The document discusses approaches for enabling scalable enterprise search in a secure collaborative environment. It outlines four key building blocks: 1) Manage content by applying consistent classification and metadata; 2) Eliminate end users by addressing processes rather than user behavior; 3) Apply metadata-driven policies to protect data at risk; and 4) Identify and tag assets for storage and preservation using metadata-driven policies rather than relying on end users. The presentation provides examples of challenges organizations face with ineffective search and lack of information governance.
Accellion Infographic: The Effects of Mobile on the EnterpriseProofpoint
Did you know that as smartphone use increases in a particular industry, the number of data breaches rise as well? Enterprises want their employees to use mobile devices, but the data security concerns can be overwhelming. How do enterprise IT departments enable secure mobile productivity amongst their workers?
View The Effects of Mobile on the Enterprise to learn more.
M&A prosposal to Warburg Pincus to spin out Convera Search assets. Ultimately Convera Search was acquired for $18M by FAST and served as basis of Microsoft acquisition of FAST for $600M.
Data centric security key to digital business success - ulf mattsson - bright...Ulf Mattsson
With the exponential growth of data generation and collection stemming from new business models fueled by Big Data, cloud computing and the Internet of Things, we are potentially creating a cybercriminal's paradise where there are more opportunities than ever for that data to end up in the wrong hands. The biggest challenge in this interconnected world is merging data security with data value and productivity. If we are to realize the benefits promised by these new ways of doing business, we urgently need a data-centric strategy to protect the sensitive data flowing through these digital business systems. In this webinar, Ulf Mattsson explores these issues and provides solutions to bring together data insight and security to safely unlock the power of digital business.
Fool Proof: Protecting Digital Identity in the Age of the Data BreachPriyanka Aash
In the age of the data breach there are no more secrets. Name, address, date of birth and Social Security number have been the de facto identity attributes for years. But as this information has become more exposed it’s time for organizations to rethink identity proofing and take a more holistic approach to knowing who they are doing business with online.
Learning Objectives:
1: Learn why there are no more secrets.
2: Discover why we must stop relying on traditional attributes for ID proofing.
3: Learn to take a holistic view of identity proofing.
(Source: RSA Conference USA 2018)
Accellion Infographic: The Effects of Mobile on the EnterpriseProofpoint
Did you know that as smartphone use increases in a particular industry, the number of data breaches rise as well? Enterprises want their employees to use mobile devices, but the data security concerns can be overwhelming. How do enterprise IT departments enable secure mobile productivity amongst their workers?
View The Effects of Mobile on the Enterprise to learn more.
M&A prosposal to Warburg Pincus to spin out Convera Search assets. Ultimately Convera Search was acquired for $18M by FAST and served as basis of Microsoft acquisition of FAST for $600M.
Data centric security key to digital business success - ulf mattsson - bright...Ulf Mattsson
With the exponential growth of data generation and collection stemming from new business models fueled by Big Data, cloud computing and the Internet of Things, we are potentially creating a cybercriminal's paradise where there are more opportunities than ever for that data to end up in the wrong hands. The biggest challenge in this interconnected world is merging data security with data value and productivity. If we are to realize the benefits promised by these new ways of doing business, we urgently need a data-centric strategy to protect the sensitive data flowing through these digital business systems. In this webinar, Ulf Mattsson explores these issues and provides solutions to bring together data insight and security to safely unlock the power of digital business.
Fool Proof: Protecting Digital Identity in the Age of the Data BreachPriyanka Aash
In the age of the data breach there are no more secrets. Name, address, date of birth and Social Security number have been the de facto identity attributes for years. But as this information has become more exposed it’s time for organizations to rethink identity proofing and take a more holistic approach to knowing who they are doing business with online.
Learning Objectives:
1: Learn why there are no more secrets.
2: Discover why we must stop relying on traditional attributes for ID proofing.
3: Learn to take a holistic view of identity proofing.
