SlideShare a Scribd company logo
1 of 36
Download to read offline
Grab some
coffee and
enjoy the
pre-­show
banter
before the
top of the
hour!
The Briefing Room
Rethinking Data Availability and Governance in a Mobile World
Twitter Tag: #briefr The Briefing Room
Welcome
Host:
Eric Kavanagh
eric.kavanagh@bloorgroup.com
@eric_kavanagh
Twitter Tag: #briefr The Briefing Room
  Reveal the essential characteristics of enterprise
software, good and bad
  Provide a forum for detailed analysis of today s innovative
technologies
  Give vendors a chance to explain their product to savvy
analysts
  Allow audience members to pose serious questions... and
get answers!
Mission
Twitter Tag: #briefr The Briefing Room
Topics
June: INNOVATORS
July: SQL INNOVATION
August: REAL-TIME DATA
Twitter Tag: #briefr The Briefing Room
Resistance is Futile
Ø  Workers are
mobile
Ø  BYOD is here to
stay
Ø  End point
security matters
Twitter Tag: #briefr The Briefing Room
Analyst: Malcolm Chisholm
Malcolm Chisholm has over 25 years
experience in data management, and has
worked in a variety of sectors, with a
concentration on finance. He is an
independent consultant specializing in data
governance, master/reference data
management, metadata engineering, and the
organization of Enterprise Information
Management. Malcolm has authored the
books: Managing Reference Data in
Enterprise Databases; How to Build a
Business Rules Engine; and Definitions in
Information Management. He was awarded
the DAMA International Professional
Achievement Award for contributions to
Master Data Management. He holds an M.A.
from the University of Oxford and a Ph.D.
from the University of Bristol.
Twitter Tag: #briefr The Briefing Room
Druva
Druva offers converged data protection, which includes
backup, availability and data governance to the mobile
workforce
  Its products include inSync for mobile devices and Phoenix
for remote offices
Druva leverages its Elastic Cloud Platform to deliver a
scalable and secure service to archive, discover and serve
information
Twitter Tag: #briefr The Briefing Room
Guest: Dave Packer
Dave has more than 20 years of experience
influencing products in the enterprise technology
space, primarily focused on information
management and governance. As a member of
the Druva team, Dave leads Product Marketing,
which serves an integral role leading product
definition and direction. Prior to joining Druva,
Dave has held executive positions at Autonomy
Corp., Interwoven Inc., and Silicon Graphics. He
was also instrumental in the product and market
definition of the first widely deployed mobile
device, Tablet PC, while at Uppercase, Inc.,
(acquired by Microsoft in 2000).
RETHINKING DATA AVAILABILITY AND
GOVERNANCE IN A MOBILE WORLD
June 2015
11
“Druva has been a
phenomenal answer
to Dell for protecting
our data”
ABOUT DRUVA
Company
•  Fastest growing data protection company
•  Headquartered in Silicon Valley
•  Backed by Sequoia and EMC
Ranked #1 by two years running
Brad Hammack
IT Emerging Technologies
12
TRUSTED BY 3,000+ GLOBAL ENTERPRISES
13
YOUR ENTERPRISE IS CHANGING
2x
Growth of corporate data
every 14 months
(Source: Gartner)
2000 2015
Data Center 85%
Endpoints 7%
Remote Sites 8%
Data Center 56%
Endpoints 28%
Remote Sites 10%
Cloud 6%
14
CONFIDENCE & CONTROL
NO LONGER EXIST
•  High risk of permanent data loss
•  Business continuity & end user productivity impact
•  Lost visibility for compliance & legal requirements
8%
Enterprise devices
lost per year
26%
Litigation includes data
from mobile devices
60%
Enterprises’ will have half
of their infrastructure in
the cloud by 2018
15
DRUVA: DATA CENTER CLASS AVAILABILITY &
GOVERNANCE FOR THE MOBILE WORKFORCE
User	
  Produc+vity	
   Corporate	
  Control	
  
