SlideShare a Scribd company logo
1 of 65
Download to read offline
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
3 Simple Strategies to
Preserve & Manage
unstructured data of
former employees
SUNIL UTTAM
Co-founder & Principal Solution Architect
Mithi Software Technologies.
Connect with Sunil
DEC 19 2019
12:00 NOON - 12:45 PM IST
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Welcome to another Mithi Webinar
Webinars delivering the best value for your time
& attention with Simple, Practical, directly
Applicable Insights, Strategies, Methods
Some quick reminders
• Please Participate in the polls
• Keep asking questions as we go, via the Questions Panel
• Do rate us and take the survey at the end of the webinar
• Download the deck if you like or anyways we’ll send you the deck and recording
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Sunil Uttam
Chief Solution Architect & co-founder
Mithi Software Technologies
Cloud Data Management - Simplified
Sunil helps senior leaders, CIOs, CISOs to gain insights, understand risks, and map their
digital data management journey via a well researched data driven approach and helps
them transition from they are into a digitally Dexter future in manageable steps.
Essentially, Sunil’s work focusses on listening to customers and simplifying data
management for them with scalable, secure and cost optimized cloud based solutions.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Agenda
• Why preserve data of former employees?
• Common methods deployed today and their drawbacks
• 3 Simple strategies to help you preserve and manage unstructured
data better.
• How the cloud can aid in your data management strategy
• Your queries answered.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Poll
Why do you want to preserve data generated by former employees?
(Select all that apply)
• For Audit readiness and regulation compliance
• To capture and leverage the IP generated by the employee
• For litigation readiness
• The law requires this
• For backup and restoration to help the successor
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
2 Kinds of Data
Structured Data
Typically stored in database records, generated from business work flow processes,
codified via forms. Examples include Leads, quotations, customer information etc
stored in a CRM system, Invoices, taxation information stored in a Billing system,
Inventory, Vendor management, stored in an ERP system, etc.
Unstructured Data
Information assets such as documents, plans, designs, project conversations,
communication (internal and external), Notes, Research, Data Sheets, Proposals,
and more.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
By 2025, IDG projects
that there will be 163
zettabytes of data in the
world, and estimates
indicate that 80% of this
data is unstructured.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
With data as the new oil, companies have to:
Control Access
to the
data/information
assets
Plan and Execute
Information
Security for
Information assets
Organise, Preserve
and provide easy
access to
information assets
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Structured data
is typically centralised,
and based on
databases, making
preservation natural
and easy.
Unstructured data
is typically fragmented,
distributed, uneven and
spread across Internal and
External file sharing and
synchronisation systems
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Collating, Organising, Classifying,
Preserving and Accessing unstructured
data is a nightmare.
(Many times the organisation is unaware of the depth of
assets created across their employees. These are invisible,
unmapped and unavailable centrally when required)
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
But in todays scenario,
preserving data in an
easily accessible form is
not just mandatory for
regulation compliance,
knowledge
management, forensic
analysis and legal
responses
also a source of
competitive
advantage due to the
ability to reuse
knowledge from the
corporate archive.
BUT
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
The most popular and
deeply entrenched means
of sharing information
internally and externally is
via email.
Enter Email
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
60%
of business-critical
information is
stored exclusively
in email
- IDC
4GB
is the average
annual growth in a
user's archive
account
- Mithi
126
messages are expected
to be sent and received,
on average, per business
user per day, by the end
of 2019
- Radicati
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
The total number of emails sent and received per
day is forecasted to reach 306 Billion by 2020
- Radicati
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
70% of all emails carry business critical data
and Information assets
-IDG
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
So a key component of an organisation's
data management strategy has to be to
ensure that all email are preserved
and accessible on demand.
In this webinar we focus our discussion to strategies
for managing email data.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Common data management
methods deployed today and
their drawbacks
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Data generated by employees are information
assets belonging to the company and need to
be preserved, managed on an ongoing basis in
an Enterprise Information Architecture
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
• Focus mainly on capturing the
laptop when an employee
leaves (assuming it has all the
information)
• Treat data archival of an exiting
employee as a post mortem
process
• Allow the use of public file
sharing and synchronisation
tools (such as Gdrive, DropBox, etc)
Common
mistakes made
by many
organisations
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
• The fragmented nature of Information assets
makes it difficult to locate and collate after the
employee has gone
• The data is open to tampering or theft just
before an employee leaves
• Information assets saved on consumer file
sharing apps like GDrive, OneDrive, dropbox etc
may not be accessible to your organisation.
• Information assets could have been transported
outside your network via email
Post mortem approach - Risky
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Which of these strategies is your organization currently
deploying to manage email data? (Select all that apply)
Poll
1. Capturing snapshot backups of end points, periodically
2. Deploying Quota limits on email accounts
3. Many to one Email Journaling/Forwarding
4. Periodically moving old email data to PSTs
5. Other methods
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Whether In Premise or on Cloud,
What are some of the popular methods of
email data management used Today?
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Pre-requisite
• You need to invest in a robust, scalable email backup solution
• You need to invest in additional storage and tapes to keep
backups
• You need to invest in a multi site backup architecture with tapes,
to maintain off site backups.
Outcomes - Investment with poor ROI
• Mail activity between backups is not captured
• Not compliance ready - No guarantee that ALL email have been
captured in the backups
• Not Search or Restore ready - Searching and restoring an email
by content, meta data from backups is a challenge
• Keeping the backup storage and tapes, safe, secure and reliable
is a challenge
• Can at best recover to a point in time state of the mailbox or
server
• IT Team occupied with a low yield activity.
• Users cannot help themselves restore their own mail typically.
Capturing snap shot
backups of end
points, periodically
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Process
• Users & IT teams spend a lot of time cleaning mailboxes to
contain storage bloat and compute overload
• Users are forced to delete even important/critical email to
maintain their mailbox within limits
• Many organisations expect users to download their email locally
(PST files) and then clean them from their mailboxes
• Most users set an "auto forward" to their personal Gmail accounts
to maintain backups
Outcomes - End point Jungle with splintered data
• Productivity loss with choosing, downloading and deleting email
• Potential mail loss risk with locally stored critical data
• Privacy risk with mail diverted to an inaccessible external email id.
• No single point control, ownership and consolidated view of all
email for the organisation since the data is all splintered across
end points.
Deploying Quota
limits on email
accounts to control
mailbox bloat and cost
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Process
• Journal a copy of every mail sent/received to a central, single
journal email id (typically another mailbox on same system)
• Configures a desktop email client to POP mail from this journal
email ID into a local PC to create PST files/EML files.
• Backup the PST files to a secondary storage & rotate regularly
Outcomes
• A Security tick mark - No practical use of this data in compliance
and knowledge discovery use cases.
• Notional data safety - Safety, Security and Reliability of the PST files
on the local PC is another challenge
• Not search ready - Data of all users mixed up in one account,
splintered across PST files, making it challenging to locate and
download selected data
• Not recovery ready - Collating and restoring mailboxes from
splintered PST files, can be a hairball and time consuming
Many to one Email
Journaling, coupled
with download to a
client PC
Data Management Strategy: Many to One Email Journaling
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Process
• Configure MS Outlook, Thunderbird to automatically move
mail older than a date to a local store
• This mail is also removed from the server mailbox.
Outcomes
• For a business, this method means loss of control on the mail
data
• A business cannot easily access discover in these files
distributed across client devices (possibly across geographies)
• Keeping these archive files safe, secure and reliable is a
challenge
Email Client Archival
to move old email
data to PSTs
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
After an employee leaves, organizations
are doing one or more of the following
1. Deleting the email (and the knowledge in it) since
there is no way to maintain these email
2. Disabling the account but retaining the mailbox in a
suspended state (and paying for this)
3. Downloading email from the account as PST/EML
files, storing locally, and deleting the account from
the primary mailbox.
4. Retaining the end point backups of the mailboxes
from the client devices
Typically the local
PST/EML file sets or
end point backups are
retained for the long
term on external
disks, tapes.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
3 Simple Strategies
to manage
unstructured data
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Strategy 1:
For Documents, Files
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Employees continue to use
consumer online file-sharing
tools for sensitive
documents, even when their
company has banned the
use of such tools.
Challenges for managing Documents and Files
However, this means that
ECM program managers
have no control over
content and sometimes
don't even know that
employees are using
these tools
Using such tools also
enables them to collaborate
with their business
partners, such as
contractors, temporary staff
and contacts in other
companies.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
