Your SlideShare is downloading. ×
110657 emc rick_devenuti_dd9_fina_lb
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

110657 emc rick_devenuti_dd9_fina_lb

381
views

Published on

EMC word

EMC word

Published in: Technology, Business

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
381
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
26
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Slide Objective: To introduce EMC’s family of Information Governance products and clearly state the benefits organizations can expect. To help organizations build an effective information governance strategy that addresses these type of questions, EMC offers the EMC SourceOne family of products to make information governance actionable. It is modular, giving organizations of all sizes “digestible pieces” to start with their most pressing information management challenges – to deliver immediate business benefit – and then expand over time. EMC EMC SourceOne allows proactive, consistent and repeatable management of retention and disposition policies, and as appropriate long term preservation based on the value of the content.With the EMC SourceOne family of products, organizations are able to:Gain visibility into the information stored in their environment, better understand its value and risk as well as the resources its consumingSimplify eDiscovery by bringing an automated, repeatable process in-house to quickly respond to discovery requests, enable early case assessment and greatly reduce downstream discovery costsManage risk by identifying risky content and ensuring that it is managed appropriately and ensuring that information is retained according to internal governance or compliance reasons. And finally,Cut costs by archiving old or inactive content to improve performance of the production environment, speed back up and recovery operations, and reduce storage costs.Let’s talk about each of these in more detail…Do you manage your Electronically Stored Information that may be subject to regulatory compliance or litigation like your financials, with the same rigor?How do you manage the costs, performance, risk and policies related to SharePoint?Can you automate and manage the retention of ESI, given the volume, complexity and scope of records growth? Are you able to meet user expectations and reduce risk despite exploding content growth with limited IT resources?
  • Transcript

    • 1. EMC WORLD 2011 CLOUD MEETS BIG© Copyright 2010 EMC Corporation. All rights reserved. DATA 1
    • 2. Intelligent Information Management for a Big, Cloudy World Rick Devenuti© Copyright 2011 EMC Corporation. All rights reserved. 2
    • 3. The Value of EMC Information Intelligence Group RSA Security INFORMATION Greenplum INFRASTRUCTURE Data Computing PRODUCTS Backup & Recovery Solutions Storage© Copyright 2011 EMC Corporation. All rights reserved. 3
    • 4. WE HELP OUR CUSTOMERS GET MAXIMUM LEVERAGE FROM THEIR INFORMATION© Copyright 2011 EMC Corporation. All rights reserved. 4
    • 5. Our Technology Strategy RETENTION/POLICY CONTENT MANAGEMENT MANAGEMENT CASE E-DISCOVERY MANAGEMENT WEB EXPERIENCE APPS CUSTOMER MANAGEMENT COMMUNICATIONS ON-PREMISE PRIVATE CLOUD MORE INFORMATION LOCATION CONTENT TYPES INDEPENDENCE MOBILE PUBLIC CLOUD PROCESS LIBRARY SERVICES GOVERNANCE SERVICES ANALYTI CS© Copyright 2011 EMC Corporation. All rights reserved. 5
    • 6. Today’s Realities© Copyright 2011 EMC Corporation. All rights reserved. 6
    • 7. This is you.© Copyright 2011 EMC Corporation. All rights reserved. 7
    • 8. 3D Information Growth Contributes to ―BigData‖ PRODUCED AMOUNT RICHNESS DISPERSION INFORMATION© Copyright 2011 EMC Corporation. All rights reserved. 8
    • 9. The EMC Big Data ―Stack‖4 Collaborativ e Act EMC Documentum xCP ?3 Real Time Analyze EMC Greenplum + Hadoop2 Structured & Unstructure d1 Petabyte Scale Store EMC Isilon + Atmos © Copyright 2011 EMC Corporation. All rights reserved. 9
