Your SlideShare is downloading. ×
Symantec Data Insight 3.0
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Symantec Data Insight 3.0


Published on

Symantec Data Insight 3.0 is the latest version of the company’s solution that improves information governance by providing intelligence into ownership and usage of unstructured data such as …

Symantec Data Insight 3.0 is the latest version of the company’s solution that improves information governance by providing intelligence into ownership and usage of unstructured data such as documents, presentations, spreadsheets and emails. Enhancements to Symantec Data Insight help organizations transform storage operations and simplify information governance processes to reduce costs, reduce risk and achieve compliance.

Published in: Technology

  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Symantec Data Insight 3.0 March 2012Symantec Proprietary and Confidential 1
  • 2. Unstructured Information Growth Leads To Challenges“ Datagrowth during the next 5 years most of the growth continues unabated… is unstructured data – the most difficult to manage from a process or tool point of view. - Gartner, December 2011 ” Who Owns the Data? How is the Data Used? Protect the Data • Inadequate metadata • Who has accessed the • Who should have access? information data over time? • Are there gaps in the • Pre-requisite for other • When is the data no protection or entitlements business initiatives longer needed? scheme?Symantec Proprietary and Confidential 2
  • 3. Bridging IT And Business Gap Is The Key To Getting In Control Of Runaway Data Growth 0001010001011 Runaway unstructured data growth 1101101010100 … that the business owner is in the leads to serious challenges for IT… 1110010101011 best position to solve 1001101010010 1011010100001 • Business owners are the true • “I know I have millions of files that 1011001111001 0101010001010 ‘custodians’ have not been used for a long time 0101010100101 – How do we identify them? – what do I do with them?” 1001010100101 – How do we empower them? 0110101010101 • “I know there is sensitive 0101010101011 • How can we enable them with information out there – where is it 0101010110101 – The right reports for visibility and how is it being used?” 0001010001011 1101101010100 – The right recommendations for decision making • “How do I comply with data access 1110010101011 – The right automation to guidelines? I am not sure I am the 1001101010010 1011010100001 simplify remediation right person to make the call…” 1011001111001 0101010001010Symantec Proprietary and Confidential 3
  • 4. Symantec Data Insight Improves Organization’s DataGovernance Users • Data Insight solution – Identifies data owners – Monitors data usage – Tracks audit trail Symantec Data Insight – Reviews permissions – Integrates with Symantec Data Loss Prevention and Veritas File System Monitoring Technology Storage Foundation • Data ownership/usage drives – Data security remediation – Data storage efficiency – Data management policy and Data (File Servers) compliance Microsoft Windows • NetApp DataONTAP • Microsoft SharepointEMC Celerra • UNIX file servers with Veritas Storage Foundation File SystemSymantec Proprietary and Confidential 4
  • 5. What’s New in Data Insight 3.0 Data Custodian Comprehensive Enhanced Scale and Management Coverage Performance• Discover and manage data • Veritas Storage Foundation • Optimized indexing and custodians integration query• Engage custodians • Enhanced NetApp, • Lower TCO considerations automatically SharePoint support • Tuned for very large data• Enable large-scale • Directory services for LDAP, sets and rates automation NIS/NIS+ supportSymantec Proprietary and Confidential 5
  • 6. Applications Of Data Insight Improved Data Achieve Protect Data from Management Compliance Security Risks• Identify stale and orphan • Discover and manage • Remediate sensitive data data and drive cleanup custodians with Symantec Data Loss• Build a consumption based • Automate data access Prevention integration chargeback model reviews • Audit historical access,• Understand usage and • Adhere to data retention monitor sensitive data usage consumption patterns guidelines • Find data at greatest risk of exposure and lockdownSymantec Proprietary and Confidential 6
  • 7. Automate Data Governance1 Identify Folders 2 Assign Custodians 3 Automate Reports 00010100010111101101010100111001010101 11001101010010101101010000110110011110 01010101000101001010101001011001010100 10101101010101010101010101011010101011 01010001010001011110110101010011100101 Symantec Data Insight Case Studies1. Efficiency • Confidently delete , archive or move stale/orphan data while adhering to data retention guidelines2. Regulatory Compliance • Review access permissions and activity to achieve compliance3. Risk Reduction • Review activity and alerts to spot inappropriate use, notify owner that data is exposed, streamline Data Loss Prevention remediationSymantec Proprietary and Confidential 7
  • 8. Data Insight/Storage Foundation integration Users NFS Access Benefits • Data Governance for Unix/Storage Foundation Unix Server with Storage Foundation servers • Data ownership/usage Register Publish classification to guide tiering or scan events and compression Symantec Data Insight CollectorsSymantec Proprietary and Confidential 8
  • 9. Data Insight Key Take-Aways Addresses crucial challenges around securing and managing data Security and storage convergence – delivering on the Symantec/Veritas promise Provides an information-centric approach to data governance Release delivers large-scale automation and enhanced performance across comprehensive data sourcesSymantec Proprietary and Confidential 9
  • 10. Thank you! Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.Symantec Proprietary and Confidential 10