• Introduce EFSS tools (Enterprise File sharing and
Synchronisation) as the preferred (mandatory)
method to share files with colleagues, partners
and customers.
• Help users transition from using public tools to
internal EFSS tools
Recommendations
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Enterprises that invest wisely in EFSS capabilities will enable a more
collaborative workplace with easy information sharing, while
reducing or avoiding the security and compliance threats associated
with using "consumer" cloud services.
They'll also benefit from increased workforce productivity, reduced
email traffic/size and reduced costs.
Outcomes
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Live Case Study –
How we do it at Mithi
Reduction of internal email traffic by over 80%, reduced Data Risk
and improved team productivity by over 300%
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Top Benefits of using an EFSS tool
(like Ideolve)
• All information assets generated by anybody within the organisation
are available in a central organisation level store
• Conversations for each information asset all stored and tracked with
the Information Asset (IA)
• Version tracking of Information Assets
• IAs are captured, organised and maintained on an ongoing basis and
not collected after the fact from devices of former employees
• When an employee leaves, simply transfer ownership of all IAs with
the successor
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Strategy 2:
For Legacy Email
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Whenever you start your Data Migration journey, you
will have some legacy email data, most of which carries
business critical data, to be preserved and accessible
for reuse, during litigations and audits.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Legacy email
is typically
lying around
In the active mailboxes of
users
Downloaded in the desktop
email clients of users
Downloaded in PST/EML files
on drives, tapes and other
storage mediums
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Risk fraught
approach
- Keeps the doors open for tampering
- High chance of data theft, loss or
corruption
- Difficult to manage and maintain
offline storage devices
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Store the email data in raw native file formats on some safe
cloud store.
• These email are not discoverable directly from the store
• A cataloging mechanism must be devised and maintained to
for the mail data of each user
Outcomes
• Safe, Elastic, Secure data store
• Central, controlled repository
• Search and Retrieve data on-demand (albeit not instantly)
Recommendation for Infrequent access
1
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Recommendation for Infrequent access
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
2 Store the email data in an online, search ready format on the
cloud
• Upload/Import historical data directly from the live mailbox of
the employee
• Upload/Import historical data from PST/EML/MBOX files.
Outcomes
• Safe, Elastic, Secure and indexed data store
• Central, controlled repository
• Data is automatically indexed, search ready and ready for
export on demand.
Recommendation for Frequent access
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Recommendation 2 for Frequent access
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Active
Employee
Live mail
archiving
Employee
leaves
Shift plan
to HOLD
Hold for life or
sunset as required
Active
Employee
Employee
leaves
Migrate data from
mailbox to HOLD
Delete primary
mailbox
Hold for life or
sunset as required
Hold for life or
sunset as required
Dump Legacy
data in PST/EML
Import data
into HOLD
3 simple processes to manage the entire legacy data life cycle from
creation to destruction
Active
Employee
Employee
leaves
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Live Case Study – How a leading Financial services
company saves on Gsuite costs & stays
compliance ready.
Challenge
• Rapid attrition and onboarding of employees
• Data of ex-employees needs preservation
• Keeping account disabled on Gsuite costly
Solution
• As employee leaves, migrate email to a cloud cold store
• Delete user account from Gsuite to optimize costs
Outcomes
• Safe secure cloud data store, resulting in 70% cost saving
Over a year the
company has
preserved data
of 700 ex-
employees on
the cloud
totalling about
20TB and saved
over 200K USD
annually on
Gsuite licenses
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Strategy 3:
Hierarchical Storage
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
A Hierarchical storage architecture,
combines two solutions:
• Your primary solution and
• A cloud archival solution.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
A Hierarchical storage architecture, splits the
mailbox of a user into two:
• One a live mail store on the primary mail
solution retaining mail only for a small
period and
• Two a archive mail store on a cloud
archiving platform, having all the mail
retained for the long term
What is a Hierarchical Storage Architecture?
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Here’s how it works
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Top Benefits of using a Hierarchical Storage
Architecture
• Leaner, higher performing primary mailboxes
• Better storage management on on-premise mail solutions
• All data captured and safe
• A central repository to prevent data loss, set up automatic governance
rules and enable multiple levels of access based on the user's role in the
organization.
• Automatically the organisation is better equipped for compliance,
audits, knowledge sharing and successor management
• When an employee leaves, simply transfer ownership of the Vault to the
successor
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Live Case Study – How a Micro Finance company
preserved investment on MS Exchange & Secured
the Data
Challenge
• Rapidly filling mailboxes on MS Exchange
• Degrading server performance and user access
• Expensive upgrade path
Solution
• Secure a copy of all data on the cloud, in flight
• Apply a retention policy on primary mailboxes to lean them
Outcomes
An improved
performance
on the legacy MS
Exchange server,
along with data
security, safety
and improved
compliance
posture
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Key
Takeaways
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
81% organizations
are opting for SaaS cloud solutions
to drive their workloads & gain from
SLA backed guarantees.
81%
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
• A proactive strategy to capture
information as it is generated will be
superior to looking for all the
information once the employee leaves.
• An enterprise information architecture
and structure is critical to have in place.
• Managing unstructured data is the
major chunk of your data management
initiative
• Preserving all Email is a critical path in
your data management journey
• Store data on a SaaS cloud email archival
platform for improved reliability,
durability, security and life cycle
management of the data.
• Store legacy email in raw file formats on
a cloud store if there no frequent
requirement to discover or recover
individual emails.
• Archive all email, in flight, to get a grip
on 70% of your business critical
information
• Use EFSS tools and discourage consumer
cloud based file sharing apps
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
The Mithi
Advantage
Serving demanding Enterprise customers
for nearly 2 decades
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
• I need an email system on my own brand, which is business class, reliable,
guaranteed, and secure
• I want to Optimize email solution costs on O365, Gsuite with a hybrid email
setup
• Email is a poor tool for collaboration and sharing documents, with duplication,
splintering and bloating mailboxes. I want a secure, private, corporate EFSS
tool to share files with colleagues, customers and partners
• I want to optimize storage and performance on my primary mail
server/solution
Flexible, Secure, Scalable Cloud Email and Team
Collaboration platform to help you improve Digital
Dexterity In your work place
Communication
& Collaboration
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
• I am finding it difficult to secure, and locate fragmented information when needed.
I want to improve our organisation's compliance posture and be audit ready at all times?
• I am using a legacy mail platform like Exchange and am running out of storage,
hitting performance bottlenecks, running a data loss risk and finding data is a
pain.
• I want to reduce risks of vendor lock in when using one of the big cloud email
solutions like O365 or Gsuite.
• I have migrated to a cloud solution like O365/Gsuite but I need to preserve my legacy
email data in a search ready form without incurring heavy costs.
• I am changing my mail solution provider and need help to migrate my email data
between the solutions.
• I want to selectively retrieve email data from my primary mail platform (Exchange, O365,
Gsuite, Zimbra…etc) or Vaultastic accounts for multiple users
• I use GSuite or O365 and have a lot of employee churn. I need to preserve data of exit
employees by policy and keeping it on GSuite/O365 is an expensive affair.
Data
Management
Cloud Data Management - Simplified
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
• I am using an on-premise Exchange, Zimbra, or other mail server and am
concerned about the safety and security of my data, which is fragmented
across user accounts and multiple end points.
• I am using an on-premise Exchange, Zimbra, or other mail server and am
facing problems related to spam, viruses, ransomware, etc
• I am using an on-premise Exchange, Zimbra, or other mail server but am
concerned about business continuity since I don’t have redundancies
or a DR Site.
Email security, continuity and durability solutions
for your Email Setup
Security
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
BUILDING BLOCKS FOR
OUR SOLUTIONS
vaultastic .mithi.com
Secure Email
Archiving Solutions
for Compliance,
Ediscovery & Backup
Automation
Skyconnect.mithi.com
Secure, Dependable,
Scalable Email for
Business
Communications
ideolve.mithi.com
Uncomplicate your
Team Collaboration.
Get more done.
Guaranteed Email
Security & Disaster
Recovery for
Uninterrupted
Business.
Clrstream.mithi.com Legacyflo.mithi.com
Email Data
Migration made
easy. Automatic,
Reliable, Handsfree
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Trust & compliance support
Well
architected
for
Regular
Independent
Security &
VAPT audits
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Connectors for vaultastic -
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Availability
ONLINE
Over 50 active resellers
DISTRIBUTORS SYSTEM INTEGRATORS
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Ask your questions
Ask Your Questions
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Stay up to speed on related topics
Latest updates and news on Mithi products @
View upcoming and on-demand Mithi Webinars @
https://blog.mithi.com/category/webinars/
Follow our company page and stay updated
https://www.linkedin.com/company/118227/
https://blog.mithi.com/category/news-and-events/
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Before you go
Rate this
presentation
Download the
presentation slides
Submit
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Thank You for your trust
We love making things better for you
For more information visit
www.mithi.com
Drop in your queries at
sales@mithi.com

