SlideShare a Scribd company logo
1 of 34
Download to read offline
Novell File Management Suite
Enhancing Novell Filr
© Novell, Inc. All rights reserved.2
Governing Data - Front and Center
“In short, if you're looking to implement a data governance program, stop looking
for a single, comprehensive solution. It doesn't exist. Instead, build up a portfolio
of solutions, small and large, customizing your approach (and architecture) to
your own organization.” Information Week – Data Governance: No Single Solution. November 2012
A huge percentage of employees have access to information they don’t
need for their roles in the company, thus introducing unnecessary risks in
terms of how that data can either be accidentally or purposely compromised.
© Novell, Inc. All rights reserved.3
Files Matter – Unstructured Data
Relocate
Find
Govern
• 80% unstructured data
• 60% compound annual growth rate
 41% active frequent access
 21% active non-frequent access
 18% inactive obsolete
 19% don’t know: dark data
• What’s on your Network?
Novell File Reporter
© Novell, Inc. All rights reserved.5
Problem:
What is on the Network
“Our new NAS device is already 40 percent full. We
just bought it two months ago!
I need to know what files we’re storing on the
network, who is storing them, how important they are,
if we have a problem with duplicate files, and
anything else I can find out.
And I need to know now.”
© Novell, Inc. All rights reserved.6
Problem:
Rights Knowledge
“I was just notified that an employee is being
investigated for sharing highly sensitive files.
This can affect our standing as a government
contractor.
I have disabled this employee’s account, but I need
to know now exactly what rights he has across the
network.”
© Novell, Inc. All rights reserved.7
Novell® File Reporter - Find
Inventories network file systems and generates reports
detailing the files being stored on your terabytes of
network storage
• What are you storing?
• Who does it belong to?
• How is it being used?
• Where is it?
• Who has access to it?
• How did they gain access to it?
Across the entire line of business
© Novell, Inc. All rights reserved.8
Novell Storage Manager
© Novell, Inc. All rights reserved.10
Problem:
Manual Storage Creation
“The new school year begins next week
and we need to create over 10,000
student and faculty home folders, with
disk quota settings and rights.
This is going to take all week, and I’m not
positive we’re going to get all of these
settings established correctly.”
We need help!”
© Novell, Inc. All rights reserved.11
Problem:
Identity Management Systems and File
Storage
“The identity management system we deployed last
year is adequately managing our users’ access to
applications—but it is not giving them access to files
stored on the network.
Is there a solution that can tie into identity
management systems and grant or revoke access to
network data?”
© Novell, Inc. All rights reserved.12
Novell® Storage Manager - Govern
Automation of the file management processes and complete
lifecycle of user and collaborative network file storage based
on the Identity and role of users in the organization
Event driven policies consistently:
•Provision individual and collaborative storage
•Manage and enforce permissions
•Manage quotas
•Groom files
•Automate transfers and moves
•Migrate data
Works with any identity management system
© Novell, Inc. All rights reserved.13
Novell Storage Manager
Identity-driven File Management
Identity-driven
Storage Provisioning
Create
User
Vault
Files
Deferred
Delete
Delete
Immediate
Automate
Transfers
& Moves
Delete
User
Set / Manage File
Rights & Ownership
Provision
Role Based
Data
Manage
Quota
Manage
Renames
Collaborative
Identity
Management
HR System
Disabled
User Policy