(Source: RSA Conference USA 2018)
How to protect the cookies once someone gets into the cookie jarJudgeEagle
A new and innovative software solution designed to protect sensitive data stored in a company's database from breaches that goes beyond mere data encryption and significantly increases the level of protection of their sensitive data.
A Study on Big Data Privacy Protection Models using Data Masking Methods IJECEIAES
In today’s predictive analytics world, data engineering play a vital role, data acquisition is carried out from various source systems and process as per the business applications and domain. Big Data integrates, governs, and secures big data with repeatable, reliable, and maintainable processes. Through volume, speed, and assortment of information characteristics try to reveal business esteem from enormous information. However, with information that is frequently deficient, conflicting, ungoverned, and unprotected, which is hazardous and enormous information being a risk instead of an advantage. What's more, with conventional methodologies that are manual and unpredictable, huge information ventures take too long to acknowledge business esteem. Reasonably and over and again conveying business esteem from enormous information requires another technique. In this connection, raw data has to be moved between onsite and offshore environment during this course of action, data privacy is a major concern and challenge. A Big Data Privacy platform can make it easier to detect, investigate, assess, and remediate threats from intruders. We tried to do complete study of Big Data Privacy using data masking methods on various data loads and different types. This work will help data quality analyst and big data developers while building the big data applications.
Understanding human information
•Access and understand virtually any source of information on-premise and in the cloud
•A strategic pillar of HP’s HAVEnBig Data platform
•Non-disruptive, manage-in-place approach complements any organization
Extract the Analyzed Information from Dark Dataijtsrd
The world is surrounded by data and data, the data may be structured, unstructured, or semi structured every organization generates enormous data daily, only the tip of data is analyzed, and the larger the data is ignored from the utilizable analysis. This paper focuses on a particularly unstructured and bothersome class of data, termed Dark data. Dark data is not attentively analyzed, indexed, and stored, so it becomes nearly imperceptible to potential users and therefore is more likely to last neutralized and eventually lost. This paper discusses how the concepts of long term specifically use of analyzed for all intents and purposes dark data can be used to generally understand the very possible solutions for better curation of dark data in a major way. This paper describes why this class of data is so critical to scientific progress, some of the properties of this dark data, as well as the technical difficulties to useful management of this class of data. Many probable useful institutional and technical solutions are under development which will show in this paper in the last section, but these solutions are mainly conceptual and require additional research during lack of resources. Rahul P | Ganeshan M "Extract the Analyzed Information from Dark Data" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30842.pdf Paper Url :https://www.ijtsrd.com/computer-science/data-processing/30842/extract-the-analyzed-information-from-dark-data/rahul-p
Emerging application and data protection for multi cloudUlf Mattsson
Emerging Application and Data Protection for Multi-Cloud
Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data. The good news is that these data privacy regulations compel businesses to get a handle on personal data - how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers. The new Verizon Data Breach Investigations Report (DBIR) provides perspectives on how Criminals simply shift their focus and adapt their tactics to locate and steal the data they find to be of most value. This session will discuss Emerging Application and Data Protection for Multi-cloud and review Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation.
Data Insight 4.0 is the latest version of Symantec's unstructured data governance solution. It provides actionable intelligence into the ownership and usage of unstructured data, such as documents, presentations, spreadsheets and emails. Symantec Data Insight 4.0 provides new discovery, analysis and remediation capabilities to help organizations better reduce costs, reduce risk, achieve compliance and gain insights into their unstructured data. More Info: http://bit.ly/13ct35w
Fast Data Mining: Real Time Knowledge Discovery for Predictive Decision MakingCodemotion
Fast Data as a different approach to Big Data for managing large quantities of “in-flight” data that help organizations get a jump on those business-critical decisions. Difference between Big Data and Fast Data is comparable to the amount of time you wait downloading a movie from an online store and playing the dvd instantly.
Data Mining as a process to extract info from a data set and transform it into an understandable structure in order to deliver predictive, advanced analytics to enterprises and operational environments.
