piattaforma unificata di Hitachi Data...
INCONTRI AL CINEMA - HUS VM: la nuova piattaforma unificata di Hitachi Data...Mauden SpA
 
AxonShare - A Collaborative Content Management Solution for Knowledge Sharing
AxonShare - A Collaborative Content Management Solution for Knowledge SharingAxonShare - A Collaborative Content Management Solution for Knowledge Sharing
AxonShare - A Collaborative Content Management Solution for Knowledge SharingInfoAxon Technologies Limited
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationProofpoint
 
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...Proact Netherlands B.V.
 
EV9 & NBU5000
EV9 & NBU5000EV9 & NBU5000
EV9 & NBU5000Symantec
 
WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012Warpcare
 
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...InSync2011
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODProofpoint
 
Introduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data ServicesIntroduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data ServicesEduardo Castro
 
Condolidate your content and save with oracle web center
Condolidate your content and save with oracle web centerCondolidate your content and save with oracle web center
Condolidate your content and save with oracle web centerOracleWebCenterContent
 
Kreeo - collaborate for knowledge (Kreeo)
Kreeo - collaborate for knowledge (Kreeo)Kreeo - collaborate for knowledge (Kreeo)
Kreeo - collaborate for knowledge (Kreeo)ProductNation/iSPIRT
 
Congress 2012: Enterprise Cloud Adoption – an Evolution from Infrastructure ...
Congress 2012:  Enterprise Cloud Adoption – an Evolution from Infrastructure ...Congress 2012:  Enterprise Cloud Adoption – an Evolution from Infrastructure ...
Congress 2012: Enterprise Cloud Adoption – an Evolution from Infrastructure ...eurocloud
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraORACLE USER GROUP ESTONIA
 
Advanced Law Enforcement Investigation Platform
Advanced Law Enforcement Investigation PlatformAdvanced Law Enforcement Investigation Platform
Advanced Law Enforcement Investigation Platformdeppster
 
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell
 
Managing Equipment with Visual Asset Manager
Managing Equipment with Visual Asset ManagerManaging Equipment with Visual Asset Manager
Managing Equipment with Visual Asset Managerebeser
 

Ähnlich wie Desktop Backup Solution Offers Compliance, Continuity and Control (20)

Digitiliti launches enhanced DigiLIBE
Digitiliti launches enhanced DigiLIBEDigitiliti launches enhanced DigiLIBE
Digitiliti launches enhanced DigiLIBE
 
DSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYDSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFY
 
INCONTRI AL CINEMA - HUS VM: la nuova piattaforma unificata di Hitachi Data...
 INCONTRI AL CINEMA - HUS VM: la nuova piattaforma unificata di Hitachi Data... INCONTRI AL CINEMA - HUS VM: la nuova piattaforma unificata di Hitachi Data...
INCONTRI AL CINEMA - HUS VM: la nuova piattaforma unificata di Hitachi Data...
 
AxonShare Intro
AxonShare IntroAxonShare Intro
AxonShare Intro
 
AxonShare - A Collaborative Content Management Solution for Knowledge Sharing
AxonShare - A Collaborative Content Management Solution for Knowledge SharingAxonShare - A Collaborative Content Management Solution for Knowledge Sharing
AxonShare - A Collaborative Content Management Solution for Knowledge Sharing
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion Presentation
 
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
 
EV9 & NBU5000
EV9 & NBU5000EV9 & NBU5000
EV9 & NBU5000
 
WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012
 
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYOD
 
Introduccion M D S
Introduccion M D SIntroduccion M D S
Introduccion M D S
 
Introduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data ServicesIntroduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data Services
 
Condolidate your content and save with oracle web center
Condolidate your content and save with oracle web centerCondolidate your content and save with oracle web center
Condolidate your content and save with oracle web center
 
Kreeo - collaborate for knowledge (Kreeo)
Kreeo - collaborate for knowledge (Kreeo)Kreeo - collaborate for knowledge (Kreeo)
Kreeo - collaborate for knowledge (Kreeo)
 