Manage Profile
Attributes
NSM
Reports
Analyse
File
Grooming
NSM
Policies
Novell Dynamic File Services
© Novell, Inc. All rights reserved.15
Problem:
Intelligent File Tiering
“Is there are way I can tier my file system based on
ownership, usage, content, or size and still give my
users access to all their data in on place?”
© Novell, Inc. All rights reserved.16
Problem:
Controlling Data in the Cloud
“How can I utilize cloud storage for file archiving and
maintain the continuity of the files? Particularly the
file owner and last access dates when moving files to
and from cloud storage.”
© Novell, Inc. All rights reserved.17
Novell® Dynamic File Services - Relocate
Tier data between Microsoft network shares based on compliance
needs while giving users access to all their files in one place. Or
use our intelligent policy engine to remove and archive files.
•Merged view between Microsoft network shares
•Maintain metadata and ownership
•Archive data to Microsoft network shares
•Archive data to Amazon S3, Box, CloudMe, or Dropbox
•Control your cloud archive from one console
•Storage vendor agnostic
Built for Microsoft environments
Note: Novell Dynamic File Services is for Windows environments only. We’ve included
similar functionality for Open Enterprise Server in Dynamic Storage Technology (DST).
Work Used to Be…
19 © Novell, Inc. All rights reserved.
Now, Work Can Happen
Anywhere
Some Call This Mobility
© Novell, Inc. All rights reserved.20
Some Call This Mobility
Some Call This Mobility
© Novell, Inc. All rights reserved.21
© Novell, Inc. All rights reserved.22
Novell® Filr
Secure mobile device
access to files
IT remains in control of
what’s shared and how
Users can access home
directories and folders
© Novell, Inc. All rights reserved.23 © Novell, Inc. All rights reserved.23
0
1 Million
2 Million
3 Million
4 Million
5 Million
6 Million
7 Million
8 Million
2005 2006 2007 2008 2009 2010
CORPORATE DATA BREACH
Every year the cost to recover from a
goes higher and higher
© Novell, Inc. All rights reserved.24
File System Chaos
What’s on your File System?
Know exactly what’s available for
access and sharing
Who has access… and to what?
Know what rights users have in
Filr-enabled network areas
Hidden Access
Know what groups users have
rights to
© Novell, Inc. All rights reserved.28
Something to Share
Make sure every user has a
directory to share with Filr
Compliant
Remain in compliance with
organizational policies
Control the chaos
Filr is opening
the door to a
new enterprise
file sharing
experience
File Reporter
Identifies areas
of concern
regarding
rights and data
in the file
system
Storage
Manager
remediates
these concerns
and enforces
policies moving
forward
Demo
© Novell, Inc. All rights reserved.33
We Know the Problem
Novell Storage Manager
Novell File Reporter
Novell Dynamic File Services
Novell File Management Suite
eDirectory
eDirectory
Active Directory
Novell Storage Manager
Novell File Reporter
OES Dynamic Storage Technology
Novell File Management Suite for OES New
801.861.7000 (Worldwide)
800.453.1267 (Toll-free)
Corporate Headquarters
1800 South, Novell Place
Provo, Utah 84606
Join us on:
www.novell.com
© Novell, Inc. All rights reserved.34
This document could include technical inaccuracies or typographical errors.
Changes are periodically made to the information herein. These changes
may be incorporated in new editions of this document. Novell, Inc. may
make improvements in or changes to the software described in this
document at any time.
Copyright © 2012 Novell, Inc. All rights reserved.
All Novell marks referenced in this presentation are trademarks or registered
trademarks of Novell, Inc. in the United States. All third-party trademarks are the
property of their respective owners.

