SlideShare a Scribd company logo
1 of 19
Download to read offline
Slide 1 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
MarkLogic for eDiscovery
Petascale search, query and analysis
With defensible deletion
Slide 2 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
eDiscovery/Governance
Market Drivers
§ SEC requirements for brokerages to retain and supervise email, social
media and other electronic communications (UBS)
§ Financial services regulations/risk and compliance (JP Morgan)
§ Security breach privacy laws in the U.S. and Germany that require
customer notification of breach(google)
§ Anti-fraud, anti-bribery and anti-corruption laws in the U.S., U.K.,
Germany
§ Intellectual property mismanagement or misuse
§ Average Data Volumes exploded in the last ten years
2003 was 10Gb to 1Pb (100,000 bigger)
Slide 3 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
Governance Challenges
§ Lack of consistent adherence to policies across all information
assets
§ Volume is exploding and current approaches won’t scale
§ Distilling policies into proactive automated rules and alerts
difficult
§ Current approaches focus on single applications (email) instead
of data
§ Need scale and transaction logging to be defensible!
§ Need a granular security model to put all assets in one solution
§ Data, policy enforcement and learning management should be
integrated
Slide 4 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
Market Opportunity
§ The enterprise e-discovery software market generated $1.4
billion in total software vendor revenue in 2012 (82% of
revenue in US)
§ By 2017 the e-discovery software market will be $2.9B
§ "Nontraditional" e-discovery vendors will continue to
enter this market, creating market expansion through
technology convergence and functionality overlap.
Gartner Dec. 2012
Slide 5 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
Functionality
§ Realtime identification and collection
§ ETL/aggregate and process content
§ Ingest/Index quickly and cost effectively any data
§ Metadata catalog
§ Performance and scale
§ Search
§ Segment/classify/tag
§ Non responsive, privileged or escalate
§ Delete or promote to matter specific solution
§ Threading to speed review of only latest content
§ NLP and entity enrichment
§ Transactional integrity for defensible deletion (log everything)
§ Loose correlation across disparate dimensions
§ Policy management and alerting
§ Learning management and compliance
Slide 6 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
Software and Services
§ Restoration/Identification/Collection
§ MetaData catalog
§ Crack pst’s
§ Fiiltering/Conversion
§ De-dupe
§ De-Nisting
§ Threading
§ Build, train and enforce policies
§ Relate multiple contact info
§ Entity enrichment
§ Concept clustering, predictive coding
§ Export to EDRM XML
§ Review, produce, present
Slide 7 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
E-Discovery Gartner Quadrant
Slide 8 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
Influencers/Partners
§ Data conversion/processing
§ DiscoverTape (Sullivan)
§ Trusted Data (Clark)
§ Oliver Group (Bessette)
§ eMag Solutions (Henn)
§ Renew Data (Blayney)
§ Index Engines (Williams)
§ Governance/Compliance/Risk/
eDiscovery Consulting
§ AlixPartners (Perfetti)
§ Alvarez and Marsal (Kindy)
§ Huron (Tierney and Bashir)
§ KPMG (Reichard)
§ Deloitte (DeSantis)
§ E and Y (Pannell)
§ Navigant (Post)
§ FTI (Brunner)
§ OEM’s/ISV’s
§ PureDiscovery (Copps)
§ Content Analyst (Michel)
§ SmartLogic (Gleason)
§ Index Engines (Williams)
§ Nuex (Chardack)
§ StoredIQ (Schellhase)
§ Proof Point (Steele)
§ Enterprise Vault (deSouza)
§ Acaveo (Bourgeois)
§ Equivio (Milo)
Slide 9 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
Efficiently getting to relevant data
Slide 10 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
Index all Content with MarkLogic
Actionable Results
§ Filter & cull data to manageable data set
§ Export to review tools
