1© Copyright 2013 EMC Corporation. All rights reserved.
Beware of the Risk Behind
Big Data
Garth Landers
Director, Product...
2© Copyright 2013 EMC Corporation. All rights reserved.
Agenda
• Big Data/Dark Data
• How to get control over Dark Data
• ...
3© Copyright 2013 EMC Corporation. All rights reserved.
Big Data = Structured+Unstructured Data
Structured Information
In ...
4© Copyright 2013 EMC Corporation. All rights reserved.
Functional Areas Where Companies Are Using Big Data
How Companies ...
5© Copyright 2013 EMC Corporation. All rights reserved.
Dark Data?
“Data not being used to get a 360 degree view of the
cu...
6© Copyright 2013 EMC Corporation. All rights reserved.
Big Data Burdens
Big Data Potential
Better insight into business c...
7© Copyright 2013 EMC Corporation. All rights reserved.
Turning Dark Data into Big Data
Big Data is useful…..if you are as...
8© Copyright 2013 EMC Corporation. All rights reserved.
Why Dark Data Proliferates…
Organizations have 6 or
more repositor...
9© Copyright 2013 EMC Corporation. All rights reserved.
"Companies don't need the guy who is
good with a shovel anymore. …...
10© Copyright 2013 EMC Corporation. All rights reserved.© Copyright 2011 EMC Corporation. All rights reserved. 10
HOW DO Y...
11© Copyright 2013 EMC Corporation. All rights reserved.
CATALOG ANALYZE ACT
BIG DATA INTELLIGENCE
CATALOG ANALYZE ACT
IDE...
12© Copyright 2013 EMC Corporation. All rights reserved.
What is Kazeon?
… Actionable Visibility into Data
Email Servers
(...
13© Copyright 2013 EMC Corporation. All rights reserved.
IDENTIFY &
INDEX • Easily target loosely managed content
sources ...
14© Copyright 2013 EMC Corporation. All rights reserved.
Risk Assessment Dashboard
Risk Report
By
Document
Age
Risk Report...
15© Copyright 2013 EMC Corporation. All rights reserved.
ACT
SET ACTION
• Transfer content to EMC
Documentum or secure sto...
16© Copyright 2013 EMC Corporation. All rights reserved.
File Migration – Deduplication Report
43.66% Savings can be obtai...
17© Copyright 2013 EMC Corporation. All rights reserved.
File Share Cleanup Report – Modified Report
Approximately 76% of ...
18© Copyright 2013 EMC Corporation. All rights reserved.
IT Policy Enforcement Example
Cleanup stale data through migratio...
19© Copyright 2013 EMC Corporation. All rights reserved.
Step 3:
Select target location – Tier_2_Storage
Step 3:
Select ta...
20© Copyright 2013 EMC Corporation. All rights reserved.
Kazeon Benefits
• “Drop in” appliance
– No need to setup an infra...
21© Copyright 2013 EMC Corporation. All rights reserved.
ACCEPTABLE
USE VIOLATIONS
DEFENSIBLE
DELETION UNINTENDED
EXPOSURE...
22© Copyright 2013 EMC Corporation. All rights reserved.
DEFENSIBLE DELETION
THE PROBLEM
The process of manually
searching...
23© Copyright 2013 EMC Corporation. All rights reserved.© Copyright 2013 EMC Corporation. All rights reserved. 23
• Reduce...
24© Copyright 2013 EMC Corporation. All rights reserved.
THE PROBLEM
Employees violate acceptable
use policies, storing pe...
25© Copyright 2013 EMC Corporation. All rights reserved.
THE PROBLEM
Important business information
such as trade secrets,...
26© Copyright 2013 EMC Corporation. All rights reserved.
Questions and Answers
To type a question via WebEx, click on the ...
27© Copyright 2013 EMC Corporation. All rights reserved.
Resources
 More Information
– Kazeon File Intelligence:
– http:/...
28© Copyright 2013 EMC Corporation. All rights reserved.
THANK YOU
Beware of the Risk Behind Big Data
Upcoming SlideShare
Loading in …5
×

Beware of the Risk Behind Big Data

398
-1

Published on

During this recorded webcast we’ll show you how to turn big data from a risk to an enterprise asset.