More Related Content

What's hot

Harvard university i tv3.2
Harvard university i tv3.2Harvard university i tv3.2
Harvard university i tv3.2
kevin_donovan
 
GWAVACon 2013: Novell Keynote - Dave Wilkes
GWAVACon 2013: Novell Keynote - Dave WilkesGWAVACon 2013: Novell Keynote - Dave Wilkes
GWAVACon 2013: Novell Keynote - Dave Wilkes
GWAVA
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Mahmuda Rahman
 

What's hot (20)

Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responses
 
Harvard university i tv3.2
Harvard university i tv3.2Harvard university i tv3.2
Harvard university i tv3.2
 
cloud abstract
cloud abstractcloud abstract
cloud abstract
 
Cl104
Cl104Cl104
Cl104
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User Information
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
 
GWAVACon 2013: Novell Keynote - Dave Wilkes
GWAVACon 2013: Novell Keynote - Dave WilkesGWAVACon 2013: Novell Keynote - Dave Wilkes
GWAVACon 2013: Novell Keynote - Dave Wilkes
 
federal reserve.
federal reserve.federal reserve.
federal reserve.
 
Security in cloud (and grid) computing Overview
Security in cloud  (and grid) computing OverviewSecurity in cloud  (and grid) computing Overview
Security in cloud (and grid) computing Overview
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
 
Oruta
OrutaOruta
Oruta
 
The Enterprise File Fabric for Google Cloud Platform
The Enterprise File Fabric for Google Cloud PlatformThe Enterprise File Fabric for Google Cloud Platform
The Enterprise File Fabric for Google Cloud Platform
 
DirectShare by Cloudtenna
DirectShare by CloudtennaDirectShare by Cloudtenna
DirectShare by Cloudtenna
 
Supporting Research through "Desktop as a Service" models of e-infrastructure...
Supporting Research through "Desktop as a Service" models of e-infrastructure...Supporting Research through "Desktop as a Service" models of e-infrastructure...
Supporting Research through "Desktop as a Service" models of e-infrastructure...
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
 
2013 bio it world
2013 bio it world2013 bio it world
2013 bio it world
 
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution BriefThe Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
 
EMC Storage Redefine FILE
EMC Storage Redefine FILEEMC Storage Redefine FILE
EMC Storage Redefine FILE
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
An introduction of cloud storage
An introduction of cloud storage An introduction of cloud storage
An introduction of cloud storage
 

Viewers also liked (8)

GWAVACon - SEP sesam Backup: we care about your data (deutsch)
GWAVACon - SEP sesam Backup: we care about your data (deutsch)GWAVACon - SEP sesam Backup: we care about your data (deutsch)
GWAVACon - SEP sesam Backup: we care about your data (deutsch)
 
This is why you should come to gwava con
This is why you should come to gwava conThis is why you should come to gwava con
This is why you should come to gwava con
 
GWAVACon 2015: Microsoft MVP - Ist die Cloud wirklich sicher?
GWAVACon 2015: Microsoft MVP - Ist die Cloud wirklich sicher?GWAVACon 2015: Microsoft MVP - Ist die Cloud wirklich sicher?
GWAVACon 2015: Microsoft MVP - Ist die Cloud wirklich sicher?
 
GWAVACon - SEP Sesam Backup: We care about your data (English)
GWAVACon - SEP Sesam Backup: We care about your data (English)GWAVACon - SEP Sesam Backup: We care about your data (English)
GWAVACon - SEP Sesam Backup: We care about your data (English)
 
GWAVACon 2013: Keynote SEP - Hubert Schweinesbein
GWAVACon 2013: Keynote SEP - Hubert SchweinesbeinGWAVACon 2013: Keynote SEP - Hubert Schweinesbein
GWAVACon 2013: Keynote SEP - Hubert Schweinesbein
 
GWAVACon - Secure and managed file transfer (English)
GWAVACon - Secure and managed file transfer (English)GWAVACon - Secure and managed file transfer (English)
GWAVACon - Secure and managed file transfer (English)
 
GWAVACon - Office 365 OverviewThis tray got something for everybody!
GWAVACon - Office 365 OverviewThis tray got something for everybody!GWAVACon - Office 365 OverviewThis tray got something for everybody!
GWAVACon - Office 365 OverviewThis tray got something for everybody!
 
Open Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor DeutschOpen Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor Deutsch
 

Similar to GWAVACon 2013: Novell File Management Suite Enhancing Novell Filr

Similar to GWAVACon 2013: Novell File Management Suite Enhancing Novell Filr (20)

GWAVACon - Files Matters (English)
GWAVACon - Files Matters (English)GWAVACon - Files Matters (English)
GWAVACon - Files Matters (English)
 
Cl107
Cl107Cl107
Cl107
 
GWAVACon 2015: Micro Focus - Novell File Reporter
GWAVACon 2015: Micro Focus - Novell File ReporterGWAVACon 2015: Micro Focus - Novell File Reporter
GWAVACon 2015: Micro Focus - Novell File Reporter
 
Novell File Management Suite Use Cases
Novell File Management Suite Use CasesNovell File Management Suite Use Cases
Novell File Management Suite Use Cases
 
Novell File Management Suite Use Cases
Novell File Management Suite Use CasesNovell File Management Suite Use Cases
Novell File Management Suite Use Cases
 
FILR Demo
FILR DemoFILR Demo
FILR Demo
 
Files matter-fms
Files matter-fmsFiles matter-fms
Files matter-fms
 
Database Systems
Database SystemsDatabase Systems
Database Systems
 
Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
 
INT 1010 07-2.pdf
INT 1010 07-2.pdfINT 1010 07-2.pdf
INT 1010 07-2.pdf
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systems
 
Big Data
Big DataBig Data
Big Data
 
Current trends in dbms
Current trends in dbmsCurrent trends in dbms
Current trends in dbms
 