§ Identify data for regulatory and
governance
§ Retention classes can evolve with
compliance regulations
§ Data integrity ensures preservation and
defensible deletion.
§ Security with Encryption
§ Correlate email with accounting and other
internal data sources (by person, time,
subject etc…)
Custom
Applications
Communications
Search and Discover
• Index across all data sources
• Linear scale to Pb’s
• Expedite investigation and
litigation discoveries
• Fast and accurate search
• Improve productivity with single
point of access to all information
File SystemsDocument
management
E-mail
Search and
Discover
Laptop/
Workstation
Slide 11 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
Flexible and Easy UI
§ High performance metadata catalogs
§ Full text universal search across all indexes
§ Search and facets designed for non-tech users
§ Library of visualization widgets
§ Promote responsive content for detailed processing,
analysis, review and production
§ Visual Ad Hoc Dashboards with Tableau
Slide 12 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
Data Integrity
Foundation for defensibility
§ Aggregate and log all data collection
§ ACID compliance for transactional integrity
§ Versioning, data compression and duplicate elimination
§ Role based security and encryption
Slide 13 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
Scalable Concept Clustering
§ Large databases
§ Queries with large number of terms and term weights
Slide 14 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
RDF Triple Store for Linking
§ Multiple email addresses and user id’s for individuals
§ Contact name, title, location, roles
§ Related industry terms
§ Parties and Counter Parties
Slide 15 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
Range Indexes for Numerical Analysis
§ Dates from disparate data sources
§ Fast aggregates for numerical analysis
§ Library of statistical calculations
§ Any user defined custom analytical function
Slide 16 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
Multi Matter, Single Instance for GC
§ A majority of companies use multiple products to cover the
whole process, but are looking to consolidate to handle
every aspect of e-discovery in-house.
§ Interest in using information governance techniques and
tools to control the amount of data that is kept by
enterprises is also growing.
Slide 17 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
eDiscovery Next Steps
§ Target Enterprises with large litigation holds
§ Tb Scale exceeds capabilities of traditional tools
§ Limited or simple processing requirements
§ Prospect values defensible deletion, scale or integration with other data
§ Target Roles
§ AGC in charge of data
§ Lead Paralegal
§ Compliance officer
§ IT that focuses on governance/compliance/eDiscovery
§ Sign referral agreements with influencers
§ Tape conversion
§ Strategic consultants
§ Key OEM’s
§ Recruit AE or PC with Governance wins
Slide 18 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
Influencers
§ Data conversion/processing
§ DiscoverTape (Sullivan)
§ Trusted Data (Clark)
§ Oliver Group (Bessette)
§ eMag Solutions (Henn)
§ Renew Data (Blayney)
§ Index Engines (Williams)
§ Governance/Compliance/Risk/
eDiscovery Consulting
§ AlixPartners (Perfetti)
§ Alvarez and Marsal (Kindy)
§ Huron (Tierney and Bashir)
§ KPMG (Reichard)
§ Deloitte (DeSantis)
§ E and Y (Pannell)
§ Navigant (Post)
§ FTI (Brunner)
§ Kroll (Casey)
§ Lexis Applied Discovery (Clark)
§ OEM’s/ISV’s
§ PureDiscovery
§ Content Analyst
§ Kcura Relativity (Sieja)
§ Lexis/Concordance
§ Index Engines (Williams)
§ Nuex (Chardack)
§ @Legal (Haresh/Paresh)
§ StoredIQ (Schellhase)
§ Proof Point (Steele)
§ Enterprise Vault (deSouza)
§ Acaveo (Bourgeois)
§ Equivio (Milo)
Slide 19 Copyright © 2012 MarkLogic® Corporation. All rights reserved.
Lead Sources
§ www.complianceweek.com
§ www.thewhitecollarblog.com
§ http://www.sec.gov/spotlight/fcpa/fcpa-cases.shtml
§ Lexis AtVantage (legal biz dev service)