The combination of Fast Data and Data Mining are changing the “Rules”
Personalized Diversification of Search Resultsdavidvallet
Search personalization and diversification are often seen as oppos-ing alternatives to cope with query uncertainty, where, given an ambiguous query, it is either preferable to adapt the search result to a specific aspect that may interest the user (personalization) or to regard multiple aspects in order to maximize the probability that some query aspect is relevant to the user (diversification). In this work, we question this antagonistic view, and hypothesize that these two directions may in fact be effectively combined and enhance each other. We research the introduction of the user as an explicit random variable in state of the art diversification methods, thus developing a generalized framework for personalized diversi-fication. In order to evaluate our hypothesis, we conduct an evalu-ation with real users using crowdsourcing services. The obtained results suggest that the combination of personalization and diver-sification achieves competitive performance, improving the base-line, plain personalization, and plain diversification approaches in terms of both diversity and accuracy measures.
How to protect the cookies once someone gets into the cookie jarJudgeEagle
A new and innovative software solution designed to protect sensitive data stored in a company's database from breaches that goes beyond mere data encryption and significantly increases the level of protection of their sensitive data.
A Study on Big Data Privacy Protection Models using Data Masking Methods IJECEIAES
In today’s predictive analytics world, data engineering play a vital role, data acquisition is carried out from various source systems and process as per the business applications and domain. Big Data integrates, governs, and secures big data with repeatable, reliable, and maintainable processes. Through volume, speed, and assortment of information characteristics try to reveal business esteem from enormous information. However, with information that is frequently deficient, conflicting, ungoverned, and unprotected, which is hazardous and enormous information being a risk instead of an advantage. What's more, with conventional methodologies that are manual and unpredictable, huge information ventures take too long to acknowledge business esteem. Reasonably and over and again conveying business esteem from enormous information requires another technique. In this connection, raw data has to be moved between onsite and offshore environment during this course of action, data privacy is a major concern and challenge. A Big Data Privacy platform can make it easier to detect, investigate, assess, and remediate threats from intruders. We tried to do complete study of Big Data Privacy using data masking methods on various data loads and different types. This work will help data quality analyst and big data developers while building the big data applications.
Understanding human information
•Access and understand virtually any source of information on-premise and in the cloud
•A strategic pillar of HP’s HAVEnBig Data platform
•Non-disruptive, manage-in-place approach complements any organization
Extract the Analyzed Information from Dark Dataijtsrd
The world is surrounded by data and data, the data may be structured, unstructured, or semi structured every organization generates enormous data daily, only the tip of data is analyzed, and the larger the data is ignored from the utilizable analysis. This paper focuses on a particularly unstructured and bothersome class of data, termed Dark data. Dark data is not attentively analyzed, indexed, and stored, so it becomes nearly imperceptible to potential users and therefore is more likely to last neutralized and eventually lost. This paper discusses how the concepts of long term specifically use of analyzed for all intents and purposes dark data can be used to generally understand the very possible solutions for better curation of dark data in a major way. This paper describes why this class of data is so critical to scientific progress, some of the properties of this dark data, as well as the technical difficulties to useful management of this class of data. Many probable useful institutional and technical solutions are under development which will show in this paper in the last section, but these solutions are mainly conceptual and require additional research during lack of resources. Rahul P | Ganeshan M "Extract the Analyzed Information from Dark Data" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30842.pdf Paper Url :https://www.ijtsrd.com/computer-science/data-processing/30842/extract-the-analyzed-information-from-dark-data/rahul-p
Emerging application and data protection for multi cloudUlf Mattsson
Emerging Application and Data Protection for Multi-Cloud
Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data. The good news is that these data privacy regulations compel businesses to get a handle on personal data - how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers. The new Verizon Data Breach Investigations Report (DBIR) provides perspectives on how Criminals simply shift their focus and adapt their tactics to locate and steal the data they find to be of most value. This session will discuss Emerging Application and Data Protection for Multi-cloud and review Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation.