Data Analytics: HDFS with Big Data : Issues and Application
Data Analytics:  HDFS  with  Big Data :  Issues and ApplicationData Analytics:  HDFS  with  Big Data :  Issues and Application
Data Analytics: HDFS with Big Data : Issues and Application
 
Database Systems
Database SystemsDatabase Systems
Database Systems
 
Complete dbms notes
Complete dbms notesComplete dbms notes
Complete dbms notes
 
Data Base Management Systems
Data Base Management SystemsData Base Management Systems
Data Base Management Systems
 
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
 
The Journey to Data Mesh with Confluent
The Journey to Data Mesh with ConfluentThe Journey to Data Mesh with Confluent
The Journey to Data Mesh with Confluent
 

More from GWAVA

RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
GWAVA
 
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines AnwendersRetain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
GWAVA
 

More from GWAVA (20)

Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen
 
Open Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit RunOpen Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit Run
 
Open Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor EnglishOpen Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor English
 
Micro Focus iPrint
Micro Focus iPrintMicro Focus iPrint
Micro Focus iPrint
 
GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1
 
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
 
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application VirtualizationDesktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
 
Open Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows worldOpen Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows world
 
ZENworks 2017 - Overview
ZENworks 2017 - OverviewZENworks 2017 - Overview
ZENworks 2017 - Overview
 
Vibe Custom Development
Vibe Custom DevelopmentVibe Custom Development
Vibe Custom Development
 
Third Party Client Access to GroupWise
Third Party Client Access to GroupWiseThird Party Client Access to GroupWise
Third Party Client Access to GroupWise
 
Gwava Cloud Offering
Gwava Cloud OfferingGwava Cloud Offering
Gwava Cloud Offering
 
Let’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and FeaturesLet’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and Features
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Exchange 2016 Cloud Migration
Exchange 2016 Cloud MigrationExchange 2016 Cloud Migration
Exchange 2016 Cloud Migration
 
Large Scale GWAVA 7
Large Scale GWAVA 7Large Scale GWAVA 7
Large Scale GWAVA 7
 
GWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYINGGWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYING
 
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
 
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines AnwendersRetain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
 
Mobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with RetainMobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with Retain
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 