More Related Content

What's hot

Why Information Architecture is Vital for Office 365 and SharePoint
Why Information Architecture is Vital for Office 365 and SharePointWhy Information Architecture is Vital for Office 365 and SharePoint
Why Information Architecture is Vital for Office 365 and SharePointJ. Kevin Parker, CIP
 
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3J. David Morris
 
The Need to Know for Information Architects: Big Data to Big Information
The Need to Know for Information Architects: Big Data to Big InformationThe Need to Know for Information Architects: Big Data to Big Information
The Need to Know for Information Architects: Big Data to Big InformationDATAVERSITY
 
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with ITBigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with ITBigID Inc
 
Boldon James - SharePoint: information security's weakest link?
Boldon James - SharePoint: information security's weakest link?Boldon James - SharePoint: information security's weakest link?
Boldon James - SharePoint: information security's weakest link?boldonjames
 
Mapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance ProceduresMapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance ProceduresDATAVERSITY
 
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceFive Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceDATAVERSITY
 
General Data Protection Regulation - BDW Meetup, October 11th, 2017
General Data Protection Regulation - BDW Meetup, October 11th, 2017General Data Protection Regulation - BDW Meetup, October 11th, 2017
General Data Protection Regulation - BDW Meetup, October 11th, 2017Caserta
 
Why My Wife Loves Data Governance
Why My Wife Loves Data GovernanceWhy My Wife Loves Data Governance
Why My Wife Loves Data GovernancePaul Boal
 
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...DATAVERSITY
 
The Top 5 Factors to Consider When Choosing a Big Data Solution
The Top 5 Factors to Consider When Choosing a Big Data SolutionThe Top 5 Factors to Consider When Choosing a Big Data Solution
The Top 5 Factors to Consider When Choosing a Big Data SolutionDATAVERSITY
 
Data protection services lifecycle approach to critical information protection
Data protection services  lifecycle approach to critical information protectionData protection services  lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protectionAujas Networks Pvt. Ltd.
 
Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1Vishal Bamba
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudeDiscoveryConsultant
 
8Reasons Tip Sheet_021216_v2
8Reasons Tip Sheet_021216_v28Reasons Tip Sheet_021216_v2
8Reasons Tip Sheet_021216_v2Tim Goodwin
 
Data Catalog for Better Data Discovery and Governance
Data Catalog for Better Data Discovery and GovernanceData Catalog for Better Data Discovery and Governance
Data Catalog for Better Data Discovery and GovernanceDenodo
 
Customer Intelligence_ Harnessing Elephants at Transamerica Presentation (1)
Customer Intelligence_ Harnessing Elephants at Transamerica    Presentation (1)Customer Intelligence_ Harnessing Elephants at Transamerica    Presentation (1)
Customer Intelligence_ Harnessing Elephants at Transamerica Presentation (1)Vishal Bamba
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix LLC
 

What's hot (20)

Working With Different Kinds of Data
Working With Different Kinds of DataWorking With Different Kinds of Data
Working With Different Kinds of Data
 
Why Information Architecture is Vital for Office 365 and SharePoint
Why Information Architecture is Vital for Office 365 and SharePointWhy Information Architecture is Vital for Office 365 and SharePoint
Why Information Architecture is Vital for Office 365 and SharePoint
 
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
Contoural Kazeon Webinar Insourcing E Discovery Nov 08 V1 1 3
 
The Need to Know for Information Architects: Big Data to Big Information
The Need to Know for Information Architects: Big Data to Big InformationThe Need to Know for Information Architects: Big Data to Big Information
The Need to Know for Information Architects: Big Data to Big Information
 
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with ITBigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
 
Boldon James - SharePoint: information security's weakest link?
Boldon James - SharePoint: information security's weakest link?Boldon James - SharePoint: information security's weakest link?
Boldon James - SharePoint: information security's weakest link?
 
Mapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance ProceduresMapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance Procedures
 
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceFive Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data Governance
 
General Data Protection Regulation - BDW Meetup, October 11th, 2017
General Data Protection Regulation - BDW Meetup, October 11th, 2017General Data Protection Regulation - BDW Meetup, October 11th, 2017
General Data Protection Regulation - BDW Meetup, October 11th, 2017
 
Why My Wife Loves Data Governance
Why My Wife Loves Data GovernanceWhy My Wife Loves Data Governance
Why My Wife Loves Data Governance
 
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
 
The Top 5 Factors to Consider When Choosing a Big Data Solution
The Top 5 Factors to Consider When Choosing a Big Data SolutionThe Top 5 Factors to Consider When Choosing a Big Data Solution
The Top 5 Factors to Consider When Choosing a Big Data Solution
 
Data Governance and Analytics
Data Governance and AnalyticsData Governance and Analytics
Data Governance and Analytics
 
Data protection services lifecycle approach to critical information protection
Data protection services  lifecycle approach to critical information protectionData protection services  lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protection
 
Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the Cloud
 
8Reasons Tip Sheet_021216_v2
8Reasons Tip Sheet_021216_v28Reasons Tip Sheet_021216_v2
8Reasons Tip Sheet_021216_v2
 
Data Catalog for Better Data Discovery and Governance
Data Catalog for Better Data Discovery and GovernanceData Catalog for Better Data Discovery and Governance
Data Catalog for Better Data Discovery and Governance
 
Customer Intelligence_ Harnessing Elephants at Transamerica Presentation (1)
Customer Intelligence_ Harnessing Elephants at Transamerica    Presentation (1)Customer Intelligence_ Harnessing Elephants at Transamerica    Presentation (1)
Customer Intelligence_ Harnessing Elephants at Transamerica Presentation (1)
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 

Similar to Mark logic ediscovery and governance v1

The New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the CloudThe New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the CloudInside Analysis
 
MarkLogic Semantic use cases
MarkLogic Semantic use cases MarkLogic Semantic use cases
MarkLogic Semantic use cases Fernando Mesa
 
Fraud webinar - Prevention & Risk Management
Fraud webinar - Prevention & Risk ManagementFraud webinar - Prevention & Risk Management
Fraud webinar - Prevention & Risk ManagementFernando Mesa
 
What Is My Enterprise Data Maturity 2021
What Is My Enterprise Data Maturity 2021What Is My Enterprise Data Maturity 2021
What Is My Enterprise Data Maturity 2021DATAVERSITY
 
Embedded-ml(ai)applications - Bjoern Staender
Embedded-ml(ai)applications - Bjoern StaenderEmbedded-ml(ai)applications - Bjoern Staender
Embedded-ml(ai)applications - Bjoern StaenderDataconomy Media
 
A Real World Case Study for Implementing an Enterprise Scale Data Fabric
A Real World Case Study for Implementing an Enterprise Scale Data FabricA Real World Case Study for Implementing an Enterprise Scale Data Fabric
A Real World Case Study for Implementing an Enterprise Scale Data FabricNeo4j
 
Data Democratization for Faster Decision-making and Business Agility (ASEAN)
Data Democratization for Faster Decision-making and Business Agility (ASEAN)Data Democratization for Faster Decision-making and Business Agility (ASEAN)
Data Democratization for Faster Decision-making and Business Agility (ASEAN)Denodo
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User InformationDenodo
 
Belgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshopBelgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshopDenodo
 
Why Data Mesh Needs Data Virtualization (ASEAN)
Why Data Mesh Needs Data Virtualization (ASEAN)Why Data Mesh Needs Data Virtualization (ASEAN)
Why Data Mesh Needs Data Virtualization (ASEAN)Denodo
 
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Denodo
 
Oracle GoldenGate 12c - Real Time Access to Real Time Information
Oracle GoldenGate 12c - Real Time Access to Real Time InformationOracle GoldenGate 12c - Real Time Access to Real Time Information
Oracle GoldenGate 12c - Real Time Access to Real Time InformationAsha BG
 
Tackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines WebinarTackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines WebinarIndex Engines Inc.
 