LEVERAGING THE POWER OFAWS
ITAR
FIPS 140-2 MPAA ISO 27001
SOC 1,2,3 ISAE 3402
PCI DSS
HIPAA
FISMA Moderate
Security & ComplianceGlobal Reach
Selectable Storage Regions
Certified cloud operations
17
THE DRUVA DIFFERENCE
•  Natively built on cloud technologies
99.999% data durability with
guaranteed availability and access
•  Patented deduplication engine
80% bandwidth and storage reduction
•  Single data store for multiple
enterprise workloads
100% elastic, proven scalability
beyond a million+ devices
•  Advanced cloud security & privacy
Multi-layer security model, with zero
vendor data access
Data
Governance
Data
Availability
Druva
Elastic Cloud
File Classification
& Analytics Auditing
eDiscovery
Integration
Data Backup
& Collection
Data
Recovery
Data Loss
Prevention
Data
Archival
File
Sharing
Data
Access
Global
Deduplication
Engine
Single
Instance
Storage
Time-
Indexed
Metadata
S3/Glacier
(Storage)
DynamoDB
(Database)
EC2
(Compute)
Security&PrivacyFramework
Device
Refresh
18
CONVERGED DATA PROTECTION FOR
THE MOBILE WORKFORCE
for
Endpoints
for
Remote Office Servers
19
ADDRESSING NEEDS OF THE
GLOBAL ENTERPRISE
Endpoint Backup
A non-intrusive solution
to ensure mobile data is
protected from loss
Endpoint Lifecycle
Manage ongoing device
refreshes, enforcement of
BYOD policies and
protection of data on
endpoints
Enterprise Mobility
Centralized IT control
over file-sharing that is
secure and policy
managed
eDiscovery
Enablement
Collect and preserve data
for eDiscovery with less
time consuming and
inexpensive processes
20
KEY REQUIREMENTS OF
MOBILE DATA GOVERNANCE
Time-indexed
Data Collection
Geo-location
and fencing
Federated
Search
Long-term
retention
eDiscovery
Enablement
Legal Hold
Data	
  
Segrega+on	
  
Audit trails &
activity streams
21
DRUVA DATA GOVERNANCE TODAY
•  Legal hold policy and management
o  Provides data collection, hold management console
o  Preserves data ‘in place’, no additional storage
o  Direct connect for eDiscovery platforms
•  Compliance / Regulation support
o  Tamper proof & extensive audit trails
o  Regional data privacy policy configuration
o  HIPAA compliant (KPMG audited)
o  ISAE-3000 certified
22
LEARN MORE
•  Experience Druva – Free Trial
o  druva.com/trial
•  Read Analyst Reports, White Papers, Case Studies & more
o  druva.com/resources
•  Learn about data availability & governance – Blog
o  druva.com/blog
The Leader in Converged
Data Protection
druva.com
Twitter Tag: #briefr The Briefing Room
Perceptions & Questions
Analyst:
Malcolm Chisholm
Framing	
  the	
  Challenge	
  of	
  End	
  User	
  Compu+ng	
  Data	
  
Governance	
  
June	
  9,	
  2015	
  
Presented	
  by	
  Malcolm	
  Chisholm	
  
mchisholm@askget.com	
  
©	
  AskGet.com	
  Inc	
  2015	
  
The	
  Challenge	
  of	
  Data	
  Governance	
  
Data	
  Stewardship	
   Data	
  Policies	
  
Data	
  Security	
  
Legal,	
  Privacy	
  &	
  
Compliance	
  
Informa+on	
  
Knowledge	
  Mgmt.	
  
