Your SlideShare is downloading. ×
0
Strategic Data Management Presentation
Strategic Data Management Presentation
Strategic Data Management Presentation
Strategic Data Management Presentation
Strategic Data Management Presentation
Strategic Data Management Presentation
Strategic Data Management Presentation
Strategic Data Management Presentation
Strategic Data Management Presentation
Strategic Data Management Presentation
Strategic Data Management Presentation
Strategic Data Management Presentation
Strategic Data Management Presentation
Strategic Data Management Presentation
Strategic Data Management Presentation
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Strategic Data Management Presentation

3,106

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,106
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
79
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Strategic Data Management offers a holistic approach to manage the explosion of information that is the core of your business. We integrate the best of breed solutions from industry leaders that are easy to use, scalable, and cost effective! At SDM we help you deliver the right data to the right people at the right time!
  • 2. SDM’s Holistic Perspective – CIO Level Strategy – Best of Breed Solutions – Information Lifecycle Management – Managed Services – Automation of lifecycle through web services, API, and scripting – Business value • Reduce cost and complexity • Better information better business decision • Better relationship with customer and marketplace
  • 3. Where is the Data Strategy? End User Computing Strategy Network Strategy Application Hosting Strategy
  • 4. Information Lifecycle Management • Information Lifecycle Management (ILM) is a comprehensive paradigm to manage the flow of data and metadata through your company’s systems, from creation and storage to the time when it becomes obsolete and needs to be discarded. – Information must be classified – Information has a lifecycle – The business value of information changes over its lifecycle
  • 5. In the Absence of Data Management • Storage is a junk drawer – as much as 70% of capacity is wasted • After normalizing over 10,000 storage assessments, we find – 30% of the data occupying spindles is useful – 40% is inert (needed for retention, but never accessed) – 15% of capacity is allocated but unused (often “dark storage”) – 10% is orphan data whose owner/server no longer exist – 5% (low estimate) is contraband
  • 6. Storage Management – Performance – Disaster Recovery – N-Tier – Automation of movement – Deduplication – Cleanup
  • 7. Xiotech ISE Technology – Easier to manage – Easier to scale – Reduced complexity – N-tier – Higher reliability and availability – Web services enabled – 5 year warranty Xiotech – #1-SPC IO/PS & MB/PS Intelligent Storage Element per dollar
  • 8. Multi-Vendor Disaster Recovery & Backup Solutions CommVault, Spectra Logic, Double-Take, Hosted – RPO & RTOs – Clustered – Deduplication • Block vs. Byte • Inline vs. Backups – Replication • SAN to SAN • Block vs. Byte • Application • Full server • Disk Volume – Backups • Disk to Disk • Disk to Tape • Hosted
  • 9. Multi-Vendor Deduplication Solutions CommVault, Double-Take, Data Domain – Block level – Byte level – File level – Inline – Backups – Hosted – Green friendly – Saves $$$
  • 10. Credant Enterprise Security Solution – Enterprise View – Central Control – Encryption – Device control • Smart Phone • USB Drives • Laptops • PDA • Memory cards • IPods and mp3s 9000 USB memory sticks left in clothes at dry cleaners 12500 laptops left in New York city cabs $197 per record per breach according to Gartner
  • 11. Compliance versus ediscovery – Archiving & Search • Hosted vs. in-house – Keep data forever vs. destroy data as soon as it is read – Many regulations • Gramm-Leach-Bliley Act of 1999 -- Protects consumer's financial private information • HIPAA -- The Health Insurance Portability and Accountability Act of 1996 • SOX -- The Sarbanes-Oxley Act of 2002 • PCI: Payment Card Industry (PCI) Data security standard • 2006 changes to FRCP (Federal Rules for Civil Procedures) rules • 2006 Indiana law around data breaches
  • 12. Clearview Document Management ̶ SharePoint as engine ̶ Document imaging ̶ User Adoption via the Familiar Microsoft User Experience The Perfect Fit within the IT Infrastructure and the Desktop ̶ Consolidate multiple SharePoint Portals and stacks for enterprise view ̶ Simplify access to unstructured information in disparate systems across the enterprise ̶ Create dynamic, interactive business intelligence (BI) portals enabling people to make better informed decisions by presenting business critical information in one central location ̶ Robust Search
  • 13. Microsoft and Clearview Business Intelligence – Dashboards – Internal snapshot – Customer interaction – Market intelligence – Search – Reports Information should be treated as a strategic asset!
  • 14. Cascade Asset Management Proper destruction of assets ̶ Green friendly ̶ Reuse non-usable assets ̶ Meet compliance & environmental regulations ̶ Tax deduction ̶ Free up space ̶ Clean data assets ̶ Removal of all identification tags
  • 15. Questions & Next Steps? Contact info: info@sdmindy.com www.sdmindy.com 317-219-0428

×