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Denodo
 
Active Governance Across the Delta Lake with Alation
Active Governance Across the Delta Lake with AlationActive Governance Across the Delta Lake with Alation
Active Governance Across the Delta Lake with AlationDatabricks
 
Keynote Address: Changing Public Sector Through ICT-innovation
Keynote Address: Changing Public Sector Through ICT-innovationKeynote Address: Changing Public Sector Through ICT-innovation
Keynote Address: Changing Public Sector Through ICT-innovationChristian Wernberg-Tougaard
 
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin   simplifying big data delivery to drive new insights finalTdwi austin   simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights finalSal Marcus
 
Delivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data LakeDelivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data LakeJean-Michel Franco
 
The Model Enterprise: A Blueprint for Enterprise Data Governance
The Model Enterprise: A Blueprint for Enterprise Data GovernanceThe Model Enterprise: A Blueprint for Enterprise Data Governance
The Model Enterprise: A Blueprint for Enterprise Data GovernanceEric Kavanagh
 

Similar to Mark logic ediscovery and governance v1 (20)

The New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the CloudThe New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the Cloud
 
MarkLogic Semantic use cases
MarkLogic Semantic use cases MarkLogic Semantic use cases
MarkLogic Semantic use cases
 
Fraud webinar - Prevention & Risk Management
Fraud webinar - Prevention & Risk ManagementFraud webinar - Prevention & Risk Management
Fraud webinar - Prevention & Risk Management
 
What Is My Enterprise Data Maturity 2021
What Is My Enterprise Data Maturity 2021What Is My Enterprise Data Maturity 2021
What Is My Enterprise Data Maturity 2021
 
Embedded-ml(ai)applications - Bjoern Staender
Embedded-ml(ai)applications - Bjoern StaenderEmbedded-ml(ai)applications - Bjoern Staender
Embedded-ml(ai)applications - Bjoern Staender
 
A Real World Case Study for Implementing an Enterprise Scale Data Fabric
A Real World Case Study for Implementing an Enterprise Scale Data FabricA Real World Case Study for Implementing an Enterprise Scale Data Fabric
A Real World Case Study for Implementing an Enterprise Scale Data Fabric
 
Data Democratization for Faster Decision-making and Business Agility (ASEAN)
Data Democratization for Faster Decision-making and Business Agility (ASEAN)Data Democratization for Faster Decision-making and Business Agility (ASEAN)
Data Democratization for Faster Decision-making and Business Agility (ASEAN)
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User Information
 
Belgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshopBelgium & Luxembourg dedicated online Data Virtualization discovery workshop
Belgium & Luxembourg dedicated online Data Virtualization discovery workshop
 
Why Data Mesh Needs Data Virtualization (ASEAN)
Why Data Mesh Needs Data Virtualization (ASEAN)Why Data Mesh Needs Data Virtualization (ASEAN)
Why Data Mesh Needs Data Virtualization (ASEAN)
 
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
 
Oracle GoldenGate 12c - Real Time Access to Real Time Information
Oracle GoldenGate 12c - Real Time Access to Real Time InformationOracle GoldenGate 12c - Real Time Access to Real Time Information
Oracle GoldenGate 12c - Real Time Access to Real Time Information
 
Tackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines WebinarTackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines Webinar
 
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
 
Active Governance Across the Delta Lake with Alation
Active Governance Across the Delta Lake with AlationActive Governance Across the Delta Lake with Alation
Active Governance Across the Delta Lake with Alation
 
Keynote Address: Changing Public Sector Through ICT-innovation
Keynote Address: Changing Public Sector Through ICT-innovationKeynote Address: Changing Public Sector Through ICT-innovation
Keynote Address: Changing Public Sector Through ICT-innovation
 
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin   simplifying big data delivery to drive new insights finalTdwi austin   simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights final
 
Delivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data LakeDelivering Analytics at Scale with a Governed Data Lake
Delivering Analytics at Scale with a Governed Data Lake
 
Steal This Data - Email Security and DLP
Steal This Data - Email Security and DLPSteal This Data - Email Security and DLP
Steal This Data - Email Security and DLP
 
The Model Enterprise: A Blueprint for Enterprise Data Governance
The Model Enterprise: A Blueprint for Enterprise Data GovernanceThe Model Enterprise: A Blueprint for Enterprise Data Governance
The Model Enterprise: A Blueprint for Enterprise Data Governance
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Mark logic ediscovery and governance v1

