SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
1
Symantec Data Insight 4.0
July 2013
00101010001010100010010010011100100100111001010001010100010101000100100
10011100100100111001010001010100010101000100100100111001001001110010100
01010100010101000100100100111001001001110010100010101000101010001001001
00111001001001110010100010101000101010001001001001110010010011100101000
10101001010100010010010011100100100111001010001010100010101000100100100
11101010100010101000100100100100111001010001010100010101000100100100111
00100100111001010001010100010101000100100100111001001001110010100010110
00100010101000100100101010001010100010101000100100100111001101010100110
Unknowns of unstructured data
Data Insight 4.0
2
Explosive growth
in volume of
information created
Rapid increase
in security risks
and compliance
regulations
Growing urgency
to gain control
of costs and risks
Where is the data stored?
How is the data being used?
What is the value of the data?
What data is out there?
Who owns the data?
Who has access to data?
2
5 steps to better governance
• Understand what information you have
• Know who owns and who uses the information
• Speak to the lines of business
• Remediate
• Apply pro-active policies
Data Insight 4.0 3
4
• Visibility, analysis and monitoring:
– Metadata and Permissions
– Users, Groups and Attributes
– Usage, Ownership Context
– Content (Data Loss Prevention)
• Integrates with Data Loss
Prevention, Archiving, Access
Governance and Storage
Symantec Data Insight improves data governance
Data Insight 4.0 4
Users
Data (File Servers)
File Activity Monitoring Technology
Symantec Data Insight
Microsoft Windows • NetApp DataONTAP • Microsoft Sharepoint
EMC Celerra • UNIX file servers with Veritas File System
• Automate archival of data using Symantec Enterprise Vault
• Framework to implement custom actions
Data Insight 4.0 shines a light on dark data to control
costs and risk
Data Insight 4.0 5
Remediate
• Advanced Analytics and Visualization to secure collaboration and inform
data management
• Query Interface to enable customization and long tail analysis
Analyze
• Interactive Navigation to streamline operations and discover opportunities
• Expanded Coverage: SharePoint 2013, Collection Interface
• Enhanced Context: User Context, Data Loss Prevention Policy
Discover
Data Insight 4.0 6
Applications of Data Insight
Achieve
Compliance
• Audit access to data for
confidentiality and integrity
• Identify data owners;
Automate entitlement
reviews
• Archive for retention with
Enterprise Vault integration
Improve
Data Management
• Discover and clean-up stale
and orphan data
• Streamline operations for
data migration and
remediation projects
• Growth and planning with
data usage patterns
Protect Data from
Security Risks
• Remediate sensitive data
through the integration
with Symantec DLP
• Audit historical access,
monitor sensitive data usage
• Discover open shares and
lockdown
Better File Governance with Data Insight and
Enterprise Vault
• Integrates Data Insight with File System Archiving
• Archive directly from Data Insight
– Cost: Target stale data, specific file types or leavers / departed users
– Compliance: Apply retention based on Ownership and DLP classification
– Discovery: Archive files touched by a custodian as part of litigation
Data Insight 4.0 7
Social Network Analysis enables secure collaboration
• Analyze user activity and collaboration on unstructured data
– Risk: Detect outlier or risky users, Discover excessive access
– Operations: Discover permissions and configuration inconsistencies,
Understand user groups and control points to drive access remediation
Data Insight 4.0 8
Data Insight 4.0 provides actionable intelligence for
unstructured data governance
• Use Data Insight to understand your unstructured ‘dark’ data to
reduce risk, achieve compliance and lower costs
• New Advanced Analytics and Visualization enable secure
collaboration and informed data management
• Integrate with Data Loss Prevention to secure high value data
• Archive with Enterprise Vault for cost-savings and retention
Data Insight 4.0 9
Thank you!
Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Thank you!
10

Weitere ähnliche Inhalte

Was ist angesagt?

Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
Craig Mullins
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
Ulf Mattsson
 

Was ist angesagt? (20)

Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Big data security challenges and recommendations!
Big data security challenges and recommendations!Big data security challenges and recommendations!
Big data security challenges and recommendations!
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat Protection
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Data Virtualization for Accelerated Digital Transformation in Banking and Fin...
Data Virtualization for Accelerated Digital Transformation in Banking and Fin...Data Virtualization for Accelerated Digital Transformation in Banking and Fin...
Data Virtualization for Accelerated Digital Transformation in Banking and Fin...
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data Pribadi
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Mining
 
Big security for big data
Big security for big dataBig security for big data
Big security for big data
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 
Security&Governance
Security&GovernanceSecurity&Governance
Security&Governance
 

Ähnlich wie Symantec Data Insight 4.0 July 2013

TDWI Checklist Report: Active Data Archiving
TDWI Checklist Report:  Active Data ArchivingTDWI Checklist Report:  Active Data Archiving
TDWI Checklist Report: Active Data Archiving
RainStor
 

Ähnlich wie Symantec Data Insight 4.0 July 2013 (20)