Data Insight 4.0 is the latest version of Symantec's unstructured data governance solution. It provides actionable intelligence into the ownership and usage of unstructured data, such as documents, presentations, spreadsheets and emails. Symantec Data Insight 4.0 provides new discovery, analysis and remediation capabilities to help organizations better reduce costs, reduce risk, achieve compliance and gain insights into their unstructured data. More Info: http://bit.ly/13ct35w
Fast Data Mining: Real Time Knowledge Discovery for Predictive Decision MakingCodemotion
Fast Data as a different approach to Big Data for managing large quantities of “in-flight” data that help organizations get a jump on those business-critical decisions. Difference between Big Data and Fast Data is comparable to the amount of time you wait downloading a movie from an online store and playing the dvd instantly.
Data Mining as a process to extract info from a data set and transform it into an understandable structure in order to deliver predictive, advanced analytics to enterprises and operational environments.
The combination of Fast Data and Data Mining are changing the “Rules”
Personalized Diversification of Search Resultsdavidvallet
Search personalization and diversification are often seen as oppos-ing alternatives to cope with query uncertainty, where, given an ambiguous query, it is either preferable to adapt the search result to a specific aspect that may interest the user (personalization) or to regard multiple aspects in order to maximize the probability that some query aspect is relevant to the user (diversification). In this work, we question this antagonistic view, and hypothesize that these two directions may in fact be effectively combined and enhance each other. We research the introduction of the user as an explicit random variable in state of the art diversification methods, thus developing a generalized framework for personalized diversi-fication. In order to evaluate our hypothesis, we conduct an evalu-ation with real users using crowdsourcing services. The obtained results suggest that the combination of personalization and diver-sification achieves competitive performance, improving the base-line, plain personalization, and plain diversification approaches in terms of both diversity and accuracy measures.
Introduction to SharePoint Information ArchitectureGregory Zelfond
SharePoint Information Architecture is the art and science of organizing and labeling the content (documents, data, sites) to support findability and usability
70% of all security breaches are due to an organization’s own staff. Register for this webinar and find out how not to become a statistic. Security is increasingly becoming a significant challenge, regarding how ensuring unstructured and semi-structured content is protected, and also the security rights of the individuals within the organization that need to be given or denied rights to organizational assets.
This Concept Searching webinar will focus on all aspects of security in a SharePoint environment, using native SharePoint tools, conceptClassifier for SharePoint, or integrated with your security application. conceptClassifier for SharePoint and conceptClassifier for Office 365 deliver semantic metadata generation, auto-classification, and taxonomy tools integrated natively with the SharePoint Term Store.
How does it work with privacy and confidential content? The products identify unknown security or confidential exposures in real-time from diverse repositories. Identification of not only standard descriptors but also organizationally defined vocabulary can also be identified. Once identified they are routed to a repository and removed from unauthorized access and portability.
Organizations are beginning to recognize that search is not a stand-alone technology or application, but must be integrated with business processes and corporate objectives as a key infrastructure component.
Why? Providing enriched metadata to the search engine index significantly improves search applications, eDiscovery, FOIA requests, and collaboration.
In this webinar COMPU-DATA International and Concept Searching will demonstrate their combined offering that uses unique, language independent technology and integrated enterprise metadata repository management, to deliver intelligent metadata enabled search.
What you will learn about during this session:
• How our innovative technology delivers both high precision and high recall, using industry unique compound term processing
• How to accomplish federated search as content is created or ingested
• How to enable true concept based searching
• How to eliminate end user tagging
• How to integrate the combined solution with any search engine including SharePoint, the former FAST products, Google Search Appliance, IBM Vivisimo, and Solr
• How the combined solution can be extended to address records identification, protection of privacy information, migration, and text analytics with the same technology
• Benefit from industry-specific use cases:
• Developing a powerful search solution for the US Army, creating easy access to millions of records, with an integrated solution to consolidate many data sources, accessing high volumes of data
• Solving search, migration, records management, and data privacy challenges to manage the intranet for a global company which designs, manufactures, and distributes appliances to more than 70 countries
Why Metadata Matters in SharePoint Search and Information Governance WebinarConcept Searching, Inc
Explore innovative approaches to leverage your SharePoint investment and discover how other SharePoint organizations are solving the challenges of information governance in SharePoint and in Office 365.