Congress 2012: Enterprise Cloud Adoption – an Evolution from Infrastructure ...
Congress 2012:  Enterprise Cloud Adoption – an Evolution from Infrastructure ...Congress 2012:  Enterprise Cloud Adoption – an Evolution from Infrastructure ...
Congress 2012: Enterprise Cloud Adoption – an Evolution from Infrastructure ...
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
Advanced Law Enforcement Investigation Platform
Advanced Law Enforcement Investigation PlatformAdvanced Law Enforcement Investigation Platform
Advanced Law Enforcement Investigation Platform
 
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
 
Managing Equipment with Visual Asset Manager
Managing Equipment with Visual Asset ManagerManaging Equipment with Visual Asset Manager
Managing Equipment with Visual Asset Manager
 

Mehr von Billy Cripe

The Rise of the Free Agent Workforce
The Rise of the Free Agent WorkforceThe Rise of the Free Agent Workforce
The Rise of the Free Agent WorkforceBilly Cripe
 
Telling Your Story To A Disrupting Marketplace
Telling Your Story To A Disrupting MarketplaceTelling Your Story To A Disrupting Marketplace
Telling Your Story To A Disrupting MarketplaceBilly Cripe
 
Exchange Litigation Readiness with Digitiliti
Exchange Litigation Readiness with DigitilitiExchange Litigation Readiness with Digitiliti
Exchange Litigation Readiness with DigitilitiBilly Cripe
 
2 Types of Collaboration
2 Types of Collaboration2 Types of Collaboration
2 Types of CollaborationBilly Cripe
 
Even More Story Starters
Even More Story StartersEven More Story Starters
Even More Story StartersBilly Cripe
 
More Story Starters
More Story StartersMore Story Starters
More Story StartersBilly Cripe
 
Wish You Were Here! Social Consumer Engagement in the Cruise Industry
Wish You Were Here!  Social Consumer Engagement in the Cruise IndustryWish You Were Here!  Social Consumer Engagement in the Cruise Industry
Wish You Were Here! Social Consumer Engagement in the Cruise IndustryBilly Cripe
 
Social SEO and Cross Channel Marketing
Social SEO and Cross Channel MarketingSocial SEO and Cross Channel Marketing
Social SEO and Cross Channel MarketingBilly Cripe
 
Should I Go Mobile? Am I Cool Enough?
Should I Go Mobile?  Am I Cool Enough?Should I Go Mobile?  Am I Cool Enough?
Should I Go Mobile? Am I Cool Enough?Billy Cripe
 
A Maven's Guide To ECM Best Practices
A Maven's Guide To ECM Best PracticesA Maven's Guide To ECM Best Practices
A Maven's Guide To ECM Best PracticesBilly Cripe
 
Digital Archiving with Fishbowl Solutions
Digital Archiving with Fishbowl SolutionsDigital Archiving with Fishbowl Solutions
Digital Archiving with Fishbowl SolutionsBilly Cripe
 
Fishbowl Solutions' Oracle ECM 11g Upgrade, Migration & Solutions
Fishbowl Solutions' Oracle ECM 11g Upgrade,  Migration & SolutionsFishbowl Solutions' Oracle ECM 11g Upgrade,  Migration & Solutions
Fishbowl Solutions' Oracle ECM 11g Upgrade, Migration & SolutionsBilly Cripe
 
Fishbowl Solutions LinkSecurity for Windchill 9.x
Fishbowl Solutions LinkSecurity for Windchill 9.xFishbowl Solutions LinkSecurity for Windchill 9.x
Fishbowl Solutions LinkSecurity for Windchill 9.xBilly Cripe
 
Information architecture for men in kilts slideshare
Information architecture for men in kilts slideshareInformation architecture for men in kilts slideshare
Information architecture for men in kilts slideshareBilly Cripe
 
Enterprise Information Management
Enterprise Information ManagementEnterprise Information Management
Enterprise Information ManagementBilly Cripe
 
How To Become An Oracle ECM Rock Star
How To Become An Oracle ECM Rock StarHow To Become An Oracle ECM Rock Star
How To Become An Oracle ECM Rock StarBilly Cripe
 
Enterprise 2.0 - Fad or Future?
Enterprise 2.0 - Fad or Future?Enterprise 2.0 - Fad or Future?
Enterprise 2.0 - Fad or Future?Billy Cripe
 