Data	
  Architecture	
  &	
  
Modeling	
  
Data	
  Life	
  Cycle	
  
Change	
  Management	
  
Data	
  Content	
  
Management	
  
Primary	
  Accountable	
  is	
  IT	
   Primary	
  Accountable	
  is	
  
Opera+ons	
  
Other	
  Primary	
  Accountable	
  	
  
Primary	
  Accountable	
  is	
  Data	
  Governance	
  
•  Data	
  Governance	
  is	
  a	
  set	
  of	
  disciplines,	
  each	
  with	
  its	
  own	
  special	
  set	
  of	
  concerns	
  and	
  techniques	
  
•  Some	
  of	
  these	
  disciplines	
  are	
  “pure”	
  Data	
  Governance;	
  others	
  involve	
  working	
  with	
  some	
  part	
  of	
  the	
  
business	
  that	
  has	
  primary	
  responsibility	
  for	
  the	
  discipline	
  
•  The	
  Data	
  Governance	
  disciplines	
  are	
  each	
  different	
  and	
  fairly	
  self-­‐contained	
  
•  To	
  do	
  Data	
  Governance	
  well	
  we	
  need	
  to	
  master	
  all	
  of	
  the	
  disciplines	
  relevant	
  to	
  our	
  enterprise	
  
•  Some	
  of	
  these	
  disciplines	
  are	
  emerging,	
  and	
  that	
  makes	
  them	
  difficult	
  
©	
  AskGet.com	
  Inc	
  2015	
  
The	
  Endpoint	
  Data	
  Challenge	
  
•  Because	
  of	
  its	
  close	
  rela+onships	
  with	
  IT	
  and	
  Opera+ons,	
  Data	
  Governance	
  tends	
  to	
  focus	
  on	
  corporate	
  
systems.	
  
•  However,	
  many	
  enterprises	
  have	
  segments	
  of	
  their	
  workforce	
  that	
  are	
  mobile	
  and/or	
  dispersed	
  from	
  
central	
  offices.	
  	
  	
  These	
  staff	
  are	
  crea+ng	
  data	
  at	
  their	
  endpoints	
  that	
  is	
  not	
  captured	
  in	
  corporate	
  systems.	
  
•  Even	
  staff	
  in	
  corporate	
  centers	
  are	
  doing	
  work	
  on	
  their	
  PC’s	
  that	
  is	
  not	
  captured	
  by	
  corporate	
  systems.	
  
•  Leaving	
  aside	
  discussion	
  of	
  Cloud	
  for	
  now,	
  which	
  has	
  added	
  even	
  more	
  complexity.	
  
IT	
   Opera+ons	
  
Data	
  
Governance	
  
Corporate	
  Systems	
  
Mobile,	
  Dispersed,	
  Self-­‐enabling	
  	
  
Segments	
  of	
  Workforce	
  
?	
  
©	
  AskGet.com	
  Inc	
  2015	
  
End-­‐User	
  Compu+ng	
  
•  Endpoints	
  are	
  where	
  data	
  is	
  at,	
  but	
  what	
  is	
  going	
  on	
  at	
  the	
  endpoints?	
  
•  Answer:	
  End-­‐User	
  Compu+ng	
  (EUC)	
  
•  Much	
  –	
  but	
  far	
  from	
  all	
  –	
  the	
  types	
  of	
  data	
  management	
  that	
  we	
  see	
  in	
  corporate	
  systems	
  are	
  going	
  on	
  in	
  
EUC	
  
•  It	
  is	
  very	
  rare	
  to	
  find	
  any	
  staff	
  who	
  have	
  received	
  training	
  on	
  EUC	
  Data	
  Governance	
  (“EUC	
  Governance”),	
  
and	
  this	
  is	
  not	
  a	
  tradi+onal	
  area	
  of	
  focus	
  of	
  Data	
  Governance.	
  
•  Hence,	
  the	
  quality	
  of	
  data	
  management	
  is	
  unknown,	
  but	
  can	
  be	
  guessed	
  to	
  be	
  at	
  low	
  maturity	
  –	
  which	
  is	
  
risky.	
  
Data	
  Acquisi+on	
  
File	
  Transfer	
  
Analysis	
  
Communica+on	
  
Repor+ng	
  
Reports	
  
Models	
  
Files	
  
Contracts	
  
Publica+ons	
  
…	
  
©	
  AskGet.com	
  Inc	
  2015	
  
Why	
  Is	
  EUC	
  Governance	
  Needed?	
  