More Related Content

What's hot

What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information GovernanceAtle Skjekkeland
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
Case Problem for Global Finance, Inc.
Case Problem for Global Finance, Inc.Case Problem for Global Finance, Inc.
Case Problem for Global Finance, Inc.David Bustin
 
IT Asset management presentation
IT Asset management presentationIT Asset management presentation
IT Asset management presentationAshita Mehra
 
The Business Value of Shadow IT
The Business Value of Shadow ITThe Business Value of Shadow IT
The Business Value of Shadow ITCloud Sherpas
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
 
The Application of Information Technology in the Preparation and Presentation...
The Application of Information Technology in the Preparation and Presentation...The Application of Information Technology in the Preparation and Presentation...
The Application of Information Technology in the Preparation and Presentation...IOSRJBM
 
Lessons in Information Governance
Lessons in Information GovernanceLessons in Information Governance
Lessons in Information GovernanceJohn Newton
 
My Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David BustinMy Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David BustinDavid Bustin
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyAIIM International
 
Securing and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherSecuring and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherEOTSS
 
melding digital asset management
melding digital asset managementmelding digital asset management
melding digital asset managementDavid Miller
 
SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?Mark Stokes
 

What's hot (19)

What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information Governance
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Case Problem for Global Finance, Inc.
Case Problem for Global Finance, Inc.Case Problem for Global Finance, Inc.
Case Problem for Global Finance, Inc.
 
