Beware of the Risk Behind Big Data

  • 328 views
Uploaded on

During this recorded webcast we’ll show you how to turn big data from a risk to an enterprise asset. …

During this recorded webcast we’ll show you how to turn big data from a risk to an enterprise asset.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
328
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
27
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. 1© Copyright 2013 EMC Corporation. All rights reserved. Beware of the Risk Behind Big Data Garth Landers Director, Product Marketing Information Intelligence Group Twitter - @garthlanders
  • 2. 2© Copyright 2013 EMC Corporation. All rights reserved. Agenda • Big Data/Dark Data • How to get control over Dark Data • Use Cases
  • 3. 3© Copyright 2013 EMC Corporation. All rights reserved. Big Data = Structured+Unstructured Data Structured Information In Relational Databases Managed & Unmanaged Unstructured Information Internet Of Things Telemetry, Location-Based Information etc. Non-Enterprise Information The Digital Universe Is Growing By 7,600 PB / Day
  • 4. 4© Copyright 2013 EMC Corporation. All rights reserved. Functional Areas Where Companies Are Using Big Data How Companies Are Using Big Data Analytics McKinsey Global Survey of 1,469 C-level executive respondents at a range of industries and company sizes, “Minding Your Digital Business,” 2012. Customer Intimacy Budgeting & Planning Operations & Supply Chain Customer Service Performance Management New Product Strategy Pricing 0 10 20 30 40 50 49% 39% 37% 33% 30% 28% 21%
  • 5. 5© Copyright 2013 EMC Corporation. All rights reserved. Dark Data? “Data not being used to get a 360 degree view of the customer” “Dark Data is the bulk of the organization universe”
  • 6. 6© Copyright 2013 EMC Corporation. All rights reserved. Big Data Burdens Big Data Potential Better insight into business conditions New Products/Services Maximum leverage from IT investment Big Data Challenges Storage Optimization Lack of Visibility Policy Enablement
  • 7. 7© Copyright 2013 EMC Corporation. All rights reserved. Turning Dark Data into Big Data Big Data is useful…..if you are asking the right questions Context •How old is my data? •What information about customers does it contain? •Who created it/uses it? Value •What can I get rid of? •What do I need to retain based on business value •What does it cost to store this data? •How can I reuse and maximize the value of my Big Data? Location •Is my Big Data in the right place? •How/where will I move my Big Data?
  • 8. 8© Copyright 2013 EMC Corporation. All rights reserved. Why Dark Data Proliferates… Organizations have 6 or more repositories Organizations have enforced retention policies for paper and electronic AIIM Market Intelligence Report , 2011 Records Management Strategies – Plotting the changes”, AIIM Market Intelligence Report , 2011
  • 9. 9© Copyright 2013 EMC Corporation. All rights reserved. "Companies don't need the guy who is good with a shovel anymore. … They need a guy who is good with a bulldozer." The Cloud: Battle of the Tech Titans Businessweek March 3, 2011
  • 10. 10© Copyright 2013 EMC Corporation. All rights reserved.© Copyright 2011 EMC Corporation. All rights reserved. 10 HOW DO YOU GET CONTROL?
  • 11. 11© Copyright 2013 EMC Corporation. All rights reserved. CATALOG ANALYZE ACT BIG DATA INTELLIGENCE CATALOG ANALYZE ACT IDENTIFY & INDEX CLASSIFY SEARCH REPORT SET ACTION
  • 12. 12© Copyright 2013 EMC Corporation. All rights reserved. What is Kazeon? … Actionable Visibility into Data Email Servers (Exchange / Domino) File Shares Desktops / Laptops Custom Connectors Documentum Personal Archives (PSTs / NSFs) SharePoint Archives (SourceOne / eVault) Backups (Avamar ) Kazeon Appliance • eDiscovery / FOIA • Kazeon
  • 13. 13© Copyright 2013 EMC Corporation. All rights reserved. IDENTIFY & INDEX • Easily target loosely managed content sources like SharePoint and file shares for content identification • Powerful indexing options available for identification and retrieval of content • Categorize content based on pre- defined or custom made criteria CATALOG PRODUCTS
  • 14. 14© Copyright 2013 EMC Corporation. All rights reserved. Risk Assessment Dashboard Risk Report By Document Age Risk Report by Document Location Risk Report By Document Owner Risk Report By Document Type