•  Employees	
  go	
  away	
  –	
  some+mes	
  suddenly.	
  
	
  
•  What	
  happens	
  to	
  the	
  data	
  they	
  have	
  been	
  
working	
  with?	
  
GAME
OVER
Termina+on	
  
New	
  Job	
  
Other	
  
Reasons	
  
Stolen	
  
Destroyed	
  
Lost	
  
•  Endpoint	
  devices	
  go	
  away	
  –	
  some+mes	
  
suddenly.	
  
	
  
•  What	
  data	
  has	
  gone	
  missing,	
  what	
  are	
  the	
  
consequences,	
  and	
  can	
  the	
  data	
  be	
  recovered?	
  
•  There	
  are	
  some	
  obvious	
  reasons	
  why	
  EUC	
  governance	
  is	
  needed	
  
•  Here	
  are	
  a	
  couple	
  –	
  there	
  are	
  a	
  lot	
  more	
  
©	
  AskGet.com	
  Inc	
  2015	
  
The	
  Challenge	
  of	
  EUC	
  Governance:	
  1	
  –	
  No	
  Close	
  Partner	
  
•  We	
  saw	
  before	
  that	
  for	
  some	
  Data	
  Governance	
  disciplines	
  there	
  are	
  natural	
  partners.	
  
	
  
•  IT	
  is	
  a	
  partner	
  with	
  EUC	
  Governance,	
  but	
  has	
  a	
  rela+vely	
  narrow	
  focus,	
  and	
  may	
  not	
  understand	
  the	
  Data	
  
Governance	
  aspects	
  
	
  
•  Legal	
  and	
  HR	
  could	
  be	
  other	
  partners	
  
	
  
•  The	
  end	
  users	
  themselves	
  can	
  be	
  resistant	
  to	
  Data	
  Governance,	
  but	
  ul+mately	
  need	
  to	
  be	
  enrolled	
  
	
  
•  CONCLUSION:	
  Data	
  Governance	
  must	
  lead	
  in	
  this	
  area	
  
G AM E
OV ER
Termination
New	
  Job
Other	
  
Reasons
Stolen
Destroyed
Lost
Data	
  Stewardship Data	
  Policies
Data	
  Security
Legal,	
  Privacy	
  &	
  
Compliance
Information	
  
Knowledge	
  Mgmt.
Data	
  Architecture	
  &	
  
Modeling
Data	
  Life	
  Cycle
Change	
  Management
Data	
  Content	
  
Management
Primary	
  Accountable	
  is	
  IT Primary	
  Accountable	
  is	
  
Operations
Other	
  Primary	
  Accountable	
  
Primary	
  Accountable	
  is	
  Data	
  Governance
©	
  AskGet.com	
  Inc	
  2015	
  
Data	
  Stewardship Data	
  Policies
Data	
  Security
Legal,	
  Privacy	
  &	
  
Compliance
Information	
  
Knowledge	
  Mgmt.
Data	
  Architecture	
  &	
  
Modeling
Data	
  Life	
  Cycle
Change	
  Management
Data	
  Content	
  
Management
Primary	
  Accountable	
  is	
  IT Primary	
  Accountable	
  is	
  
Operations
Other	
  Primary	
  Accountable	
  
Primary	
  Accountable	
  is	
  Data	
  Governance
The	
  Challenge	
  of	
  EUC	
  Governance:	
  2	
  –	
  Complexity	
  
•  EUC	
  Governance	
  is	
  composed	
  of	
  many	
  (but	
  not	
  all)	
  of	
  the	
  disciplines	
  of	
  Data	
  Governance	
  
	
  
•  EUC	
  Governance	
  may	
  have	
  some	
  special	
  characteris+cs	
  that	
  also	
  make	
  it	
  its	
  own	
  discipline	
  
	
  
•  It	
  is	
  up	
  to	
  Data	
  Governance	
  to	
  figure	
  this	
  out,	
  and	
  come	
  up	
  with	
  conceptual	
  frameworks	
  for	
  EUC	
  
Governance	
  
	
  