IT Asset management presentation
IT Asset management presentationIT Asset management presentation
IT Asset management presentation
 
The Business Value of Shadow IT
The Business Value of Shadow ITThe Business Value of Shadow IT
The Business Value of Shadow IT
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
The Application of Information Technology in the Preparation and Presentation...
The Application of Information Technology in the Preparation and Presentation...The Application of Information Technology in the Preparation and Presentation...
The Application of Information Technology in the Preparation and Presentation...
 
Lessons in Information Governance
Lessons in Information GovernanceLessons in Information Governance
Lessons in Information Governance
 
My Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David BustinMy Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David Bustin
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your Company
 
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss PreventionWebinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
 
Big data and analytics
Big data and analytics Big data and analytics
Big data and analytics
 
Securing and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better TogetherSecuring and Modernizing Technology in the Commonwealth: Better Together
Securing and Modernizing Technology in the Commonwealth: Better Together
 
Principles of Holistic Information Governance
Principles of Holistic Information GovernancePrinciples of Holistic Information Governance
Principles of Holistic Information Governance
 
Motadata product itsm overview
Motadata product itsm overviewMotadata product itsm overview
Motadata product itsm overview
 
melding digital asset management
melding digital asset managementmelding digital asset management
melding digital asset management
 
SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?SPSUK - When do you decide to go to the cloud?
SPSUK - When do you decide to go to the cloud?
 

Similar to 3 simple strategies to preserve and manage unstructured data of former employees

India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...Mithi SkyConnect
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
AWS re:Invent Comes to London 2019 - Security Strategy, Tim Rains
AWS re:Invent Comes to London 2019 - Security Strategy, Tim RainsAWS re:Invent Comes to London 2019 - Security Strategy, Tim Rains
AWS re:Invent Comes to London 2019 - Security Strategy, Tim RainsAmazon Web Services
 
Reinforce business continuity - Securely share files online with Ideolve
Reinforce business continuity - Securely share files online with IdeolveReinforce business continuity - Securely share files online with Ideolve
Reinforce business continuity - Securely share files online with IdeolveMithi Software Technologies Pvt Ltd
 
Protect your business against loss of data and knowledge when employees leave
Protect your business against loss of data and knowledge when employees leaveProtect your business against loss of data and knowledge when employees leave
Protect your business against loss of data and knowledge when employees leaveMithi Software Technologies Pvt Ltd
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3Anne Starr
 
Cybertopicsecurity_3
Cybertopicsecurity_3Cybertopicsecurity_3
Cybertopicsecurity_3Anne Starr
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene
 
IBM Spectrum Scale and Its Use for Content Management
 IBM Spectrum Scale and Its Use for Content Management IBM Spectrum Scale and Its Use for Content Management
IBM Spectrum Scale and Its Use for Content ManagementSandeep Patil
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)Kirsty Donovan
 
Big Data Brussels 2019 v.4.0 I 'How to Build Big Data Analytics Capabilities ...
Big Data Brussels 2019 v.4.0 I 'How to Build Big Data Analytics Capabilities ...Big Data Brussels 2019 v.4.0 I 'How to Build Big Data Analytics Capabilities ...
Big Data Brussels 2019 v.4.0 I 'How to Build Big Data Analytics Capabilities ...Dataconomy Media
 
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?Concept Searching, Inc
 
iOra slideshare presentation
iOra slideshare presentationiOra slideshare presentation
iOra slideshare presentationVicki Kirk
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Caston Thomas
 
20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference BriefingJesse Wilkins
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...Everteam
 
Governance webinar 09062016
Governance webinar 09062016Governance webinar 09062016
Governance webinar 09062016Thierry RAMON
 
Governance webinar 09062016
Governance webinar 09062016Governance webinar 09062016
Governance webinar 09062016Thierry RAMON
 
Negotiating Unstructured Data to Accelerate Intelligent Automation
Negotiating Unstructured Data to Accelerate Intelligent AutomationNegotiating Unstructured Data to Accelerate Intelligent Automation
Negotiating Unstructured Data to Accelerate Intelligent AutomationMindfields Global
 

Similar to 3 simple strategies to preserve and manage unstructured data of former employees (20)

India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
AWS re:Invent Comes to London 2019 - Security Strategy, Tim Rains
AWS re:Invent Comes to London 2019 - Security Strategy, Tim RainsAWS re:Invent Comes to London 2019 - Security Strategy, Tim Rains
AWS re:Invent Comes to London 2019 - Security Strategy, Tim Rains
 
Reinforce business continuity - Securely share files online with Ideolve
Reinforce business continuity - Securely share files online with IdeolveReinforce business continuity - Securely share files online with Ideolve
Reinforce business continuity - Securely share files online with Ideolve
 
Protect your business against loss of data and knowledge when employees leave
Protect your business against loss of data and knowledge when employees leaveProtect your business against loss of data and knowledge when employees leave
Protect your business against loss of data and knowledge when employees leave
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3
 
Cybertopicsecurity_3
Cybertopicsecurity_3Cybertopicsecurity_3
Cybertopicsecurity_3
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
 
IBM Spectrum Scale and Its Use for Content Management
 IBM Spectrum Scale and Its Use for Content Management IBM Spectrum Scale and Its Use for Content Management
IBM Spectrum Scale and Its Use for Content Management
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)
 
Big Data Brussels 2019 v.4.0 I 'How to Build Big Data Analytics Capabilities ...
Big Data Brussels 2019 v.4.0 I 'How to Build Big Data Analytics Capabilities ...Big Data Brussels 2019 v.4.0 I 'How to Build Big Data Analytics Capabilities ...
Big Data Brussels 2019 v.4.0 I 'How to Build Big Data Analytics Capabilities ...
 