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
398
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
27
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Beware of the Risk Behind Big Data

  1. 1. 1© Copyright 2013 EMC Corporation. All rights reserved. Beware of the Risk Behind Big Data Garth Landers Director, Product Marketing Information Intelligence Group Twitter - @garthlanders
  2. 2. 2© Copyright 2013 EMC Corporation. All rights reserved. Agenda • Big Data/Dark Data • How to get control over Dark Data • Use Cases
  3. 3. 3© Copyright 2013 EMC Corporation. All rights reserved. Big Data = Structured+Unstructured Data Structured Information In Relational Databases Managed & Unmanaged Unstructured Information Internet Of Things Telemetry, Location-Based Information etc. Non-Enterprise Information The Digital Universe Is Growing By 7,600 PB / Day
  4. 4. 4© Copyright 2013 EMC Corporation. All rights reserved. Functional Areas Where Companies Are Using Big Data How Companies Are Using Big Data Analytics McKinsey Global Survey of 1,469 C-level executive respondents at a range of industries and company sizes, “Minding Your Digital Business,” 2012. Customer Intimacy Budgeting & Planning Operations & Supply Chain Customer Service Performance Management New Product Strategy Pricing 0 10 20 30 40 50 49% 39% 37% 33% 30% 28% 21%
  5. 5. 5© Copyright 2013 EMC Corporation. All rights reserved. Dark Data? “Data not being used to get a 360 degree view of the customer” “Dark Data is the bulk of the organization universe”
  6. 6. 6© Copyright 2013 EMC Corporation. All rights reserved. Big Data Burdens Big Data Potential Better insight into business conditions New Products/Services Maximum leverage from IT investment Big Data Challenges Storage Optimization Lack of Visibility Policy Enablement
  7. 7. 7© Copyright 2013 EMC Corporation. All rights reserved. Turning Dark Data into Big Data Big Data is useful…..if you are asking the right questions Context •How old is my data? •What information about customers does it contain? •Who created it/uses it? Value •What can I get rid of? •What do I need to retain based on business value •What does it cost to store this data? •How can I reuse and maximize the value of my Big Data? Location •Is my Big Data in the right place? •How/where will I move my Big Data?
  8. 8. 8© Copyright 2013 EMC Corporation. All rights reserved. Why Dark Data Proliferates… Organizations have 6 or more repositories Organizations have enforced retention policies for paper and electronic AIIM Market Intelligence Report , 2011 Records Management Strategies – Plotting the changes”, AIIM Market Intelligence Report , 2011
  9. 9. 9© Copyright 2013 EMC Corporation. All rights reserved. "Companies don't need the guy who is good with a shovel anymore. … They need a guy who is good with a bulldozer." The Cloud: Battle of the Tech Titans Businessweek March 3, 2011
  10. 10. 10© Copyright 2013 EMC Corporation. All rights reserved.© Copyright 2011 EMC Corporation. All rights reserved. 10 HOW DO YOU GET CONTROL?
  11. 11. 11© Copyright 2013 EMC Corporation. All rights reserved. CATALOG ANALYZE ACT BIG DATA INTELLIGENCE CATALOG ANALYZE ACT IDENTIFY & INDEX CLASSIFY SEARCH REPORT SET ACTION
  12. 12. 12© Copyright 2013 EMC Corporation. All rights reserved. What is Kazeon? … Actionable Visibility into Data Email Servers (Exchange / Domino) File Shares Desktops / Laptops Custom Connectors Documentum Personal Archives (PSTs / NSFs) SharePoint Archives (SourceOne / eVault) Backups (Avamar ) Kazeon Appliance • eDiscovery / FOIA • Kazeon
  13. 13. 13© Copyright 2013 EMC Corporation. All rights reserved. IDENTIFY & INDEX • Easily target loosely managed content sources like SharePoint and file shares for content identification • Powerful indexing options available for identification and retrieval of content • Categorize content based on pre- defined or custom made criteria CATALOG PRODUCTS
  14. 14. 14© Copyright 2013 EMC Corporation. All rights reserved. Risk Assessment Dashboard Risk Report By Document Age Risk Report by Document Location Risk Report By Document Owner Risk Report By Document Type
  15. 15. 15© Copyright 2013 EMC Corporation. All rights reserved. ACT SET ACTION • Transfer content to EMC Documentum or secure storage based on governance requirements • Delete duplicative, stale or unnecessary content reducing storage costs and freeing up primary storage • Create an automated policy- based environment to increase productivity and free up resources PRODUCTS