Aiim Minnesota Reshaping Your Business With Web 2.0
Aiim Minnesota Reshaping Your Business With Web 2.0Aiim Minnesota Reshaping Your Business With Web 2.0
Aiim Minnesota Reshaping Your Business With Web 2.0Billy Cripe
 

Mehr von Billy Cripe (20)

The Rise of the Free Agent Workforce
The Rise of the Free Agent WorkforceThe Rise of the Free Agent Workforce
The Rise of the Free Agent Workforce
 
Telling Your Story To A Disrupting Marketplace
Telling Your Story To A Disrupting MarketplaceTelling Your Story To A Disrupting Marketplace
Telling Your Story To A Disrupting Marketplace
 
Exchange Litigation Readiness with Digitiliti
Exchange Litigation Readiness with DigitilitiExchange Litigation Readiness with Digitiliti
Exchange Litigation Readiness with Digitiliti
 
2 Types of Collaboration
2 Types of Collaboration2 Types of Collaboration
2 Types of Collaboration
 
Even More Story Starters
Even More Story StartersEven More Story Starters
Even More Story Starters
 
More Story Starters
More Story StartersMore Story Starters
More Story Starters
 
Wish You Were Here! Social Consumer Engagement in the Cruise Industry
Wish You Were Here!  Social Consumer Engagement in the Cruise IndustryWish You Were Here!  Social Consumer Engagement in the Cruise Industry
Wish You Were Here! Social Consumer Engagement in the Cruise Industry
 
Social SEO and Cross Channel Marketing
Social SEO and Cross Channel MarketingSocial SEO and Cross Channel Marketing
Social SEO and Cross Channel Marketing
 
Should I Go Mobile? Am I Cool Enough?
Should I Go Mobile?  Am I Cool Enough?Should I Go Mobile?  Am I Cool Enough?
Should I Go Mobile? Am I Cool Enough?
 
A Maven's Guide To ECM Best Practices
A Maven's Guide To ECM Best PracticesA Maven's Guide To ECM Best Practices
A Maven's Guide To ECM Best Practices
 
Digital Archiving with Fishbowl Solutions
Digital Archiving with Fishbowl SolutionsDigital Archiving with Fishbowl Solutions
Digital Archiving with Fishbowl Solutions
 
Fishbowl Solutions' Oracle ECM 11g Upgrade, Migration & Solutions
Fishbowl Solutions' Oracle ECM 11g Upgrade,  Migration & SolutionsFishbowl Solutions' Oracle ECM 11g Upgrade,  Migration & Solutions
Fishbowl Solutions' Oracle ECM 11g Upgrade, Migration & Solutions
 
Fishbowl Solutions LinkSecurity for Windchill 9.x
Fishbowl Solutions LinkSecurity for Windchill 9.xFishbowl Solutions LinkSecurity for Windchill 9.x
Fishbowl Solutions LinkSecurity for Windchill 9.x
 
Story Starters
Story StartersStory Starters
Story Starters
 
Information architecture for men in kilts slideshare
Information architecture for men in kilts slideshareInformation architecture for men in kilts slideshare
Information architecture for men in kilts slideshare
 
Enterprise Information Management
Enterprise Information ManagementEnterprise Information Management
Enterprise Information Management
 
E20 Evolved
E20 EvolvedE20 Evolved
E20 Evolved
 
How To Become An Oracle ECM Rock Star
How To Become An Oracle ECM Rock StarHow To Become An Oracle ECM Rock Star
How To Become An Oracle ECM Rock Star
 
Enterprise 2.0 - Fad or Future?
Enterprise 2.0 - Fad or Future?Enterprise 2.0 - Fad or Future?
Enterprise 2.0 - Fad or Future?
 