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
 
iOra slideshare presentation
iOra slideshare presentationiOra slideshare presentation
iOra slideshare presentation
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3
 
20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
 
Governance webinar 09062016
Governance webinar 09062016Governance webinar 09062016
Governance webinar 09062016
 
Governance webinar 09062016
Governance webinar 09062016Governance webinar 09062016
Governance webinar 09062016
 
Negotiating Unstructured Data to Accelerate Intelligent Automation
Negotiating Unstructured Data to Accelerate Intelligent AutomationNegotiating Unstructured Data to Accelerate Intelligent Automation
Negotiating Unstructured Data to Accelerate Intelligent Automation
 

More from Vaultastic

Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Vaultastic
 
5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right one5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right oneVaultastic
 
Comply with Email retention regulations in India and cut costs using cloud em...
Comply with Email retention regulations in India and cut costs using cloud em...Comply with Email retention regulations in India and cut costs using cloud em...
Comply with Email retention regulations in India and cut costs using cloud em...Vaultastic
 
Webinar: Keep legacy email data safe and search ready with zero hardware
Webinar: Keep legacy email data safe and search ready with zero hardwareWebinar: Keep legacy email data safe and search ready with zero hardware
Webinar: Keep legacy email data safe and search ready with zero hardwareVaultastic
 
Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management Vaultastic
 
Webinar: Worried about privacy of your data on public cloud - Bring your own key
Webinar: Worried about privacy of your data on public cloud - Bring your own keyWebinar: Worried about privacy of your data on public cloud - Bring your own key
Webinar: Worried about privacy of your data on public cloud - Bring your own keyVaultastic
 
Email Mastery Series: How an Email Archival Solution can improve an Organisat...
Email Mastery Series: How an Email Archival Solution can improve an Organisat...Email Mastery Series: How an Email Archival Solution can improve an Organisat...
Email Mastery Series: How an Email Archival Solution can improve an Organisat...Vaultastic
 
Webinar Mastery Series: Email Retention Regulations in India and How Business...
Webinar Mastery Series: Email Retention Regulations in India and How Business...Webinar Mastery Series: Email Retention Regulations in India and How Business...
Webinar Mastery Series: Email Retention Regulations in India and How Business...Vaultastic
 
Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...
Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...
Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...Vaultastic
 
Mastery Webinar Series: Strategies to Simplify Email Data Management
Mastery Webinar Series: Strategies to Simplify Email Data ManagementMastery Webinar Series: Strategies to Simplify Email Data Management
Mastery Webinar Series: Strategies to Simplify Email Data ManagementVaultastic
 
Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...
Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...
Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...Vaultastic
 
Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat
Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat
Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat Vaultastic
 
Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...
Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...
Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...Vaultastic
 
AWS - Why cloud is the best platform for securely managing large data
AWS - Why cloud is the best platform for securely managing large dataAWS - Why cloud is the best platform for securely managing large data
AWS - Why cloud is the best platform for securely managing large dataVaultastic
 
Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery
Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery
Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery Vaultastic
 
Case Study: T and T Motor's Success Story With Vaultastic
Case Study: T and T Motor's Success Story With VaultasticCase Study: T and T Motor's Success Story With Vaultastic
Case Study: T and T Motor's Success Story With VaultasticVaultastic
 
Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...
Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...
Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...Vaultastic
 
Case Study: Cashpor Micro Credit's Success Story with Vaultastic
Case Study: Cashpor Micro Credit's Success Story with Vaultastic Case Study: Cashpor Micro Credit's Success Story with Vaultastic
Case Study: Cashpor Micro Credit's Success Story with Vaultastic Vaultastic
 
Featured Webinar: How Cashpor increased their mail service performance by ado...
Featured Webinar: How Cashpor increased their mail service performance by ado...Featured Webinar: How Cashpor increased their mail service performance by ado...
Featured Webinar: How Cashpor increased their mail service performance by ado...Vaultastic
 
Cashpor Micro Credit - Increasing mail service performance with cloud email a...
Cashpor Micro Credit - Increasing mail service performance with cloud email a...Cashpor Micro Credit - Increasing mail service performance with cloud email a...
Cashpor Micro Credit - Increasing mail service performance with cloud email a...Vaultastic
 

More from Vaultastic (20)

Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...
 
5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right one5 email data management strategies and choosing the right one
5 email data management strategies and choosing the right one
 
Comply with Email retention regulations in India and cut costs using cloud em...
Comply with Email retention regulations in India and cut costs using cloud em...Comply with Email retention regulations in India and cut costs using cloud em...
Comply with Email retention regulations in India and cut costs using cloud em...
 
Webinar: Keep legacy email data safe and search ready with zero hardware
Webinar: Keep legacy email data safe and search ready with zero hardwareWebinar: Keep legacy email data safe and search ready with zero hardware
Webinar: Keep legacy email data safe and search ready with zero hardware
 
Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management Webinar: Small businesses and the cost of poor data management
Webinar: Small businesses and the cost of poor data management
 
Webinar: Worried about privacy of your data on public cloud - Bring your own key
Webinar: Worried about privacy of your data on public cloud - Bring your own keyWebinar: Worried about privacy of your data on public cloud - Bring your own key
Webinar: Worried about privacy of your data on public cloud - Bring your own key
 
Email Mastery Series: How an Email Archival Solution can improve an Organisat...
Email Mastery Series: How an Email Archival Solution can improve an Organisat...Email Mastery Series: How an Email Archival Solution can improve an Organisat...
Email Mastery Series: How an Email Archival Solution can improve an Organisat...
 
Webinar Mastery Series: Email Retention Regulations in India and How Business...
Webinar Mastery Series: Email Retention Regulations in India and How Business...Webinar Mastery Series: Email Retention Regulations in India and How Business...
Webinar Mastery Series: Email Retention Regulations in India and How Business...
 
Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...
Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...
Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...
 
Mastery Webinar Series: Strategies to Simplify Email Data Management
Mastery Webinar Series: Strategies to Simplify Email Data ManagementMastery Webinar Series: Strategies to Simplify Email Data Management
Mastery Webinar Series: Strategies to Simplify Email Data Management
 
Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...
Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...
Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...
 
Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat
Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat
Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat
 
Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...
Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...
Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...
 