  16. 16. 16© Copyright 2013 EMC Corporation. All rights reserved. File Migration – Deduplication Report 43.66% Savings can be obtained by leveraging de-duplication hardware for this file system.
  17. 17. 17© Copyright 2013 EMC Corporation. All rights reserved. File Share Cleanup Report – Modified Report Approximately 76% of the total storage scanned has not been modified in the past 180 – 364 days. This data is a candidate for cheaper tier of storage, or for archive.
  18. 18. 18© Copyright 2013 EMC Corporation. All rights reserved. IT Policy Enforcement Example Cleanup stale data through migration to inactive archive Step 1: Select files not accessed in the past 365 days Step 2: Select Action - Move Step 1: Select files not accessed in the past 365 days
  19. 19. 19© Copyright 2013 EMC Corporation. All rights reserved. Step 3: Select target location – Tier_2_Storage Step 3: Select target location (Data Domain) Step 4: Set enforcement schedule IT Policy Enforcement Example (cont.) Cleanup stale data through migration to inactive archive
  20. 20. 20© Copyright 2013 EMC Corporation. All rights reserved. Kazeon Benefits • “Drop in” appliance – No need to setup an infrastructure, drop set and go. • Repeatability – Use it on a continual basis to keep file monitoring in place, reducing costs and risk • Flexibility – Can be applied to file shares, laptops, desktops, MS SharePoint, e-mail or Documentum
  21. 21. 21© Copyright 2013 EMC Corporation. All rights reserved. ACCEPTABLE USE VIOLATIONS DEFENSIBLE DELETION UNINTENDED EXPOSURE SCENARIOS
  22. 22. 22© Copyright 2013 EMC Corporation. All rights reserved. DEFENSIBLE DELETION THE PROBLEM The process of manually searching through vast sums of content, identifying them as records, and processing them does not scale, taking inordinate amounts of time and resources. Organizations do not have the resources to keep up with the huge volumes of content. THE SOLUTION Using EMC Kazeon’s automated indexing and classification, large volumes of business records can be identified and transferred to EMC Documentum to be managed with Documentum Retention Policy Services
  23. 23. 23© Copyright 2013 EMC Corporation. All rights reserved.© Copyright 2013 EMC Corporation. All rights reserved. 23 • Reduced risk of sensitive data being lost or stolen • Reduced risk by locating personally identifiable information spread across 100TB of data in 9 locations • Proactive daily scanning process of new data to assess risk and secure sensitive data Financial Services Provider
  24. 24. 24© Copyright 2013 EMC Corporation. All rights reserved. THE PROBLEM Employees violate acceptable use policies, storing personal and other non work related content on company servers. Content violates HR policy and drives up costs. ACCEPTABLE USE POLICY VIOLATIONS BACK THE SOLUTION Utilize EMC Kazeon to identify content with low business value. Defensibly delete content.
  25. 25. 25© Copyright 2013 EMC Corporation. All rights reserved. THE PROBLEM Important business information such as trade secrets, product plans and customer information located in unsecure or loosely managed environments like file shares and Microsoft SharePoint UNINTENDED EXPOSURE of sensitive info on informal systems BACK THE SOLUTION Utilize EMC Kazeon to identify content with high value, intellectual property, trade secrets, potential risk. Move to EMC Documentum, protect with security, information rights and retention policy management.
  26. 26. 26© Copyright 2013 EMC Corporation. All rights reserved. Questions and Answers To type a question via WebEx, click on the Q&A tab Please select “Ask: All Panelists” to ensure your questions reach us. Thank you!
  27. 27. 27© Copyright 2013 EMC Corporation. All rights reserved. Resources  More Information – Kazeon File Intelligence: – http://www.emc.com/content-management/emc-kazeon- file-intelligence.htm  15 Minute Guides: – Understand and Secure Your Content: http://www.emc.com/collateral/software/15-min- guide/h9774-15min-guide-understand-secure-content- gde.htm
  28. 28. 28© Copyright 2013 EMC Corporation. All rights reserved. THANK YOU
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×