Join Cem Aykan, Senior Product Manager Search at Microsoft and Don Miller, VP of Commercial Accounts at Concept Searching for this one hour webinar.
• Understand the direction of SharePoint Search and the impact and changing landscape of Microsoft’s focus on the cloud and Office 365
• Obtain a high level view of the importance of metadata in search, records management, data privacy, eDiscovery, litigation support, text analytics, and social content and collaboration
• Find out how you can eliminate manual tagging and develop an enterprise metadata repository to solve all your information governance challenges
• See the award winning conceptClassifier for SharePoint platform in action and how it addresses information governance – on-premise, in the cloud, and in hybrid environments
Discovery, risk, and insight mean something different to every organization, even at different locations within the same company.
Do you find answers by trial and error? Do you stumble across information, or find it when it is too late to make good use of it? In this session Concept Searching and technology partner, Netwrix, give a detailed view of risk mitigation for data security, compliance, and operational intelligence.
With the combination of the conceptClassifier platform and Netwrix Auditor, see firsthand the automatic generation and use of semantic metadata. The overview of this state-of-the-art solution shows how to proactively prepare to mitigate risk, regardless of where or why it occurs.
Speakers:
Robert Piddocke – Vice President of Channel and Business Development at Concept Searching
Ilia Sotnikov – Vice President of Product Management at Netwrix
Jeff Melnick – Manager of Sales Engineering at Netwrix
Metadata used to be an afterthought. Now, metadata is a pre-requisite and the optimal mechanism to drive business processes like security and records and, of course, to manage content.
In this session Robert Piddocke, our Vice President of Channel and Business Development – passionate about information management, and author of books on SharePoint Search – explores how going meta helps transcend typical metadata use.
Robert discusses SharePoint functionality and what needs to be put in place to deploy a metadata-driven enterprise and build a framework for the future, and how metadata can be used to automate and drive business processes, and proactively manage content.
Speaker:
Robert Piddocke – Vice President of Channel and Business Development at Concept Searching
How to achieve high search satisfaction from intranet focus ltd ssifocus
Presentation to an intranet conference in Sweden in Dec. 2012 on why good enterprise search is so important. Includes some survey data and 12 success factors based on my book 'Enterprise Search' published by O'Reilly Media
Data Profiling: The First Step to Big Data QualityPrecisely
Big data offers the promise of a data-driven business model generating new revenue and competitive advantage fueled by new business insights, AI, and machine learning. Yet without high quality data that provides trust, confidence, and understanding, business leaders continue to rely on gut instinct to drive business decisions.
The critical foundation and first step to deliver high quality data in support of a data-driven view that truly leverages the value of big data is data profiling - a proven capability to analyze the actual data content and help you understand what's really there.
View this webinar on-demand to learn five core concepts to effectively apply data profiling to your big data, assess and communicate the quality issues, and take the first step to big data quality and a data-driven business.
Back by popular demand, this webinar shows the features and functions that transform traditional taxonomy building into a high-value suite of interactive tools, to simplify content management and drive business processes.
The session shows the taxonomy building process with conceptTaxonomyManager, using automatically generated semantic metadata, and illustrating how easy it is to add taxonomy nodes manually. The product is designed for subject-matter experts, requires little training, and enables productivity from the day that auto-classification begins.
This webinar explores how easy and robust the unique taxonomy component is, and demonstrates automatic generation of metadata, auto-classification to a taxonomy, and how to manage metadata.
Speaker:
Michael Paye – Chief Technology Officer at Concept Searching
Federated Search Webinar for SLA (Special Libraries Assoc.)Helen Mitchell
A comprehensive presentation on Federated Search (FS) Technologies including the types of FS, FS Challenges & Benefits, a case study, FS Evaluation Criteria, Examples of FS Solutions, Best Practices and Future Vision of where FS Technologies may go.