AWS - Why cloud is the best platform for securely managing large data
AWS - Why cloud is the best platform for securely managing large dataAWS - Why cloud is the best platform for securely managing large data
AWS - Why cloud is the best platform for securely managing large data
 
Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery
Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery
Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery
 
Case Study: T and T Motor's Success Story With Vaultastic
Case Study: T and T Motor's Success Story With VaultasticCase Study: T and T Motor's Success Story With Vaultastic
Case Study: T and T Motor's Success Story With Vaultastic
 
Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...
Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...
Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...
 
Case Study: Cashpor Micro Credit's Success Story with Vaultastic
Case Study: Cashpor Micro Credit's Success Story with Vaultastic Case Study: Cashpor Micro Credit's Success Story with Vaultastic
Case Study: Cashpor Micro Credit's Success Story with Vaultastic
 
Featured Webinar: How Cashpor increased their mail service performance by ado...
Featured Webinar: How Cashpor increased their mail service performance by ado...Featured Webinar: How Cashpor increased their mail service performance by ado...
Featured Webinar: How Cashpor increased their mail service performance by ado...
 
Cashpor Micro Credit - Increasing mail service performance with cloud email a...
Cashpor Micro Credit - Increasing mail service performance with cloud email a...Cashpor Micro Credit - Increasing mail service performance with cloud email a...
Cashpor Micro Credit - Increasing mail service performance with cloud email a...
 

Recently uploaded

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 

Recently uploaded (20)