  • 1. Slide 1 Copyright © 2012 MarkLogic® Corporation. All rights reserved. MarkLogic for eDiscovery Petascale search, query and analysis With defensible deletion
  • 2. Slide 2 Copyright © 2012 MarkLogic® Corporation. All rights reserved. eDiscovery/Governance Market Drivers § SEC requirements for brokerages to retain and supervise email, social media and other electronic communications (UBS) § Financial services regulations/risk and compliance (JP Morgan) § Security breach privacy laws in the U.S. and Germany that require customer notification of breach(google) § Anti-fraud, anti-bribery and anti-corruption laws in the U.S., U.K., Germany § Intellectual property mismanagement or misuse § Average Data Volumes exploded in the last ten years 2003 was 10Gb to 1Pb (100,000 bigger)
  • 3. Slide 3 Copyright © 2012 MarkLogic® Corporation. All rights reserved. Governance Challenges § Lack of consistent adherence to policies across all information assets § Volume is exploding and current approaches won’t scale § Distilling policies into proactive automated rules and alerts difficult § Current approaches focus on single applications (email) instead of data § Need scale and transaction logging to be defensible! § Need a granular security model to put all assets in one solution § Data, policy enforcement and learning management should be integrated
  • 4. Slide 4 Copyright © 2012 MarkLogic® Corporation. All rights reserved. Market Opportunity § The enterprise e-discovery software market generated $1.4 billion in total software vendor revenue in 2012 (82% of revenue in US) § By 2017 the e-discovery software market will be $2.9B § "Nontraditional" e-discovery vendors will continue to enter this market, creating market expansion through technology convergence and functionality overlap. Gartner Dec. 2012
  • 5. Slide 5 Copyright © 2012 MarkLogic® Corporation. All rights reserved. Functionality § Realtime identification and collection § ETL/aggregate and process content § Ingest/Index quickly and cost effectively any data § Metadata catalog § Performance and scale § Search § Segment/classify/tag § Non responsive, privileged or escalate § Delete or promote to matter specific solution § Threading to speed review of only latest content § NLP and entity enrichment § Transactional integrity for defensible deletion (log everything) § Loose correlation across disparate dimensions § Policy management and alerting § Learning management and compliance
  • 6. Slide 6 Copyright © 2012 MarkLogic® Corporation. All rights reserved. Software and Services § Restoration/Identification/Collection § MetaData catalog § Crack pst’s § Fiiltering/Conversion § De-dupe § De-Nisting § Threading § Build, train and enforce policies § Relate multiple contact info § Entity enrichment § Concept clustering, predictive coding § Export to EDRM XML § Review, produce, present
  • 7. Slide 7 Copyright © 2012 MarkLogic® Corporation. All rights reserved. E-Discovery Gartner Quadrant
  • 8. Slide 8 Copyright © 2012 MarkLogic® Corporation. All rights reserved. Influencers/Partners § Data conversion/processing § DiscoverTape (Sullivan) § Trusted Data (Clark) § Oliver Group (Bessette) § eMag Solutions (Henn) § Renew Data (Blayney) § Index Engines (Williams) § Governance/Compliance/Risk/ eDiscovery Consulting § AlixPartners (Perfetti) § Alvarez and Marsal (Kindy) § Huron (Tierney and Bashir) § KPMG (Reichard) § Deloitte (DeSantis) § E and Y (Pannell) § Navigant (Post) § FTI (Brunner) § OEM’s/ISV’s § PureDiscovery (Copps) § Content Analyst (Michel) § SmartLogic (Gleason) § Index Engines (Williams) § Nuex (Chardack) § StoredIQ (Schellhase) § Proof Point (Steele) § Enterprise Vault (deSouza) § Acaveo (Bourgeois) § Equivio (Milo)
  • 9. Slide 9 Copyright © 2012 MarkLogic® Corporation. All rights reserved. Efficiently getting to relevant data