Concept Searching ConceptClassifier For SharePoint
KMWorld Martin Briefing
1. Enterprise Search. Approaches to enable effective
Scalability in a secure collaborative environment.
KM World 2011
Concept Searching, a Microsoft Managed ISV
Martin Garland, President and Founder
Concept Searching Inc.
marting@conceptsearching.com
+1 703 531 8567
Twitter @conceptsearch
www.conceptsearching.com
2. Agenda
Is Enterprise Search doomed to failure?
What is scalability?
What is the ‘real’ question?
What is the ‘real’ problem?
What is Enterprise Content?
How much unstructured data to you have?
Building Block #1 – Manage your content
Building Block #2 – Eliminate the end user
Building Block #3 – Protect data at risk
Building Block #4 - Identify and tag your assets for storage and preservation
How others are doing it
Technology
Recommendations
Case Studies
Who we are
www.conceptsearching.com
3. Is Enterprise Search
doomed to failure?
In spite of 10 years of advances in Enterprise Search products, less than
22% of organizations have purchased the technology (Down from 24% in
2008)
Less than 10% use it searching more than four data sources
56% rank search at the bottom third of their project lists
(Go Rogue With Enterprise Search, Information Week)
Many factors contribute to the inability of workers to find unstructured
information including: redundant and out-of-date content, incomplete
search scope, lack of information retrieval expertise and lack of
information governance (Forrester)
Solutions still fall short of end user expectations (Enterprise Search is not
Google)
Show me the ROI
Why?
www.conceptsearching.com
4. What is scalability?
Scalability?
Performance
Number of documents
Types of documents
Number of users
Number of documents, web pages, records
Geographic footprint
File types, number of applications
Functionality (bells, whistles, must haves,
nice to haves)
Steve Weissman, Principal Analyst at consulting firm Holly Group
and President of AIIM’s New England Chapter
www.conceptsearching.com
5. What is the ‘real’ question?
What do I need for scalable Enterprise Search?
OR…
What do I need for scalable Enterprise Search with meaningful results?
“By itself the search function has limited value. The real value of
search and information access technologies is in the ongoing efforts
needed to establish effective taxonomies, to index and classify
content of all kinds, in order to provide meaningful results.”
Tom Eid, Technology and Research VP at Gartner
www.conceptsearching.com
7. How much unstructured data do
you have?
80% of Enterprise Data is Unstructured (IBM)
60% of Documents are Obsolete (e.Law) Building Block #1
50% of Documents are Duplicates (equivio)
40%+ Annual Growth (Ventana Research) Manage Your Content
In 2009 there were 100,000,000 SharePoint users Consistent Classification to the
(Microsoft)
Every day for the past 5 years 20,000 new SP users Corporate Structure
(Microsoft)
One in five users has access to SharePoint
(Microsoft)
www.conceptsearching.com
8. What happens today
Access
Rights
Records
Retention
Code Server Content with
Metadata
Appropriate Metadata, Document Library 1 Document Library 2
Tagging Retention Codes, and
Rights Management
Templates
Document Library 3 Document Library 4
www.conceptsearching.com
www.conceptsearching.com
9. • Limiting Factor = Human Behavior
• Incorrect Metadata Incorrect Content Type Incorrect Policy Application
Access
Rights
Records
Retention
Code Server Content with
Metadata
Appropriate Metadata, Document Library 1 Document Library 2
Tagging Retention Codes, and
Rights Management
Templates
Document Library 3 Document Library 4
www.conceptsearching.com
www.conceptsearching.com
10. You say potato I say potahto
Less than 50% of content is correctly indexed, meta
tagged or efficiently searchable (IDC)
85% of relevant documents are never
retrieved in search (IDC)
End users - subjective, in a hurry, disinterested, etc.