GWAVACon 2013: Novell File Management Suite Enhancing Novell Filr

  • 1. Novell File Management Suite Enhancing Novell Filr
  • 2. © Novell, Inc. All rights reserved.2 Governing Data - Front and Center “In short, if you're looking to implement a data governance program, stop looking for a single, comprehensive solution. It doesn't exist. Instead, build up a portfolio of solutions, small and large, customizing your approach (and architecture) to your own organization.” Information Week – Data Governance: No Single Solution. November 2012 A huge percentage of employees have access to information they don’t need for their roles in the company, thus introducing unnecessary risks in terms of how that data can either be accidentally or purposely compromised.
  • 3. © Novell, Inc. All rights reserved.3 Files Matter – Unstructured Data Relocate Find Govern • 80% unstructured data • 60% compound annual growth rate  41% active frequent access  21% active non-frequent access  18% inactive obsolete  19% don’t know: dark data • What’s on your Network?
  • 5. © Novell, Inc. All rights reserved.5 Problem: What is on the Network “Our new NAS device is already 40 percent full. We just bought it two months ago! I need to know what files we’re storing on the network, who is storing them, how important they are, if we have a problem with duplicate files, and anything else I can find out. And I need to know now.”
  • 6. © Novell, Inc. All rights reserved.6 Problem: Rights Knowledge “I was just notified that an employee is being investigated for sharing highly sensitive files. This can affect our standing as a government contractor. I have disabled this employee’s account, but I need to know now exactly what rights he has across the network.”
  • 7. © Novell, Inc. All rights reserved.7 Novell® File Reporter - Find Inventories network file systems and generates reports detailing the files being stored on your terabytes of network storage • What are you storing? • Who does it belong to? • How is it being used? • Where is it? • Who has access to it? • How did they gain access to it? Across the entire line of business
  • 8. © Novell, Inc. All rights reserved.8
  • 10. © Novell, Inc. All rights reserved.10 Problem: Manual Storage Creation “The new school year begins next week and we need to create over 10,000 student and faculty home folders, with disk quota settings and rights. This is going to take all week, and I’m not positive we’re going to get all of these settings established correctly.” We need help!”
  • 11. © Novell, Inc. All rights reserved.11 Problem: Identity Management Systems and File Storage “The identity management system we deployed last year is adequately managing our users’ access to applications—but it is not giving them access to files stored on the network. Is there a solution that can tie into identity management systems and grant or revoke access to network data?”
  • 12. © Novell, Inc. All rights reserved.12 Novell® Storage Manager - Govern Automation of the file management processes and complete lifecycle of user and collaborative network file storage based on the Identity and role of users in the organization Event driven policies consistently: •Provision individual and collaborative storage •Manage and enforce permissions •Manage quotas •Groom files •Automate transfers and moves •Migrate data Works with any identity management system
  • 13. © Novell, Inc. All rights reserved.13 Novell Storage Manager Identity-driven File Management Identity-driven Storage Provisioning Create User Vault Files Deferred Delete Delete Immediate Automate Transfers & Moves Delete User Set / Manage File Rights & Ownership Provision Role Based Data Manage Quota Manage Renames Collaborative Identity Management HR System Disabled User Policy Manage Profile Attributes NSM Reports Analyse File Grooming NSM Policies
  • 15. © Novell, Inc. All rights reserved.15 Problem: Intelligent File Tiering “Is there are way I can tier my file system based on ownership, usage, content, or size and still give my users access to all their data in on place?”
  • 16. © Novell, Inc. All rights reserved.16 Problem: Controlling Data in the Cloud “How can I utilize cloud storage for file archiving and maintain the continuity of the files? Particularly the file owner and last access dates when moving files to and from cloud storage.”
  • 17. © Novell, Inc. All rights reserved.17 Novell® Dynamic File Services - Relocate Tier data between Microsoft network shares based on compliance needs while giving users access to all their files in one place. Or use our intelligent policy engine to remove and archive files. •Merged view between Microsoft network shares •Maintain metadata and ownership •Archive data to Microsoft network shares •Archive data to Amazon S3, Box, CloudMe, or Dropbox •Control your cloud archive from one console •Storage vendor agnostic Built for Microsoft environments Note: Novell Dynamic File Services is for Windows environments only. We’ve included similar functionality for Open Enterprise Server in Dynamic Storage Technology (DST).
  • 18. Work Used to Be…
  • 19. 19 © Novell, Inc. All rights reserved. Now, Work Can Happen Anywhere
  • 20. Some Call This Mobility © Novell, Inc. All rights reserved.20 Some Call This Mobility
  • 21. Some Call This Mobility © Novell, Inc. All rights reserved.21
  • 22. © Novell, Inc. All rights reserved.22 Novell® Filr Secure mobile device access to files IT remains in control of what’s shared and how Users can access home directories and folders
  • 23. © Novell, Inc. All rights reserved.23 © Novell, Inc. All rights reserved.23 0 1 Million 2 Million 3 Million 4 Million 5 Million 6 Million 7 Million 8 Million 2005 2006 2007 2008 2009 2010 CORPORATE DATA BREACH Every year the cost to recover from a goes higher and higher
  • 24. © Novell, Inc. All rights reserved.24 File System Chaos
  • 25. What’s on your File System? Know exactly what’s available for access and sharing
  • 26. Who has access… and to what? Know what rights users have in Filr-enabled network areas
  • 27. Hidden Access Know what groups users have rights to
  • 28. © Novell, Inc. All rights reserved.28 Something to Share Make sure every user has a directory to share with Filr
  • 29. Compliant Remain in compliance with organizational policies
  • 30. Control the chaos Filr is opening the door to a new enterprise file sharing experience File Reporter Identifies areas of concern regarding rights and data in the file system Storage Manager remediates these concerns and enforces policies moving forward
  • 31. Demo
  • 32. © Novell, Inc. All rights reserved.33 We Know the Problem Novell Storage Manager Novell File Reporter Novell Dynamic File Services Novell File Management Suite eDirectory eDirectory Active Directory Novell Storage Manager Novell File Reporter OES Dynamic Storage Technology Novell File Management Suite for OES New
  • 33. 801.861.7000 (Worldwide) 800.453.1267 (Toll-free) Corporate Headquarters 1800 South, Novell Place Provo, Utah 84606 Join us on: www.novell.com © Novell, Inc. All rights reserved.34
  • 34. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. Novell, Inc. may make improvements in or changes to the software described in this document at any time. Copyright © 2012 Novell, Inc. All rights reserved. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States. All third-party trademarks are the property of their respective owners.