  • 15. 15© Copyright 2013 EMC Corporation. All rights reserved. ACT SET ACTION • Transfer content to EMC Documentum or secure storage based on governance requirements • Delete duplicative, stale or unnecessary content reducing storage costs and freeing up primary storage • Create an automated policy- based environment to increase productivity and free up resources PRODUCTS
  • 16. 16© Copyright 2013 EMC Corporation. All rights reserved. File Migration – Deduplication Report 43.66% Savings can be obtained by leveraging de-duplication hardware for this file system.
  • 17. 17© Copyright 2013 EMC Corporation. All rights reserved. File Share Cleanup Report – Modified Report Approximately 76% of the total storage scanned has not been modified in the past 180 – 364 days. This data is a candidate for cheaper tier of storage, or for archive.
  • 18. 18© Copyright 2013 EMC Corporation. All rights reserved. IT Policy Enforcement Example Cleanup stale data through migration to inactive archive Step 1: Select files not accessed in the past 365 days Step 2: Select Action - Move Step 1: Select files not accessed in the past 365 days
  • 19. 19© Copyright 2013 EMC Corporation. All rights reserved. Step 3: Select target location – Tier_2_Storage Step 3: Select target location (Data Domain) Step 4: Set enforcement schedule IT Policy Enforcement Example (cont.) Cleanup stale data through migration to inactive archive
  • 20. 20© Copyright 2013 EMC Corporation. All rights reserved. Kazeon Benefits • “Drop in” appliance – No need to setup an infrastructure, drop set and go. • Repeatability – Use it on a continual basis to keep file monitoring in place, reducing costs and risk • Flexibility – Can be applied to file shares, laptops, desktops, MS SharePoint, e-mail or Documentum
  • 21. 21© Copyright 2013 EMC Corporation. All rights reserved. ACCEPTABLE USE VIOLATIONS DEFENSIBLE DELETION UNINTENDED EXPOSURE SCENARIOS
  • 22. 22© Copyright 2013 EMC Corporation. All rights reserved. DEFENSIBLE DELETION THE PROBLEM The process of manually searching through vast sums of content, identifying them as records, and processing them does not scale, taking inordinate amounts of time and resources. Organizations do not have the resources to keep up with the huge volumes of content. THE SOLUTION Using EMC Kazeon’s automated indexing and classification, large volumes of business records can be identified and transferred to EMC Documentum to be managed with Documentum Retention Policy Services
  • 23. 23© Copyright 2013 EMC Corporation. All rights reserved.© Copyright 2013 EMC Corporation. All rights reserved. 23 • Reduced risk of sensitive data being lost or stolen • Reduced risk by locating personally identifiable information spread across 100TB of data in 9 locations • Proactive daily scanning process of new data to assess risk and secure sensitive data Financial Services Provider
  • 24. 24© Copyright 2013 EMC Corporation. All rights reserved. THE PROBLEM Employees violate acceptable use policies, storing personal and other non work related content on company servers. Content violates HR policy and drives up costs. ACCEPTABLE USE POLICY VIOLATIONS BACK THE SOLUTION Utilize EMC Kazeon to identify content with low business value. Defensibly delete content.
  • 25. 25© Copyright 2013 EMC Corporation. All rights reserved. THE PROBLEM Important business information such as trade secrets, product plans and customer information located in unsecure or loosely managed environments like file shares and Microsoft SharePoint UNINTENDED EXPOSURE of sensitive info on informal systems BACK THE SOLUTION Utilize EMC Kazeon to identify content with high value, intellectual property, trade secrets, potential risk. Move to EMC Documentum, protect with security, information rights and retention policy management.
  • 26. 26© Copyright 2013 EMC Corporation. All rights reserved. Questions and Answers To type a question via WebEx, click on the Q&A tab Please select “Ask: All Panelists” to ensure your questions reach us. Thank you!
  • 27. 27© Copyright 2013 EMC Corporation. All rights reserved. Resources  More Information – Kazeon File Intelligence: – http://www.emc.com/content-management/emc-kazeon- file-intelligence.htm  15 Minute Guides: – Understand and Secure Your Content: http://www.emc.com/collateral/software/15-min- guide/h9774-15min-guide-understand-secure-content- gde.htm
  • 28. 28© Copyright 2013 EMC Corporation. All rights reserved. THANK YOU