    • 10. The New User Social Computing Usage Surpasses Email Users Self Provision Users Want Control© Copyright 2011 EMC Corporation. All rights reserved. 10
    • 11. Announcement: Alliance with Cisco Quad Enterprise Social Collaboration© Copyright 2011 EMC Corporation. All rights reserved. 11
    • 12. The Social Platform for the Enterprise SOCIAL CONTENT/DOCUMENTS Content Content Profiles Teams Developmen Managemen t t Communitie Networks Portals Intranets s ENTERPRISE SOCIAL BUSINESS PROCESS COLLABORATION COMMUNICATION PLATFORM Business Vertical Voice/Video IM Applications Applications Customer Conferencin Workflow Email Care g© Copyright 2011 EMC Corporation. All rights reserved. 12
    • 13. The Social Platform for the Enterprise SOCIAL CONTENT/DOCUMENTS ENTERPRISE SOCIAL BUSINESS PROCESS COLLABORATION COMMUNICATION PLATFORM© Copyright 2011 EMC Corporation. All rights reserved. 13
    • 14. The New User Social Computing Usage Surpasses Email Users Self Provision Users Want Control© Copyright 2011 EMC Corporation. All rights reserved. 14
    • 15. The Mobile Explosion© Copyright 2011 EMC Corporation. All rights reserved. 15
    • 16. Mobile Demo© Copyright 2011 EMC Corporation. All rights reserved. 16
    • 17. The New User Social Computing Usage Surpasses Email Users Self Provision Users Want Control© Copyright 2011 EMC Corporation. All rights reserved. 17
    • 18. Extended Enterprise Collaboration© Copyright 2011 EMC Corporation. All rights reserved. 18
    • 19. EMC and Box Deliver Content MobilityThrough the Cloud EMC External Documentum Access Firewall Enterprise Content External Sharing Case Management Collaboration Records Management Mobility Business Processes No Infrastructure Compliance© Copyright 2011 EMC Corporation. All rights reserved. 19
    • 20. Sarbanes-Oxley Act (SOX) ~ PCAOB ~ SAS 94 ~ AICPA/CICA Privacy Framework ~ AICPA Suitable Trust Services Criteria ~ SEC Retention of Records, 17 CFR 210.2-06 ~ SEC Controls and Procedures, 17 CFR 240.15d-15 ~SEC Reporting Transactions and Holdings, 17 CFR 240.16a-3 ~ Basel II ~ BIS Sound Practices for the Management and Supervision of Operational Risk ~ Gramm-Leach-Bliley Act (GLB) ~ Standards for Safeguarding CustomerInformation, FTC 16 CFR 314 ~ Privacy of Consumer Financial Information Rule ~ Safety and Soundness Standards, Appendix of 12 CFR 30 ~ FFIEC Information Security ~ FFIEC Development Acquisition ~ FFIEC BusinessContinuity Planning ~ FFIEC Audit ~ FFIEC Management ~ FFIEC Operations ~ NASD ~ NYSE ~ Recordkeeping rule for securities exchanges, SEC 17 CFR 240.17a-1 ~ Records to be made by exchange members, SEC 17 CFR240.17a-3 ~ Records to be preserved by exchange members, SEC 17 CFR 240.17a-4 ~ Recordkeeping, SEC 17 CFR 240.17Ad-6 ~ Record retention, SEC 17 CFR 240.17Ad-7 ~ HIPAA (Health Insurance Portability andAccountability Act) ~ HIPAA HCFA Internet Security Policy ~ NIST Introductory Resource Guide for [HIPAA] (800-66) ~ CMS Core Security Requirements (CSR) ~ CMS Information Security Acceptable Risk Safeguards (ARS) ~ CMSInformation Security Certification & Accreditation (C&A) ~ FDA Electronic Records; Electronic Signatures 21 CFR Part 11+D1 ~ Federal Energy Regulatory Commission (FERC) ~ North American Electric Reliability Council (NERC) ~VISA CISP (Cardholder Information Security Program) ~ Mastercard SDP (Site Data Protection) Program ~ American Express DSS (Data Security Standard) ~ PCI DSS (Payment Card Industry Data Security Standard) ~ FTC ESIGN(Electronic Signatures in Global and National Commerce Act) ~ Uniform Electronic Transactions Act (UETA) ~ FISMA (Federal Information Security Management Act) ~ FISCAM (Federal Information System Controls Audit Manual) ~FIPS Security Requirements for Cryptographic Modules 140-2 ~ FIPS Guideline for the Analysis of LAN Security 191 ~ FIPS Application Profile for GILS 192 ~ Clinger-Cohen Act (Information Technology Management Reform Act) ~National