Aiim Minnesota Reshaping Your Business With Web 2.0
Aiim Minnesota Reshaping Your Business With Web 2.0Aiim Minnesota Reshaping Your Business With Web 2.0
Aiim Minnesota Reshaping Your Business With Web 2.0
 

Kürzlich hochgeladen

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 

Kürzlich hochgeladen (20)

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 

Desktop Backup Solution Offers Compliance, Continuity and Control

  • 1. Can Your Desktop Backup Do This? Compliance, Continuity & Control in the Cloud Billy Cripe, VP Marketing Scott Wilson, VP Sales Chuck Walters, Sales Engineer June 12, 2012 Digitiliti Confidential
  • 2. Digitiliti Overview • Based in St. Paul, MN • 4 patents filed on core intellectual property • Target Market is the Global 5000 – Organizations of 100+ people – Regulated industries (healthcare, biotech, financial, legal) • Digitiliti Today – Over 1000 customers – Unstructured Active Backup & Sharing + Structured Online Backup Digitiliti Confidential
  • 3. AGENDA • Challenges • Continuity, Compliance & Control • Competition • Complex Enterprise Digitiliti Confidential
  • 4. Content Challenges in the Enterprise  90% - amount of unstructured Information in the enterprise  25% - amount of unique business content  80% - amount of content stored, unmanaged, on users’ laptops, desktops, mobile devices  85% - typical amount of inactive content  10 - hours per week employees spend searching & re-creating information  $15,000 – cost* per knowledge worker per year in time spent searching & recreating existing information  $1,000 – cost to restore data lost on a users laptop Sources: IDC, Gartner, Outsell, EMC Digitiliti Confidential
  • 5. AGENDA • Challenges • Continuity, Compliance & Control • Competition • Complex Enterprise Digitiliti Confidential
  • 6. The Problem Compliance Continuity Control An organization should be able to An organization must store and back- Most organizations have very little monitor, manage and effectively up this content yet they typically do knowledge or control over the digital locate these pieces of content within not know the what is in the files they content within their network, their network. are backing up, if they are backing especially on individual desktops, them up at all (and most are not). laptops or mobile devices. Traditional content management tools are intrusive to end users and force change in how they work – thus failing. Digitiliti Confidential
  • 7. The Digitilti Solution Compliance Continuity Control True content management, archiving Manages 100% of an organization's and backup in the Cloud. unstructured content with one Reduces the total cost of affordable and easy to use Software- ownership > 50% of GARP Compliant as-a-Service (SaaS) solution. competing systems. Proactive Discovery, Recovery & Delivers enterprise-scale functionality and Reduces the costs of Reporting product reliability effectively to maintaining multiple data enterprise networks of 50 to 50,000 management devices. users. Reduces time spent managing data search, recover and store. Digitiliti Confidential
  • 8. AGENDA • Challenges • Continuity, Compliance & Control • Competition • Complex Enterprise Digitiliti Confidential
  • 9. Digitiliti in the Marketplace Backup Solutions Syncing and Sharing Solutions • Backup only, no active use of • No central control or enterprise Content Management Storage Management backed up content integration • No search or discovery across all • No GRC features data backed up from all devices • Copies of all files in every • Storage costs increase quickly location, no de-duplication • No sharing or collaboration • Limited in terms of # files • Backup and restore to same managed location only • No true backup and disaster • E-Mail archiving not included or recovery in the cloud even available • NOT automated, NOT invisible • Cannot transition data from one to end-users, NOT IT managed user to another or supported Digitiliti Confidential
  • 10. Digitiliti in the Marketplace digiLIBE 3.5 Backup Solutions Syncing and Sharing Solutions • All content is active and • Enterprise integration through available at anytime, from any Active Directory or LDAP Content Management Storage Management device • GRC features - Records • Search and e-discovery across management, data loss all data from all devices prevention • No additional costs for storage • De-duplication at all levels, files • Content can be restored or only moved when needed used from any device, not just • Scales to billions of files original device • Backup and disaster recovery in • E-Mail archiving is a core the cloud – with no additional feature costs • Content can be re-assigned to • Completely automated, invisible other users to end-users if need be Digitiliti Confidential
