Symantec Data Insight
Upcoming SlideShare
Loading in...5
×
 

Symantec Data Insight

on

  • 10,949 views

Symantec Data Insight is a new technology that enables organizations to improve data governance through insights into the ownership and usage of unstructured data, including files such as documents, ...

Symantec Data Insight is a new technology that enables organizations to improve data governance through insights into the ownership and usage of unstructured data, including files such as documents, spreadsheets and emails. Data Insight represents innovation and integration across Symantec’s product portfolio in security and storage, providing organizations a unified approach to data governance. Data Insight is the only integrated technology of its kind to help organizations align their information assets to business goals by simplifying the remediation of exposed critical data and optimizing their storage environment. http://bit.ly/coxHtD

Statistics

Views

Total Views
10,949
Views on SlideShare
10,794
Embed Views
155

Actions

Likes
3
Downloads
250
Comments
0

6 Embeds 155

http://www.slideshare.net 59
http://filestorage.blogspot.com 41
http://blog.ameyms.com 30
http://amey.sakhadeo.com 22
http://filestorage.blogspot.fr 2
http://ameyms.blogspot.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Symantec Data Insight Symantec Data Insight Presentation Transcript

    • Symantec Data Insight March 2, 2010 Symantec Proprietary and Confidential
    • Information Management Challenges Increasingly Unstructured WHO OWNS THE HOW IS THETHE HOW IS DATA PROTECTING THE DATA DATA USED USED DATA • Inadequate metadata • Who has accessed the data • DLP 101 – contain leakage information •over time? information Lack of audit when incident occurs • Who should have access? • What is the data governance • When is the data no longer • Are there gaps in the structure? •needed? the data no longer When is needed? protection or entitlements • Pre-requisite for other • What is the optimal method scheme? business initiatives to store data? Symantec Proprietary and Confidential 2
    • Symantec’s solution: Data Insight Technology Users • Leverages core competencies of security and storage Data Insight • Enables improved governance • File System Monitoring • Infer data ownership based on usage Technology • Utilization (data, user) • Access patterns and logs • Design considerations • Scalability • Performance • Integration Data Symantec Proprietary and Confidential 3
    • Symantec’s Approach: Leverage Technology across the Portfolio Technology & Integration • Data Insight Provides Ownership/Usage intelligence • Data Insight + Data Loss Prevention: Drives sensitive data remediation • Data Insight + Storage Management : Drives reclamation & chargeback • Data Insight + Information Management: Supports archive policy Symantec Proprietary and Confidential 4
    • Symantec Data Loss Prevention DISCOVER MONITOR PROTECT MANAGE Storage Endpoint Network DISCOVER DISCOVER MONITOR PROTECT PROTECT PROTECT Management Platform Symantec Data Loss Prevention Enforce Platform Symantec Proprietary and Confidential 5
    • Discover, Protect, and Insight For Storage DLP, customers are essentially looking to “find it” and “fix it” when it comes to sensitive data. The Customer Process 1 Scan for sensitive data Discover 2 Generate a large list of incidents 3 Identify data or business owner Insight 4 Track usage and permissions 5 Distribute for Authorization Protect 6 Remediate Simplify Remediation, Maximize Risk Reduction Symantec Proprietary and Confidential 6 Symantec Confidential
    • Data Insight and DLP - Key Features • Top 5 Data Users, Readers, Writers Automated Data Owner • Filter service accounts Identification • Aggregation of incidents • Open share identification Data Access • Who has seen the data (data spill) Visualization & History • User investigation Symantec Proprietary and Confidential 7 Symantec Confidential
    • Remediation Today 3 Distribute incidents for remediation 2 Crack Content and Record Incidents 1 Scan and Retrieve Data Targets Symantec Proprietary and Confidential 8
    • Data Owner Identification 3 Who do I contact and how do I remediate? 2 X File Owner = Most active user Crack Content Administrator and Record “Data Owner” Incidents 1 Scan and Retrieve Data Targets Key Benefits: • Identify data owner for remediation and notification • Understand scope of data usage – full file access history • Manage ACL based on actual access history and content intelligence Symantec Proprietary and Confidential 9 Symantec Confidential
    • Data Insight Key Take-Aways • Addresses crucial challenges around securing and managing data • Security / Storage convergence – delivering on the Symantec Veritas promise • Provides an information-centric approach to Data Governance Symantec Proprietary and Confidential 10