Strategy to Secure Cyberspace ~ GAO Financial Audit Manual ~ DOD ...Standard for Electronic Records Management Software...5015-2 ~ CISWG Report on the Best Practices Subgroup ~ CISWG Information SecurityProgram Elements ~ NCUA Guidelines for Safeguarding Member Information 12 CFR 748 ~ IRS Revenue Procedure: Retention of books and records 97-22 ~ IRS Revenue Procedure: Record retention: automatic data processing…98-25 ~ IRS Internal Revenue Code Section 501(c)(3) ~ Federal Rules of Civil Procedure ~ Uniform Rules of Civil Procedure ~ ISO 15489-1 Information and Documentation: Records management: General ~ ISO 15489-2 Informationand Documentation: Records management: Guidelines ~ DIRKS: A Strategic Approach to Managing Business Information ~ Sedona Principles Addressing Electronic Document Production ~ NIST ...Principles and Practices forSecuring IT Systems 800-14 ~ NIST ...Developing Security Plans for Federal Information Systems 800-18 ~ NIST Security Self-Assessment Guide... 800-26 ~ NIST Risk Management Guide... 800-30 ~ NIST Contingency PlanningGuide... 800-34 ~ NIST ...Patch and Vulnerability Management Program 800-40 ~ NIST Guidelines on Firewalls and Firewall Policy 800-41 ~ NIST Security Controls for Federal Information Systems 800-53 ~ NIST...Mapping...Information and...Systems to Security Categories 800-60 ~ NIST Computer Security Incident Handling Guide 800-61 ~ NIST Security Considerations in...Information System Development 800-64 ~ ISO 73:2002 Riskmanagement -- Vocabulary ~ ISO 1335 Information technology – Guidelines for management of IT Security ~ ISO 17799:2000 Code of Practice for Information Security Management ~ ISO 27001:2005 ...Information SecurityManagement Systems -- Requirements ~ IT Information Library (ITIL) Planning to Implement Service Management ~ IT Information Library (ITIL) ICT Infrastructure Management ~ IT Information Library (ITIL) Service Delivery ~ ITInformation Library (ITIL) Service Support ~ IT Information Library (ITIL) Application Management ~ IT Information Library (ITIL) Security Management ~ COSO Enterprise Risk Management (ERM) Framework ~ CobiT 3rd Edition ~CobiT 4th Edition ~ ISACA IS Standards, Guidelines, and Procedures for Auditing and Control... ~ NFPA 1600 ...Disaster/Emergency Management and Business Continuity... ~ Information Security Forum (ISF) Standard of GoodPractice ~ Information Security Forum (ISF) Security Audit of Networks ~ A Risk Management Standard, jointly issued by AIRMIC, ALARM, and IRM ~ Business Continuity Institute (BCI) Good Practice Guidelines ~ IIA Global REGULATIONS & STANDARDSTechnology Audit Guide - Information Technology Controls ~ ISSA Generally Accepted Information Security Principles (GAISP) ~ CERT Operationally Critical Threat, Asset & Vulnerability Evaluation (OCTAVE) ~ CableCommunications Privacy Act Title 47 § 551 ~ Telemarketing Sales Rule (TSR) amendment 16 CFR 310.4(b)(3)(iv) ~ CAN SPAM Act ~ Childrens Online Privacy Protection Act (COPPA) 16 CFR 312 ~ Childrens Online PrivacyProtection Act (COPPA) 16 CFR 312 ~ Drivers Privacy Protection Act (DPPA) 18 USC 2721 ~ Family Education Rights Privacy Act (FERPA) 20 USC 1232 ~ Privacy Act of 1974 5 USC 552a ~ Telemarketing Sales Rule (TSR) 16 CFR310 ~ Video Privacy Protection Act (VPPA) 18 USC 2710 ~ Specter-Leahy Personal Data Privacy and Security Act ~ AR Personal Information Protection Act SB 1167 ~ AZ Amendment to Arizona Revised Statutes 13-2001 HB 2116 ~CA Information Practice Act SB 1386 ~ CA General Security Standard for Businesses AB 1950 ~ CA Public Records Military Veteran Discharge Documents AB 1798 ~ CA OPP Recommended Practices on Notification of Security INCREASEBreach ~ CO Prohibition against Using Identity Information for Unlawful Purpose HB 1134 ~ CO Consumer Credit Solicitation Protection HB 1274 ~ CO Prohibiting Inclusion of Social Security Number HB 1311 ~ CT RequiringConsumer Credit Bureaus to Offer Security Freezes