  • 11. AGENDA • Challenges • Continuity, Compliance & Control • Competition • Complex Enterprise Digitiliti Confidential
  • 12. The Complex Enterprise Online sharing or Syncing solution Online/Cloud Backup Virtual Tape Library Lap / Desktop De-dupe Appliance Offsite File Servers Tape/Disk Courier Backup Tape Storage Encryption Tape Server Archive Appliances Library e-mail E-mail Document Index Server Archive Management Appliance Digitiliti Confidential
  • 13. The Complex Enterprise Online sharing or DropBox, Syncing solution Carbonite, Mozy, CrashplanOnline/Cloud Backup Iron Mountain, Box.net, Virtual SkyDrive, other Tape Library Google Drive Lap / Desktop traditional off- site archive De-duplication and storage De-dupe vendors Appliance vendors Offsite File Servers Tape/Disk Traditional Backup solutions: Courier CommVault, HP, NetApp, Backup Exec, etc. Backup Tape Storage Encryption Tape Server Archive Appliances Library Barracuda, MS, Google, McAfee, Oracle, MS, HP e-mail Symantec, E-mail EMC, Document Index Server etc. Archive IBM Management Appliance Digitiliti Confidential
  • 14. It Is Time To Change…  From multiple piecemeal solutions  To one solution that delivers on its promise  From hope-based sharing & saving  To “frictionless” information strategies management with automated & validated sharing & saving  From plug the holes & fill the gaps  To proactive management that makes information serve you Digitiliti Confidential
  • 15. The Digitiliti Enterprise Client Cache Cloud Existing on premise or Information Director off-site storage capacity Content created All Unstructured Data Managed, Controlled, or recalled by any Backed-Up, Archived and Accessible 100% of network device the time from any device, anywhere in the Cloud Digitiliti Confidential
  • 16. Intelligent Active Archiving In The Cloud Storage Management Information Management From Point-of-origin to final disposition From the hard drive to archive  Continuous Data Protection  Human Based (IP)  Global De-duplication (IP)  Data Security Information  Content Indexing Director  Content Search  Complete Metadata  Virtual File & Email Explorer Capture  File Sharing  Compliance Policies (IP)  File Revision Control  Encryption & Compression  Content Keyword Alert (IP)  Automated Tiered Storage (IP)  Data Governance  Active Archiving  Workflow Management Active Archive Information Repository  Simple, Universal, Provides Protection, Assures Compliance  4 Patents pending Digitiliti Confidential
  • 17. End User Experience  digiLIBE Components  digiLIBE Agent  digiLIBE Explorer  digiLIBE Client  Typical Use Cases  Adding content  Browsing archived content  Recovering deleted content – without admin/support help  Searching for content Digitiliti Confidential
  • 18. End User – Key Points  Simple install – could be part of client image  Auto-updating – no user involvement required  Simple client config – by user or by admin/policy  Targeted ingestion – intended includes and excludes  Email automatically captured – governed by policy  No user experience impact during content ingestion  No extra burden means 100% user adoption  Integrates with Windows Explorer  Very little end user training needed  Very easy and intuitive file recovery – no admin needed  Version number and age governed by policy Digitiliti Confidential
  • 19. Administrator Experience  digiLIBE Components  digiLIBE Web & Mobile Interface  digiLIBE Explorer  digiLIBE Client  Typical Use Cases  Enterprise Management  Audit & Compliance  eDiscovery  Information Recovery Digitiliti Confidential
  • 20. Administrator – Key Points  Single Point of Control – enterprise performance  File System Consolidation – cost savings & efficiency  Compliance Reporting – proactive alerting & audit reports  Continuity – Instant managed or self-service recovery Digitiliti Confidential
  • 21. The Digitiliti Value  Network Storage Reduction  Limit primary storage and archive the rest  Disaster Recovery Solution  Archive net shares and end user files  Lost File Recovery  End user self-service search and recover  Lost/Stolen/Damaged Hard Drive Recovery  Replace drive with standard build and recover archived files  Email Archiving  Limit primary storage and archive the rest  eDiscovery  Fast, easy search across files (local and shares) and email Digitiliti Confidential
  • 22. DOWNLOAD & SCHEDULE TODAY Continuity, Compliance & Control Guides www.digitiliti.com/download Request a Demo: info@digitiliti.com Cloud Solutions from SaaS to Private Digitiliti Confidential
  • 23. Engage FB: facebook.com/digitiliti | Twitter: @digilibe | Web: www.digitiliti.com Contact Email: info@digitiliti.com | Phone: +1 888.292. 3396 Digitiliti Confidential