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 

3 simple strategies to preserve and manage unstructured data of former employees

  • 1. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. 3 Simple Strategies to Preserve & Manage unstructured data of former employees SUNIL UTTAM Co-founder & Principal Solution Architect Mithi Software Technologies. Connect with Sunil DEC 19 2019 12:00 NOON - 12:45 PM IST
  • 2. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Welcome to another Mithi Webinar Webinars delivering the best value for your time & attention with Simple, Practical, directly Applicable Insights, Strategies, Methods Some quick reminders • Please Participate in the polls • Keep asking questions as we go, via the Questions Panel • Do rate us and take the survey at the end of the webinar • Download the deck if you like or anyways we’ll send you the deck and recording
  • 3. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Sunil Uttam Chief Solution Architect & co-founder Mithi Software Technologies Cloud Data Management - Simplified Sunil helps senior leaders, CIOs, CISOs to gain insights, understand risks, and map their digital data management journey via a well researched data driven approach and helps them transition from they are into a digitally Dexter future in manageable steps. Essentially, Sunil’s work focusses on listening to customers and simplifying data management for them with scalable, secure and cost optimized cloud based solutions.
  • 4. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Agenda • Why preserve data of former employees? • Common methods deployed today and their drawbacks • 3 Simple strategies to help you preserve and manage unstructured data better. • How the cloud can aid in your data management strategy • Your queries answered.
  • 5. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Poll Why do you want to preserve data generated by former employees? (Select all that apply) • For Audit readiness and regulation compliance • To capture and leverage the IP generated by the employee • For litigation readiness • The law requires this • For backup and restoration to help the successor
  • 6. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. 2 Kinds of Data Structured Data Typically stored in database records, generated from business work flow processes, codified via forms. Examples include Leads, quotations, customer information etc stored in a CRM system, Invoices, taxation information stored in a Billing system, Inventory, Vendor management, stored in an ERP system, etc. Unstructured Data Information assets such as documents, plans, designs, project conversations, communication (internal and external), Notes, Research, Data Sheets, Proposals, and more.
  • 7. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. By 2025, IDG projects that there will be 163 zettabytes of data in the world, and estimates indicate that 80% of this data is unstructured.
  • 8. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. With data as the new oil, companies have to: Control Access to the data/information assets Plan and Execute Information Security for Information assets Organise, Preserve and provide easy access to information assets
  • 9. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Structured data is typically centralised, and based on databases, making preservation natural and easy. Unstructured data is typically fragmented, distributed, uneven and spread across Internal and External file sharing and synchronisation systems
  • 10. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Collating, Organising, Classifying, Preserving and Accessing unstructured data is a nightmare. (Many times the organisation is unaware of the depth of assets created across their employees. These are invisible, unmapped and unavailable centrally when required)
  • 11. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. But in todays scenario, preserving data in an easily accessible form is not just mandatory for regulation compliance, knowledge management, forensic analysis and legal responses also a source of competitive advantage due to the ability to reuse knowledge from the corporate archive. BUT
  • 12. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. The most popular and deeply entrenched means of sharing information internally and externally is via email. Enter Email
  • 13. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. 60% of business-critical information is stored exclusively in email - IDC 4GB is the average annual growth in a user's archive account - Mithi 126 messages are expected to be sent and received, on average, per business user per day, by the end of 2019 - Radicati
  • 14. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. The total number of emails sent and received per day is forecasted to reach 306 Billion by 2020 - Radicati
  • 15. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. 70% of all emails carry business critical data and Information assets -IDG
  • 16. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. So a key component of an organisation's data management strategy has to be to ensure that all email are preserved and accessible on demand. In this webinar we focus our discussion to strategies for managing email data.
  • 17. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Common data management methods deployed today and their drawbacks
  • 18. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Data generated by employees are information assets belonging to the company and need to be preserved, managed on an ongoing basis in an Enterprise Information Architecture
  • 19. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. • Focus mainly on capturing the laptop when an employee leaves (assuming it has all the information) • Treat data archival of an exiting employee as a post mortem process • Allow the use of public file sharing and synchronisation tools (such as Gdrive, DropBox, etc) Common mistakes made by many organisations
  • 20. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. • The fragmented nature of Information assets makes it difficult to locate and collate after the employee has gone • The data is open to tampering or theft just before an employee leaves • Information assets saved on consumer file sharing apps like GDrive, OneDrive, dropbox etc may not be accessible to your organisation. • Information assets could have been transported outside your network via email Post mortem approach - Risky
  • 21. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Which of these strategies is your organization currently deploying to manage email data? (Select all that apply) Poll 1. Capturing snapshot backups of end points, periodically 2. Deploying Quota limits on email accounts 3. Many to one Email Journaling/Forwarding 4. Periodically moving old email data to PSTs 5. Other methods
  • 22. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Whether In Premise or on Cloud, What are some of the popular methods of email data management used Today?
  • 23. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Pre-requisite • You need to invest in a robust, scalable email backup solution • You need to invest in additional storage and tapes to keep backups • You need to invest in a multi site backup architecture with tapes, to maintain off site backups. Outcomes - Investment with poor ROI • Mail activity between backups is not captured • Not compliance ready - No guarantee that ALL email have been captured in the backups • Not Search or Restore ready - Searching and restoring an email by content, meta data from backups is a challenge • Keeping the backup storage and tapes, safe, secure and reliable is a challenge • Can at best recover to a point in time state of the mailbox or server • IT Team occupied with a low yield activity. • Users cannot help themselves restore their own mail typically. Capturing snap shot backups of end points, periodically
  • 24. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Process • Users & IT teams spend a lot of time cleaning mailboxes to contain storage bloat and compute overload • Users are forced to delete even important/critical email to maintain their mailbox within limits • Many organisations expect users to download their email locally (PST files) and then clean them from their mailboxes • Most users set an "auto forward" to their personal Gmail accounts to maintain backups Outcomes - End point Jungle with splintered data • Productivity loss with choosing, downloading and deleting email • Potential mail loss risk with locally stored critical data • Privacy risk with mail diverted to an inaccessible external email id. • No single point control, ownership and consolidated view of all email for the organisation since the data is all splintered across end points. Deploying Quota limits on email accounts to control mailbox bloat and cost
  • 25. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Process • Journal a copy of every mail sent/received to a central, single journal email id (typically another mailbox on same system) • Configures a desktop email client to POP mail from this journal email ID into a local PC to create PST files/EML files. • Backup the PST files to a secondary storage & rotate regularly Outcomes • A Security tick mark - No practical use of this data in compliance and knowledge discovery use cases. • Notional data safety - Safety, Security and Reliability of the PST files on the local PC is another challenge • Not search ready - Data of all users mixed up in one account, splintered across PST files, making it challenging to locate and download selected data • Not recovery ready - Collating and restoring mailboxes from splintered PST files, can be a hairball and time consuming Many to one Email Journaling, coupled with download to a client PC Data Management Strategy: Many to One Email Journaling
  • 26. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Process • Configure MS Outlook, Thunderbird to automatically move mail older than a date to a local store • This mail is also removed from the server mailbox. Outcomes • For a business, this method means loss of control on the mail data • A business cannot easily access discover in these files distributed across client devices (possibly across geographies) • Keeping these archive files safe, secure and reliable is a challenge Email Client Archival to move old email data to PSTs
  • 27. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. After an employee leaves, organizations are doing one or more of the following 1. Deleting the email (and the knowledge in it) since there is no way to maintain these email 2. Disabling the account but retaining the mailbox in a suspended state (and paying for this) 3. Downloading email from the account as PST/EML files, storing locally, and deleting the account from the primary mailbox. 4. Retaining the end point backups of the mailboxes from the client devices Typically the local PST/EML file sets or end point backups are retained for the long term on external disks, tapes.
  • 28. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. 3 Simple Strategies to manage unstructured data
  • 29. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Strategy 1: For Documents, Files
  • 30. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Employees continue to use consumer online file-sharing tools for sensitive documents, even when their company has banned the use of such tools. Challenges for managing Documents and Files However, this means that ECM program managers have no control over content and sometimes don't even know that employees are using these tools Using such tools also enables them to collaborate with their business partners, such as contractors, temporary staff and contacts in other companies.