SB 650 ~ CT Concerning Nondisclosure of Private Tenant Information HB 5184 ~ DE Computer Security Breaches HB 116 ~ FL Personal Identification Information/Unlawful Use HB481 ~ GA Consumer Reporting Agencies SB 230 ~ GA Public employees; Fraud, Waste, and Abuse HB 656 ~ HI Exempting disclosure of Social Security numbers HB 2674 ~ IL Personal Information Protection Act HB 1633 ~ INRelease of Social Security Number, Notice of Security Breach SB 503 ~ LA Database Security Breach Notification Law SB 205 Act 499 ~ ME To Protect Maine Citizens from Identity Theft LD 1671 ~ MN Data Warehouses; NoticeRequired for Certain Disclosures HF 2121 ~ MO HB 957 ~ MT To Implement Individual Privacy and to Prevent Identity Theft HB 732 ~ NJ Identity Theft Prevention Act A4001/S1914 ~ NY A4254, A3492 [no title] ~ NV SB 347 [no title]~ NC Security Breach Notification Law (Identity Theft Protection Act) SB 1048 ~ ND Personal information protection act SB 2251 ~ OH Personal information -- contact if unauthorized access HB 104 ~ RI Security Breach NotificationLaw H 6191 ~ TN Security Breach Notification SB 2220 ~ TX Identity Theft Enforcement and Protection Act SB 122 ~ VT Relating to Identity Theft HB 327 ~ VA Identity theft; penalty; restitution; victim assistance HB 872 ~ WA Noticeof a breach of the security SB 6043 ~ EU Directive on Privacy and Electronic Communications 2002/58/EC ~ EU Directive on Data Protection 95/46/EC ~ US Department of Commerce EU Safe Harbor Privacy Principles ~ ...ConsumerInterests in the Telecommunications Market Act No. 661 ~ Directive On Privacy And Electronic Communications 2002.58.EC ~ OECD Technology Risk Checklist ~ OECD Guidelines on...Privacy and Transborder Flows of PersonalData ~ UN Guidelines for the Regulation of Computerized Personal Data Files (1990) ~ ISACA Cross-border Privacy Impact Assessment ~ The Combined Code on Corporate Governance ~ Turnbull Guidance on Internal Control, UKFRC ~ Smith Guidance on Audit Committees Combined Code, UK FRC ~ UK Data Protection Act of 1998 ~ BS 15000-1 IT Service Management Standard ~ BS 15000-2 IT Service Management Standard - Code of Practice ~ CanadaKeeping the Promise for a Strong Economy Act Bill 198 ~ Canada Personal Information Protection and Electronic Documents Act ~ Canada Privacy Policy and Principles ~ Argentina Personal Data Protection Act ~ Mexico FederalPersonal Data Protection Law ~ Austria Data Protection Act ~ Austria Telecommunications Act ~ Bosnia Law on Protection of Personal Data ~ Czech Republic Personal Data Protection Act ~ Denmark Act on Competitive Conditionsand Consumer Interests ~ Finland Personal Data Protection Act ~ Finland Amendment of the Personal Data Act ~ France Data Protection Act ~ German Federal Data Protection Act ~ Greece Law on Personal Data Protection ~Hungary Protection of Personal Data and Disclosure of Data of Public Interest ~ Iceland Protection of Privacy as regards the Processing of Personal Data ~ Ireland Data Protection Act ~ Ireland Data Protection Amendment 2003 ~Italy Personal Data Protection Code ~ Italy Protection of Individuals with Regard to...Processing of Personal Data ~ Lithuania Law on Legal Protection of Personal Data ~ Luxembourg Data Protection Law ~ Netherlands Personal DataProtection Act ~ Poland Protection of Personal Data Act ~ Slovak Republic Protection of Personal Data in Information Systems ~ Slovenia Personal Data Protection Act ~ South Africa Promotion of Access to Information Act ~ SpainOrganic law on the Protection of Personal Data ~ Sweden Personal Data Act ~ Swiss Federal Act on Data Protection ~ Australian Business Continuity Management Guide ~ Australia Spam Act of 2003 ~ Australia Privacy AmendmentAct ~ Australia Telecommunications Act ~ Australia Spam Act 2003: A Practical Guide for Business ~ Hong Kong Personal Data (Privacy) Ordinance ~ Hong Kong Personal Data (Privacy) Ordinance ~ India Information Privacy Act ~Japan Guidelines for Personal Data Protection in Electronic Commerce, ECOM ~ Japan Handbook Concerning Protection of International Data, MITI ~ Japan Personal Information Protection Act ~ Korea Act on the Promotion ofInformation...Protection ~ Korea Act on the Protection of Personal Information...by Public Agencies ~ Korea Use and. © Copyright 2011 EMC Corporation. All rights reserved. 20