Align Content with Corporate Goals or Mission
Building Block #2 – Eliminate the End User
Address the Process not the Behavior
www.conceptsearching.com
11. Metadata and Transparency
Natural Language Query on Search Solution with semantic metadata applied to all content -
Do caskets need to be pressurized?
www.conceptsearching.com
14. Same Query on Platform with
poorly applied Metadata
www.conceptsearching.com
15. Same Query on Platform w/no
Metadata Tagging
www.conceptsearching.com
16. Must use keywords to find document
when no metadata is applied
www.conceptsearching.com
17. What is more stressful than getting
a divorce or losing your job?
72% of IT Managers felt protecting company data is more
stressful than getting a divorce, losing your job, managing
personal debt, or being in a minor car accident (Websense
Survey)
Typically IT has not been involved in the security process
details (Websense Survey)
70% of breaches are due to a mistake or malicious intent by
end users, 88% are attributed to negligence (Wharton Information
Security Best Practices Conference)
Average cost per exposed record is $197 and ranges from
$90 to $305 (Ponemon Institute)
Average loss in value of brand ranges from $184 million to
$330 million+ (17% - 31% decline) (Ponemon Institute)
Leverage Content Types to drive Information Rights
Management
Building Block #3 – Apply Metadata Driven Policies
To Protect Data at Risk
www.conceptsearching.com
18. What happens when appropriate
policies are not applied to captured
content?
Protected Health
Travel Vouchers Alpha Rosters
Information
Operational Security Documents of
Duty Rosters
Information Record
Server Content with
No Semantic,
Retention Code, and
Security Metadata Web Servers/Collaboration Portals
www.conceptsearching.com
19. Those darn end users, they
just don’t get it!
67% of data loss in records management is
due to end user error (Prism Intl)
It costs an organization $180 per document
to recreate it when it is not tagged correctly
and cannot be found in search (IDC)
Large organizations lose a document every
12 seconds (Prism Intl)
Align corporate goals with records policies
and file plans with content types.
Drive Content Types with metadata
Building Block #4 – Apply Metadata Driven Policies to Identify
& Tag Your Assets for Storage & Preservation
www.conceptsearching.com
www.conceptsearching.com
20. Solution: Address the
Technology/Process Not the Behavior
Semantic
Metadata
Tagging Increase
Information
Retrieval
Precision for
e-Discovery
Concept
Classifier for Automatic
SharePoint Content
Type
Application
Windows
Rights
Document Document Records
Management
Library 1 Library 2 Retention &
Code Workflow
Tagging
Appropriate
Backup & Storage &
Document Document Archived Data Preservation
Library 3 Library 4
www.conceptsearching.com
21. Semantic
Metadata
Tagging Increase
Information
Retrieval
Precision for
e-Discovery
Concept
Classifier for Automatic
SharePoint Content
Type
Application
Windows
Rights
Document Document Records
Management
Library 1 Library 2 Retention &
Code Workflow
Tagging
Appropriate
Backup & Storage &
Document Document Archived Data Preservation
Library 3 Library 4
www.conceptsearching.com
22. Summary
Recommendations
Its not about better search, but the Proactive
Management of the Life cycle of content
Find tools that run natively in SharePoint
Reduce costs, time, & risk
Leverages your investment
Leverage Content Types
Align your taxonomy(s) with your organization, SharePoint
one size does not fit all Metadata Driven Automatic Application of Policies
& Content Types
Identify tools that are highly interactive and do
not require Information Scientists on staff Enterprise Search
Integration with your search solution
Navigation and improved findability
IBM File Net P8 Opentext SAP File Shares
Look for rapid deployment and ease to
manage and maintain
ROI – 38% to 600%
(IDC)
Vendor experience
www.conceptsearching.com
23. Scalability, regardless of how you define it, is ultimately the
intersection of technology and business processes to achieve
quantifiable organizational improvements impacting search,
records management, compliance, data privacy, and governance.
Overcoming traditional challenges, relevant information is
delivered timely, to the right stakeholder, in a secure, compliant,
and collaborative environment.
Martin Garland KM World 2011
Martin Garland, President and Founder
Concept Searching Inc.
marting@conceptsearching.com
+1 703 531 8567
Twitter @conceptsearch
www.conceptsearching.com