  • 31. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. • Introduce EFSS tools (Enterprise File sharing and Synchronisation) as the preferred (mandatory) method to share files with colleagues, partners and customers. • Help users transition from using public tools to internal EFSS tools Recommendations
  • 32. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Enterprises that invest wisely in EFSS capabilities will enable a more collaborative workplace with easy information sharing, while reducing or avoiding the security and compliance threats associated with using "consumer" cloud services. They'll also benefit from increased workforce productivity, reduced email traffic/size and reduced costs. Outcomes
  • 33. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Live Case Study – How we do it at Mithi Reduction of internal email traffic by over 80%, reduced Data Risk and improved team productivity by over 300%
  • 34. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Top Benefits of using an EFSS tool (like Ideolve) • All information assets generated by anybody within the organisation are available in a central organisation level store • Conversations for each information asset all stored and tracked with the Information Asset (IA) • Version tracking of Information Assets • IAs are captured, organised and maintained on an ongoing basis and not collected after the fact from devices of former employees • When an employee leaves, simply transfer ownership of all IAs with the successor
  • 35. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Strategy 2: For Legacy Email
  • 36. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Whenever you start your Data Migration journey, you will have some legacy email data, most of which carries business critical data, to be preserved and accessible for reuse, during litigations and audits.
  • 37. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Legacy email is typically lying around In the active mailboxes of users Downloaded in the desktop email clients of users Downloaded in PST/EML files on drives, tapes and other storage mediums
  • 38. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Risk fraught approach - Keeps the doors open for tampering - High chance of data theft, loss or corruption - Difficult to manage and maintain offline storage devices
  • 39. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Store the email data in raw native file formats on some safe cloud store. • These email are not discoverable directly from the store • A cataloging mechanism must be devised and maintained to for the mail data of each user Outcomes • Safe, Elastic, Secure data store • Central, controlled repository • Search and Retrieve data on-demand (albeit not instantly) Recommendation for Infrequent access 1
  • 40. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Recommendation for Infrequent access
  • 41. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. 2 Store the email data in an online, search ready format on the cloud • Upload/Import historical data directly from the live mailbox of the employee • Upload/Import historical data from PST/EML/MBOX files. Outcomes • Safe, Elastic, Secure and indexed data store • Central, controlled repository • Data is automatically indexed, search ready and ready for export on demand. Recommendation for Frequent access
  • 42. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Recommendation 2 for Frequent access
  • 43. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Active Employee Live mail archiving Employee leaves Shift plan to HOLD Hold for life or sunset as required Active Employee Employee leaves Migrate data from mailbox to HOLD Delete primary mailbox Hold for life or sunset as required Hold for life or sunset as required Dump Legacy data in PST/EML Import data into HOLD 3 simple processes to manage the entire legacy data life cycle from creation to destruction Active Employee Employee leaves
  • 44. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Live Case Study – How a leading Financial services company saves on Gsuite costs & stays compliance ready. Challenge • Rapid attrition and onboarding of employees • Data of ex-employees needs preservation • Keeping account disabled on Gsuite costly Solution • As employee leaves, migrate email to a cloud cold store • Delete user account from Gsuite to optimize costs Outcomes • Safe secure cloud data store, resulting in 70% cost saving Over a year the company has preserved data of 700 ex- employees on the cloud totalling about 20TB and saved over 200K USD annually on Gsuite licenses
  • 45. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Strategy 3: Hierarchical Storage
  • 46. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. A Hierarchical storage architecture, combines two solutions: • Your primary solution and • A cloud archival solution.
  • 47. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. A Hierarchical storage architecture, splits the mailbox of a user into two: • One a live mail store on the primary mail solution retaining mail only for a small period and • Two a archive mail store on a cloud archiving platform, having all the mail retained for the long term What is a Hierarchical Storage Architecture?
  • 48. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Here’s how it works
  • 49. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Top Benefits of using a Hierarchical Storage Architecture • Leaner, higher performing primary mailboxes • Better storage management on on-premise mail solutions • All data captured and safe • A central repository to prevent data loss, set up automatic governance rules and enable multiple levels of access based on the user's role in the organization. • Automatically the organisation is better equipped for compliance, audits, knowledge sharing and successor management • When an employee leaves, simply transfer ownership of the Vault to the successor
  • 50. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Live Case Study – How a Micro Finance company preserved investment on MS Exchange & Secured the Data Challenge • Rapidly filling mailboxes on MS Exchange • Degrading server performance and user access • Expensive upgrade path Solution • Secure a copy of all data on the cloud, in flight • Apply a retention policy on primary mailboxes to lean them Outcomes An improved performance on the legacy MS Exchange server, along with data security, safety and improved compliance posture
  • 51. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Key Takeaways
  • 52. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. 81% organizations are opting for SaaS cloud solutions to drive their workloads & gain from SLA backed guarantees. 81%
  • 53. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. • A proactive strategy to capture information as it is generated will be superior to looking for all the information once the employee leaves. • An enterprise information architecture and structure is critical to have in place. • Managing unstructured data is the major chunk of your data management initiative • Preserving all Email is a critical path in your data management journey • Store data on a SaaS cloud email archival platform for improved reliability, durability, security and life cycle management of the data. • Store legacy email in raw file formats on a cloud store if there no frequent requirement to discover or recover individual emails. • Archive all email, in flight, to get a grip on 70% of your business critical information • Use EFSS tools and discourage consumer cloud based file sharing apps
  • 54. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. The Mithi Advantage Serving demanding Enterprise customers for nearly 2 decades
  • 55. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. • I need an email system on my own brand, which is business class, reliable, guaranteed, and secure • I want to Optimize email solution costs on O365, Gsuite with a hybrid email setup • Email is a poor tool for collaboration and sharing documents, with duplication, splintering and bloating mailboxes. I want a secure, private, corporate EFSS tool to share files with colleagues, customers and partners • I want to optimize storage and performance on my primary mail server/solution Flexible, Secure, Scalable Cloud Email and Team Collaboration platform to help you improve Digital Dexterity In your work place Communication & Collaboration
  • 56. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. • I am finding it difficult to secure, and locate fragmented information when needed. I want to improve our organisation's compliance posture and be audit ready at all times? • I am using a legacy mail platform like Exchange and am running out of storage, hitting performance bottlenecks, running a data loss risk and finding data is a pain. • I want to reduce risks of vendor lock in when using one of the big cloud email solutions like O365 or Gsuite. • I have migrated to a cloud solution like O365/Gsuite but I need to preserve my legacy email data in a search ready form without incurring heavy costs. • I am changing my mail solution provider and need help to migrate my email data between the solutions. • I want to selectively retrieve email data from my primary mail platform (Exchange, O365, Gsuite, Zimbra…etc) or Vaultastic accounts for multiple users • I use GSuite or O365 and have a lot of employee churn. I need to preserve data of exit employees by policy and keeping it on GSuite/O365 is an expensive affair. Data Management Cloud Data Management - Simplified
  • 57. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. • I am using an on-premise Exchange, Zimbra, or other mail server and am concerned about the safety and security of my data, which is fragmented across user accounts and multiple end points. • I am using an on-premise Exchange, Zimbra, or other mail server and am facing problems related to spam, viruses, ransomware, etc • I am using an on-premise Exchange, Zimbra, or other mail server but am concerned about business continuity since I don’t have redundancies or a DR Site. Email security, continuity and durability solutions for your Email Setup Security
  • 58. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. BUILDING BLOCKS FOR OUR SOLUTIONS vaultastic .mithi.com Secure Email Archiving Solutions for Compliance, Ediscovery & Backup Automation Skyconnect.mithi.com Secure, Dependable, Scalable Email for Business Communications ideolve.mithi.com Uncomplicate your Team Collaboration. Get more done. Guaranteed Email Security & Disaster Recovery for Uninterrupted Business. Clrstream.mithi.com Legacyflo.mithi.com Email Data Migration made easy. Automatic, Reliable, Handsfree
  • 59. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Trust & compliance support Well architected for Regular Independent Security & VAPT audits
  • 60. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Connectors for vaultastic -
  • 61. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Availability ONLINE Over 50 active resellers DISTRIBUTORS SYSTEM INTEGRATORS
  • 62. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Ask your questions Ask Your Questions
  • 63. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Stay up to speed on related topics Latest updates and news on Mithi products @ View upcoming and on-demand Mithi Webinars @ https://blog.mithi.com/category/webinars/ Follow our company page and stay updated https://www.linkedin.com/company/118227/ https://blog.mithi.com/category/news-and-events/
  • 64. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Before you go Rate this presentation Download the presentation slides Submit
  • 65. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Thank You for your trust We love making things better for you For more information visit www.mithi.com Drop in your queries at sales@mithi.com