PPT-How to Build Your PA on a Strong Data Foundation
PPT-How to Build Your PA on a Strong Data Foundation PPT-How to Build Your PA on a Strong Data Foundation
PPT-How to Build Your PA on a Strong Data Foundation
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data Insight
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Dealing with Dark Data
Dealing with Dark DataDealing with Dark Data
Dealing with Dark Data
 
A Dynamic Data Catalog for Autonomy and Self-Service
A Dynamic Data Catalog for Autonomy and Self-ServiceA Dynamic Data Catalog for Autonomy and Self-Service
A Dynamic Data Catalog for Autonomy and Self-Service
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
TDWI Checklist Report: Active Data Archiving
TDWI Checklist Report:  Active Data ArchivingTDWI Checklist Report:  Active Data Archiving
TDWI Checklist Report: Active Data Archiving
 
BD1.pptx
BD1.pptxBD1.pptx
BD1.pptx
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Harness the power of data
Harness the power of dataHarness the power of data
Harness the power of data
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian BuckleyPreventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
 
Slides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data GovernanceSlides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data Governance
 
Birst Cloud BI Data Sheet
Birst Cloud BI Data SheetBirst Cloud BI Data Sheet
Birst Cloud BI Data Sheet
 

Mehr von Symantec

Mehr von Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Symantec Data Insight 4.0 July 2013

  • 1. 1 Symantec Data Insight 4.0 July 2013
  • 2. 00101010001010100010010010011100100100111001010001010100010101000100100 10011100100100111001010001010100010101000100100100111001001001110010100 01010100010101000100100100111001001001110010100010101000101010001001001 00111001001001110010100010101000101010001001001001110010010011100101000 10101001010100010010010011100100100111001010001010100010101000100100100 11101010100010101000100100100100111001010001010100010101000100100100111 00100100111001010001010100010101000100100100111001001001110010100010110 00100010101000100100101010001010100010101000100100100111001101010100110 Unknowns of unstructured data Data Insight 4.0 2 Explosive growth in volume of information created Rapid increase in security risks and compliance regulations Growing urgency to gain control of costs and risks Where is the data stored? How is the data being used? What is the value of the data? What data is out there? Who owns the data? Who has access to data? 2
  • 3. 5 steps to better governance • Understand what information you have • Know who owns and who uses the information • Speak to the lines of business • Remediate • Apply pro-active policies Data Insight 4.0 3
  • 4. 4 • Visibility, analysis and monitoring: – Metadata and Permissions – Users, Groups and Attributes – Usage, Ownership Context – Content (Data Loss Prevention) • Integrates with Data Loss Prevention, Archiving, Access Governance and Storage Symantec Data Insight improves data governance Data Insight 4.0 4 Users Data (File Servers) File Activity Monitoring Technology Symantec Data Insight Microsoft Windows • NetApp DataONTAP • Microsoft Sharepoint EMC Celerra • UNIX file servers with Veritas File System
  • 5. • Automate archival of data using Symantec Enterprise Vault • Framework to implement custom actions Data Insight 4.0 shines a light on dark data to control costs and risk Data Insight 4.0 5 Remediate • Advanced Analytics and Visualization to secure collaboration and inform data management • Query Interface to enable customization and long tail analysis Analyze • Interactive Navigation to streamline operations and discover opportunities • Expanded Coverage: SharePoint 2013, Collection Interface • Enhanced Context: User Context, Data Loss Prevention Policy Discover
  • 6. Data Insight 4.0 6 Applications of Data Insight Achieve Compliance • Audit access to data for confidentiality and integrity • Identify data owners; Automate entitlement reviews • Archive for retention with Enterprise Vault integration Improve Data Management • Discover and clean-up stale and orphan data • Streamline operations for data migration and remediation projects • Growth and planning with data usage patterns Protect Data from Security Risks • Remediate sensitive data through the integration with Symantec DLP • Audit historical access, monitor sensitive data usage • Discover open shares and lockdown
  • 7. Better File Governance with Data Insight and Enterprise Vault • Integrates Data Insight with File System Archiving • Archive directly from Data Insight – Cost: Target stale data, specific file types or leavers / departed users – Compliance: Apply retention based on Ownership and DLP classification – Discovery: Archive files touched by a custodian as part of litigation Data Insight 4.0 7
  • 8. Social Network Analysis enables secure collaboration • Analyze user activity and collaboration on unstructured data – Risk: Detect outlier or risky users, Discover excessive access – Operations: Discover permissions and configuration inconsistencies, Understand user groups and control points to drive access remediation Data Insight 4.0 8
  • 9. Data Insight 4.0 provides actionable intelligence for unstructured data governance • Use Data Insight to understand your unstructured ‘dark’ data to reduce risk, achieve compliance and lower costs • New Advanced Analytics and Visualization enable secure collaboration and informed data management • Integrate with Data Loss Prevention to secure high value data • Archive with Enterprise Vault for cost-savings and retention Data Insight 4.0 9
  • 10. Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Thank you! 10