Policy-driven control of unstructured desktop information




© 2009 FileTek, Inc. All rights reserved.
 FileTek, Inc. is a premier provider of large-scale data
      management and information governance
      solutions, ena...
 Content proliferation everywhere – on
     workstations, laptops, and file shares
    Difficulty defining and implement...
 The last mile for records
                                              management
                                     ...
quot;No one wants to be the
   next Morgan Stanley.quot;
   George Socha, Jr.




                                        ...
Provides Information Governance
               Where Organizations are Most Vulnerable –
                       at the Net...
 Initiates compliance support
         at record creation, including
         record declaration and
         classificat...
 Assigns retention
                                              categories automatically
                               ...
 Enforces disposition to convenience
                                        copies on desktops, laptop, file
           ...
 Proactively culls irrelevant content
                                             Applies Litigation Hold to the “Edge”...
Gap in the Model:
                                    Internal                  External
                                 ...
Repository X



                                                                               ?
                         ...
Workstations, Laptops
   File Shares

                                                            Policies
               ...
© 2009 FileTek, Inc. All rights reserved.   Slide 14
Problems                           Trusted Edge ICE Solution
    1. Often, many critical files were      1. FinServ archiv...
 Extends centralized, policy-driven document control and
            legal hold management to all enterprise
            ...
Upcoming SlideShare
Loading in …5
×

Trusted Edge - Information Governance

523 views

Published on

This presentation offers a glimpse into how Trusted Edge can Classify Email and Documents at the point of Creation and mitigate risk.

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
523
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
1
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Trusted Edge - Information Governance

  1. 1. Policy-driven control of unstructured desktop information © 2009 FileTek, Inc. All rights reserved.
  2. 2.  FileTek, Inc. is a premier provider of large-scale data management and information governance solutions, enabling organizations, worldwide and across multiple industry segments, to efficiently manage, rapidly access, and effectively govern their ever- growing volume of enterprise data.  Global 2000 customers include the Met Office, The National Archives of the UK, Citigroup, Union Bank of California, Edward Jones and AT&T. © 2009 FileTek, Inc. All rights reserved. Slide 2
  3. 3.  Content proliferation everywhere – on workstations, laptops, and file shares  Difficulty defining and implementing effective records management policies and retention schedules  Escalating cost of data ownership – storage, eDiscovery, and compliance management  User reluctance to adopt records management tools and participate in the process © 2009 FileTek, Inc. All rights reserved. Slide 3
  4. 4.  The last mile for records management  Exponential growth of unstructured content  Problem area for litigation preparedness © 2009 FileTek, Inc. All rights reserved. Slide 4
  5. 5. quot;No one wants to be the next Morgan Stanley.quot; George Socha, Jr. Legal hold notice alone is not reasonable. “There is a NTL, Inc. SEC Lit. (SDNY 2007) perfect storm brewing in the sea of discovery. “ National Law Journal 9/4/08 © 2009 FileTek, Inc. All rights reserved. Slide 5
  6. 6. Provides Information Governance Where Organizations are Most Vulnerable – at the Network’s “Edge” Proactive Retention eDiscovery Compliance Disposition © 2009 FileTek, Inc. All rights reserved. Slide 6
  7. 7.  Initiates compliance support at record creation, including record declaration and classification  Files records automatically in the repository of record  Extends full compliance support to offline users © 2009 FileTek, Inc. All rights reserved. Slide 7
  8. 8.  Assigns retention categories automatically  Maps retention assignments to existing policy schema © 2009 FileTek, Inc. All rights reserved. Slide 8
  9. 9.  Enforces disposition to convenience copies on desktops, laptop, file shares, and secondary repositories  Meets DOD 5015 standards  Mitigates “smoking gun” risk  Automatically suspends disposition during a litigation hold © 2009 FileTek, Inc. All rights reserved. Slide 9
  10. 10.  Proactively culls irrelevant content  Applies Litigation Hold to the “Edge”  Provides asset ID tagging, comprehensive metadata, and reporting  Supports a forensically sound presentation © 2009 FileTek, Inc. All rights reserved. Slide 10
  11. 11. Gap in the Model: Internal External • IT audience • Legal audience Inside firewall Outside firewall • Compliance focus • Production focus • Internal software • External software Trusted Edge helps organizations with: Information Management, Identification, Preservation, and Collection. IT Driven Tools Legal Driven Tools © 2009 FileTek, Inc. All rights reserved. Slide 11
  12. 12. Repository X ? IT Department ? Accounting ?? ?? ? Repository Y Sales & Marketing Where are the convenience copies? Repository Z Who owns them? Human How can they be locked down or Resources deleted according to policy?  Preserves investments in the existing infrastructure Federated  Does not impact end-user processes Storage  Creates a central “repository of record” © 2009 FileTek, Inc. All rights reserved. Slide 12
  13. 13. Workstations, Laptops File Shares Policies 1 Trusted Edge Admin Server 3 and Database Identify Custodian and (MS SQL Server or Execute Legal Hold 4 Oracle 9) Disposition Email Documents ECM Repository 2 Files MS SharePoint Open Text Livelink Documents, Files, E Symantec Enterprise Vault™ mails IBM Content/Records Manager WebDAV and file shares © 2009 FileTek, Inc. All rights reserved. Slide 13
  14. 14. © 2009 FileTek, Inc. All rights reserved. Slide 14
  15. 15. Problems Trusted Edge ICE Solution 1. Often, many critical files were 1. FinServ archived all critical files to never archived to the ECM their proper place in the ECM repository. repository. 2. At the same time, too many 2. By classifying records at creation, FinServ irrelevant files were archived. proactively culled non-relevant data, data, thereby reducing storage and thereby reducing storage and eDiscovery eDiscovery costs. costs. 3. Files created by mobile laptop 3. Trusted Edge captured files created by users working offline were offline mobile users and automatically never uploaded. uploaded them on reconnect. 4. Management felt ill-prepared 4. FinServ mitigated litigation risk and for litigation and eDiscovery. enhanced eDiscovery preparedness. © 2009 FileTek, Inc. All rights reserved. Slide 15
  16. 16.  Extends centralized, policy-driven document control and legal hold management to all enterprise desktops, laptops, and workstations, whether network- connected or offline  Supports a federated storage architecture  Empowers organizations to fulfill their legal obligation to preserve critical content  Proactively classifies, tags, and defines email and document retention at creation  Provides a holistic approach to compliance, retention, disposition, and legal hold  Delivers a cost-correct ROI with a proactive, best practices approach to eDiscovery © 2009 FileTek, Inc. All rights reserved. Slide 16

×