  • 10. Slide 10 Copyright © 2012 MarkLogic® Corporation. All rights reserved. Index all Content with MarkLogic Actionable Results § Filter & cull data to manageable data set § Export to review tools § Identify data for regulatory and governance § Retention classes can evolve with compliance regulations § Data integrity ensures preservation and defensible deletion. § Security with Encryption § Correlate email with accounting and other internal data sources (by person, time, subject etc…) Custom Applications Communications Search and Discover • Index across all data sources • Linear scale to Pb’s • Expedite investigation and litigation discoveries • Fast and accurate search • Improve productivity with single point of access to all information File SystemsDocument management E-mail Search and Discover Laptop/ Workstation
  • 11. Slide 11 Copyright © 2012 MarkLogic® Corporation. All rights reserved. Flexible and Easy UI § High performance metadata catalogs § Full text universal search across all indexes § Search and facets designed for non-tech users § Library of visualization widgets § Promote responsive content for detailed processing, analysis, review and production § Visual Ad Hoc Dashboards with Tableau
  • 12. Slide 12 Copyright © 2012 MarkLogic® Corporation. All rights reserved. Data Integrity Foundation for defensibility § Aggregate and log all data collection § ACID compliance for transactional integrity § Versioning, data compression and duplicate elimination § Role based security and encryption
  • 13. Slide 13 Copyright © 2012 MarkLogic® Corporation. All rights reserved. Scalable Concept Clustering § Large databases § Queries with large number of terms and term weights
  • 14. Slide 14 Copyright © 2012 MarkLogic® Corporation. All rights reserved. RDF Triple Store for Linking § Multiple email addresses and user id’s for individuals § Contact name, title, location, roles § Related industry terms § Parties and Counter Parties
  • 15. Slide 15 Copyright © 2012 MarkLogic® Corporation. All rights reserved. Range Indexes for Numerical Analysis § Dates from disparate data sources § Fast aggregates for numerical analysis § Library of statistical calculations § Any user defined custom analytical function
  • 16. Slide 16 Copyright © 2012 MarkLogic® Corporation. All rights reserved. Multi Matter, Single Instance for GC § A majority of companies use multiple products to cover the whole process, but are looking to consolidate to handle every aspect of e-discovery in-house. § Interest in using information governance techniques and tools to control the amount of data that is kept by enterprises is also growing.
  • 17. Slide 17 Copyright © 2012 MarkLogic® Corporation. All rights reserved. eDiscovery Next Steps § Target Enterprises with large litigation holds § Tb Scale exceeds capabilities of traditional tools § Limited or simple processing requirements § Prospect values defensible deletion, scale or integration with other data § Target Roles § AGC in charge of data § Lead Paralegal § Compliance officer § IT that focuses on governance/compliance/eDiscovery § Sign referral agreements with influencers § Tape conversion § Strategic consultants § Key OEM’s § Recruit AE or PC with Governance wins
  • 18. Slide 18 Copyright © 2012 MarkLogic® Corporation. All rights reserved. Influencers § Data conversion/processing § DiscoverTape (Sullivan) § Trusted Data (Clark) § Oliver Group (Bessette) § eMag Solutions (Henn) § Renew Data (Blayney) § Index Engines (Williams) § Governance/Compliance/Risk/ eDiscovery Consulting § AlixPartners (Perfetti) § Alvarez and Marsal (Kindy) § Huron (Tierney and Bashir) § KPMG (Reichard) § Deloitte (DeSantis) § E and Y (Pannell) § Navigant (Post) § FTI (Brunner) § Kroll (Casey) § Lexis Applied Discovery (Clark) § OEM’s/ISV’s § PureDiscovery § Content Analyst § Kcura Relativity (Sieja) § Lexis/Concordance § Index Engines (Williams) § Nuex (Chardack) § @Legal (Haresh/Paresh) § StoredIQ (Schellhase) § Proof Point (Steele) § Enterprise Vault (deSouza) § Acaveo (Bourgeois) § Equivio (Milo)
  • 19. Slide 19 Copyright © 2012 MarkLogic® Corporation. All rights reserved. Lead Sources § www.complianceweek.com § www.thewhitecollarblog.com § http://www.sec.gov/spotlight/fcpa/fcpa-cases.shtml § Lexis AtVantage (legal biz dev service)