Hinweis der Redaktion

  1. According to IDC, 40% of fixed data is active or is accessed infrequently. Forrester Research says that 85% of production datais inactive, with 68% having not been accessed in 90 days. So while such data needs to be accessed sometimes,it doesn’t need to be filling up expensive production disk capacity. - Source: Time Value of Data, SGI Whitepaper, 2010 by Floyd ChristoffersonAccording to http://search20.blogspot.com/2007/08/enterprise-search-find-cost-of-not.htmlKnowledge workers spend from 15% to 35% (average 25%) of their time searching for information.- Knowledge workers spend 10-15% of their time in duplicating existing information- Searchers are successful in finding what they seek 50% of the time or less- 40% of corporate users reported that they can not find the information they need to do their jobs on their intranets.- Every employee in a company produces more than 800 megabytes of digital information every year- Not locating and retrieving information has an opportunity cost of more than $$ annually based on industry size.Calculation of cost based on average information worker salary and benefits of $60,000/year 40 hour work weekAdditional research from Oracle which is lower than IDC estimates of lag and drag. - The average worker spends over an hour (61.55 minutes) a week locating documents or files either from e-mail, personal folders or in the company / shared file servers - People waste 74 minutes a week copying, pasting and re-entering the same information into different documentshttps://emeapressoffice.oracle.com/Press-Releases/Oracle-Research-Reveals-Workplace-Technology-is-Hindering-Business-Productivity-and-Collaboration-1497.aspx
  2. The amount of data growth and data proliferation has historically meant that companies are required to deal with multiple point product solutions, multiple data formats/software programs through several independent vendors. This diagrams illustrates the storage industries strategy over the past 20 plus years - see a problem, create a stand alone remedy – so what we have ended up with is a multitude of point product solutions trying to solve the same problem. We like to call this slide the “race to sunrise” solution, e.g. backing everything up before business starts the next day. Today IT is tasked with backing up and storing data that is spread across various laptops, servers, NAS/SAN devices, e-mail servers, etc. and they employ multiple strategies to deal with this. They buy a back-up software/server for data protection, however the data grows between 60-120% per year (IDC), so they employ a data de-duplication strategy to shrink the size. Because they de-dupe at the server level, which can slow the process down, they may put in another server to deal with the overload. What about encryption? It depends on their security, compliance concerns. Then it’s on to a tape drive, but if they still can’t make the back up & store, (race to sunrise), window in time, they may then incorporate a virtual tape library solution. Then they will need to contract someone to take it off site for business continuity reasons. All of this time, the amount of data is still growing and now it is scattered all over the place. So in order to try and gain some control, they will probably start by trying to manage their e-mail server – the most abused appliance in most organizations. Users think this is a file server, which it’s not, so to solve this problem they buy an e-mail archive system…..
  3. And it goes on and on. The point is this that all of these point product solutions address only small pieces of the overall enterprise information management ecosystem. They end up complicating the data management efficiency and throughput and really don’t fix the systemic problem – you’re just putting a band aid on a bullet hole. So what DigiLIBE has done is solve this problem – next slide
  4. Source: redefining backup and recovery: a call to CIOs, via CIO Custom Solutions Group Whitepaper, via http://m.softchoice.com/files/pdf/brands/commvault/Whitepaper_RedefiningBackup&Recovery.pdfThe CIO LinkedIn Market Pulse Survey was conducted among the members of the CIO LinkedIn Forum from February 23, 2011 toMarch 4, 2011, there were 111 respondents. Background image cite:http://www.flickr.com/photos/pagedooley/1856663523/sizes/l/in/photostream/Creative Commons Attribution Some rights reserved by kevindooley
  5. capture, manage, preserve,store and deliver the right information, to the right people, at the right time
  6. eleases/Oracle-Research-Reveals-Workplace-Technology-is-Hindering-Business-Productivity-and-Collaboration-1497.aspx
  7. ss-Releases/Oracle-Research-Reveals-Workplace-Technology-is-Hindering-Business-Productivity-and-Collaboration-1497.aspx
  8. Typical Use CasesView dashboardSet policies (retention, revision, alerts)Locate data from lost hard driveCreate network shareRun eDiscovery searchRecover eDiscovery results
  9. e-Research-Reveals-Workplace-Technology-is-Hindering-Business-Productivity-and-Collaboration-1497.aspx