    • 21. Gain Simplify Visibility eDiscovery Making INFORMATION GOVERNANCE Information Governance Manage Cut Risk Costs Actionable© Copyright 2011 EMC Corporation. All rights reserved. 21
    • 22. “WE LITERALLY STARTED THE INSTALL ON AMONDAY AND OUR LEGAL TEAM WAS USING SourceOne Kazeon FOR EDISCOVERY THE FOLLOWING MONDAY.” © Copyright 2011 EMC Corporation. All rights reserved. 22
    • 23. The SharePoint Effect© Copyright 2011 EMC Corporation. All rights reserved. 23
    • 24. SharePoint has seen broad adoption in enterprises, but it brings a number of unaddressed challenges. How is EMC helping customers bridge the gaps to obtain maximum leverage from their information?© Copyright 2011 EMC Corporation. All rights reserved. 24
    • 25. Strong integration with Office Enabled rapid adoption of collaboration technology Easy to deploy No ability to do federated governance Rapid adoption and architecture inhibits operational efficiency Lacks process- based collaboration Does not support high-value content management needs© Copyright 2011 EMC Corporation. All rights reserved. 25
    • 26. STRUCTURE CLIENT FOR INFORMATION HETEROGENEITY COMPREHENSIVE WORKER TASKS INFORMATION MANAGEMENT LOWER OPERATIONAL PLATFORM UNIFIED VIEW AND COST AND COMPLEXITY REQUIRES GOVERNANCE OF INFORMATION© Copyright 2011 EMC Corporation. All rights reserved. 26
    • 27. Client platform Enables comprehensive independence case management STRUCTURE CLIENT FOR INFORMATION HETEROGENEITY WORKER TASKS LOWER OPERATIONAL UNIFIED VIEW AND COST AND COMPLEXITY GOVERNANCE OF INFORMATION Centralized Centralized and federated management and records and policy storage optimization management; content archival© Copyright 2011 EMC Corporation. All rights reserved. 27
    • 28. SHAREPOINT GAPS EMC’s SHAREPOINT SOLUTION FAMILY CHOICE COMPUTING EMC MY DOCUMENTUM EMC DOCUMENTUM EMC SOURCEONE EMC SOURCEONE FOR MICROSOFT SHAREPOINT REPOSITORY SERVICES FOR MICROSOFT SHAREPOINT eDISCOVERY – BUSINESS ADVANCED FOR MICROSOFT SHAREPOINT KAZEON CENTRALIZED PROCESS CONTENT GOVERNANCE MANAGEMENT SUPPORT MANAGEMENT© Copyright 2011 EMC Corporation. All rights reserved. 28
    • 29. Delivering Commitment to Choice© Copyright 2011 EMC Corporation. All rights reserved. 29
    • 30. © Copyright 2011 EMC Corporation. All rights reserved. 30
    • 31. The Journey Is Accelerating© Copyright 2011 EMC Corporation. All rights reserved. 31
    • 32. EMC OnDemand A new enterprise-class hybrid cloud deployment infrastructure managed by EMC experts© Copyright 2011 EMC Corporation. All rights reserved. 32
    • 33. First Set of OnDemand Applications ENTERPRISE CONTENT CUSTOMER CASE INFORMATION CAPTURE MANAGEMENT COMMUNICATIONS MANAGEMENT GOVERNANCE DOCUMENTUM DOCUMENT DOCUMENTUM EMC CAPTIVA SCIENCES XCP SOURCEONE ECM© Copyright 2011 EMC Corporation. All rights reserved. 33
    • 34. VMware Leverage SERVICE MGR OPERATIONS MGR CONFIG MGR CAPACITY IQ HYPERIC CHARGEBACK THINAPP vSHIELD ENDPOINT VIEW MANAGER vSHIELD APPCLOUD DIRECTOR vSHIELD EDGE vSPHERE vCENTER © Copyright 2011 EMC Corporation. All rights reserved. 34
    • 35. OnDemand VCUBE Captiva XPression CenterStage PROD DEV TEST PROD DEV TEST PROD DEV TEST OnDemand VMware Management Stack Data Center© Copyright 2011 EMC Corporation. All rights reserved. 35
    • 36. OnDemand Off-Premise VCUBE Manager OS Services VCUBE ManagementCentral Services Patch Management Monitoring Identity Management OnDemand VMware Management Stack Off-premise Data Center© Copyright 2011 EMC Corporation. All rights reserved. 36
    • 37. OnDemand On-Premise VCUBE Manager OS Services VCUBE ManagementCentral Services Patch Management Monitoring Identity Management OnDemand VMware Management Stack OnDemand Data Center Customer Data Center© Copyright 2011 EMC Corporation. All rights reserved. 37
    • 38. Current process OnDemand process 6 MONTHS 2 HOURS 5 wks Acquire hardware 15 min Login, review and approve work order 2 wks Rack and cable hardware 60 min Monitor provisioning progress 2 wks Install Operating Systems 15 min Sanity test provisioned environment 1 wk Install DBs 30 min Configure secure network to customer site 1 wk Install App Servers 1 wk Install Batch Scheduler 1 wk Install DEV Servers 3 wks Record and test desktop installation 1 wk Push install desktop products to locked down desktops 1 wk Install TEST Servers 2 wks Install PROD Servers 2 wks Configure Backup, Monitoring 3 wks Test PROD fault tolerance, backup, monitoring© Copyright 2011 EMC Corporation. All rights reserved. 38
    • 39. © Copyright 2011 EMC Corporation. All rights reserved. 39
    • 40. From: EMC_OnDemand@emc.com Date: Thursday, April 19, 2011 2:31 PM To: EMC_OnDemand_Administrator@emc.com Subject: New EMC OnDemand subscription order submitted: Concordant Hello EMC OnDemand Administrator, A new order has been submitted for your acceptance. Click the link below to go to the task: https://OnDemand.emc.com/task01234© Copyright 2011 EMC Corporation. All rights reserved. 40
    • 41. Initializing Complete Processing Complete Initializing Processing Initializing Complete Processing Complete Processing Initializing Initializing Complete Processing© Copyright 2011 EMC Corporation. All rights reserved. 41
    • 42. ✔© Copyright 2011 EMC Corporation. All rights reserved. 42
    • 43. From: admin@concordant.com Date: Thursday, April 19, 2011 4:45 PM To: angela@concordant.com Subject: Your EMC Documentum CenterStage account is ready Hello Angela, Your new user account has been created. To access your Content Management portal please click here: EMC Documentum CenterStage. Thank you, Customer IT Dept.© Copyright 2011 EMC Corporation. All rights reserved. 43
    • 44. © Copyright 2011 EMC Corporation. All rights reserved. 44
    • 45. End-to-End Cloud Services Platform Cloud Services IIG Applications STRATEGIC ALLIANCE© Copyright 2011 EMC Corporation. All rights reserved. 45
    • 46. Our Focus© Copyright 2011 EMC Corporation. All rights reserved. 46
    • 47. Four Key Areas Cloud/Big Data Transform The New User Information Governance© Copyright 2011 EMC Corporation. All rights reserved. 47
    • 48. Partner Strategy—Focus on Solutions and ROI• New IIG Partner Program for Solution Partners, Resellers and Services Partners to work with customers• Bring to market new partner SATISFY solutions across all our products— faster and more effectively• Focus on Documentum xCP-based solutions© Copyright 2011 EMC Corporation. All rights reserved. 48
    • 49. Customer Loyalty CUSTOMER EXPERIENCE PRODUCT EASE OF DOING BUSINESS ADDRESS BUSINESS NEEDS• Reliability • Renewal process • Roadmap and vision• Ease of use • Licensing • Communication• Performance/scale • 360° view of customer • Product knowledge• Access to • Out of cycle • Interoperability documentation engagement • ROI• Innovation • Proactiveness© Copyright 2011 EMC Corporation. All rights reserved. 49
    • 50. © Copyright 2011 EMC Corporation. All rights reserved. 50
    • 51. Our Technology Strategy RETENTION/POLICY CONTENT MANAGEMENT MANAGEMENT CASE E-DISCOVERY MANAGEMENT WEB EXPERIENCE APPS CUSTOMER MANAGEMENT COMMUNICATIONS ON-PREMISE PRIVATE CLOUD MORE INFORMATION LOCATION CONTENT TYPES INDEPENDENCE MOBILE PUBLIC CLOUD PROCESS LIBRARY SERVICES GOVERNANCE SERVICES ANALYTI CS© Copyright 2011 EMC Corporation. All rights reserved. 51
    • 52. Bottom Line... We’re focused on your success© Copyright 2011 EMC Corporation. All rights reserved. 52
    • 53. Thank You© Copyright 2011 EMC Corporation. All rights reserved. 53