•  CONCLUSION:	
  Data	
  Governance	
  must	
  lead	
  in	
  this	
  area	
  
G AM E
OV ER
Termination
New	
  Job
Other	
  
Reasons
Stolen
Destroyed
Lost
*
* * *
*
*
©	
  AskGet.com	
  Inc	
  2015	
  
1.You have shown us a number of capabilities that Druva has. I understand that IT is a natural
partner for meeting the data backup and recovery use cases. However, who is the natural partner
in the enterprise for the Data Governance use cases you have described? Data Governance units
are often highly aligned to supporting IT and Operations, rather than the mobile dispersed
workforce. Given this, will Data Governance be ready to drive adoption of Druva? Does Data
Governance need to be more mature to deal with what Druva offers?
2.You demonstrated the Data Availability layer in your architecture. A big problem for enterprises
today is uncontrolled use of personal file sharing capabilities, like Dropbox. In your file sharing
capability, can you control who is sharing what within the enterprise? Sometimes, one
organizational unit must not be allowed to see what another is doing.
3.This is a follow up to the previous question. How should Data Governance go about figuring out
what the rules are for permitted file sharing? This would not only include who can see what files,
but what they are allowed to do with them (e.g., use the data to derive further data).
4.The environment you provide is essentially another production environment. Do you have
recommendations about how to prevent it being used in manner that drives chaos? For instance,
who can do eDiscovery, under what circumstances, and what do they do with the results? Who
decides if a legal hold can be placed, what it covers, and when it can be released? In the past
great technological advances (like ETL) have actually enabled poor data management practices
that have indeed driven chaos.
5.The environment that Druva creates seems like a natural point of ingestion for Big Data
projects. Do you see the data in the Druva environment being used in this way, and do you know
anything of the use cases involved?
6.Closely related to the previous question, some segments of the work force are dealing with
customers. Could I use the Druva environment to pull in data for analysis to ultimately update a
Customer MDM hub, both for Customer static information and Customer propensity information?
7.You have file classification and auditing. Can this be extended to profiling? Suppose I need to
find unprotected Social Security Numbers in the endpoints? Or can I find copies of contracts or
other legal agreements (like NDA’s) that are on people’s endpoints?
8.Suppose that Data Governance finds in the Druva environment that Person X has sensitive data
on their PC that should not be there. Other than Excel and email, how can Data Governance alert
Person X, and track their actions to purge the sensitive data?
9.What are the latencies involved? Suppose Person Y loads an unencrypted copy of a hospital’s
patient list onto their PC, and they are not really supposed to do this. How long would it be
before I could reasonably detect this in the Druva environment? Would I have to have thought of
this use case in advance, or would something alert me?
Twitter Tag: #briefr The Briefing Room
Twitter Tag: #briefr The Briefing Room
Upcoming Topics
www.insideanalysis.com
June: INNOVATORS
July: SQL INNOVATION
August: REAL-TIME DATA
Twitter Tag: #briefr The Briefing Room
THANK YOU
for your
ATTENTION!
Some images provided courtesy of Wikimedia Commons and http://en.memory-
alpha.wikia.com/wiki/File:Borg_2366.jpg

More Related Content

What's hot

The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT StaffBVU
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Citrix
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsDell World
 
CIO 101 for Entrepreneurs (2016)
CIO 101 for Entrepreneurs (2016)CIO 101 for Entrepreneurs (2016)
CIO 101 for Entrepreneurs (2016)Michael King
 
TechFuse 2012: What does Office 365 mean to your organization?
TechFuse 2012: What does Office 365 mean to your organization?TechFuse 2012: What does Office 365 mean to your organization?
TechFuse 2012: What does Office 365 mean to your organization?Avtex
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesDell EMC World
 
Hybrid cloud- driving a business
Hybrid cloud- driving a businessHybrid cloud- driving a business
Hybrid cloud- driving a businessGabe Akisanmi
 
Cloud Computing for SMBs
Cloud Computing for SMBsCloud Computing for SMBs
Cloud Computing for SMBswhite paper
 
Windows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless ExperienceWindows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless ExperienceCitrix
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationCitrix
 
How to ensure Business Continuity in the Cloud
How to ensure Business Continuity in the CloudHow to ensure Business Continuity in the Cloud
How to ensure Business Continuity in the CloudUni Systems S.M.S.A.
 
Reddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - PresentationReddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - PresentationJoe Reddix
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...Happiest Minds Technologies
 
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...InnoTech
 
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Citrix
 
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...
 The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New... The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...InnoTech
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital WorkspaceCitrix
 

What's hot (20)

The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT Staff
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
CIO 101 for Entrepreneurs (2016)
CIO 101 for Entrepreneurs (2016)CIO 101 for Entrepreneurs (2016)
CIO 101 for Entrepreneurs (2016)
 
TechFuse 2012: What does Office 365 mean to your organization?
TechFuse 2012: What does Office 365 mean to your organization?TechFuse 2012: What does Office 365 mean to your organization?
TechFuse 2012: What does Office 365 mean to your organization?
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
Hybrid cloud- driving a business
Hybrid cloud- driving a businessHybrid cloud- driving a business
Hybrid cloud- driving a business
 
Cloud Computing for SMBs
Cloud Computing for SMBsCloud Computing for SMBs
Cloud Computing for SMBs
 
Windows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless ExperienceWindows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless Experience
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
 
How to ensure Business Continuity in the Cloud
How to ensure Business Continuity in the CloudHow to ensure Business Continuity in the Cloud
How to ensure Business Continuity in the Cloud
 
Get your house on order
Get your house on orderGet your house on order
Get your house on order
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Reddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - PresentationReddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - Presentation
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
 
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
 
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
 
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...
 The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New... The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital Workspace
 

Viewers also liked

Urgencias psiquiátricas 2013
Urgencias psiquiátricas 2013Urgencias psiquiátricas 2013
Urgencias psiquiátricas 2013Lisa simpsons
 
7-Plantilla Leer de LCDS
7-Plantilla Leer de LCDS7-Plantilla Leer de LCDS
7-Plantilla Leer de LCDSKarina_Zamora
 
8-Plantilla Probar de LCDS
8-Plantilla Probar de LCDS8-Plantilla Probar de LCDS
8-Plantilla Probar de LCDSKarina_Zamora
 
Tablas de conversion circuitos logicos
Tablas de conversion  circuitos logicosTablas de conversion  circuitos logicos
Tablas de conversion circuitos logicosEnzo Craviotto
 
Theodore payne 2013 - lecture notes
Theodore payne   2013 - lecture notesTheodore payne   2013 - lecture notes
Theodore payne 2013 - lecture notescvadheim
 
全年教学计划(Pemulihan matematik in version bc)
全年教学计划(Pemulihan matematik in version bc)全年教学计划(Pemulihan matematik in version bc)
全年教学计划(Pemulihan matematik in version bc)Lau Chin
 
Teaser #1 – «Drilling tool Bogomolov»
Teaser #1 – «Drilling tool Bogomolov»Teaser #1 – «Drilling tool Bogomolov»
Teaser #1 – «Drilling tool Bogomolov»Igor Golovin
 
5-Plantilla Ver de LCDS
5-Plantilla Ver de LCDS5-Plantilla Ver de LCDS
5-Plantilla Ver de LCDSKarina_Zamora
 
Lorain County Fitness Walks Branded Monthly Flyers
Lorain County Fitness Walks Branded Monthly FlyersLorain County Fitness Walks Branded Monthly Flyers
Lorain County Fitness Walks Branded Monthly FlyersShea Alltmont
 
28 de febrero dia de andalucía. bueno
28 de febrero dia de andalucía. bueno28 de febrero dia de andalucía. bueno
28 de febrero dia de andalucía. buenoJuanma Perez
 
4-Plantilla Introducción de LCDS
4-Plantilla Introducción de LCDS4-Plantilla Introducción de LCDS
4-Plantilla Introducción de LCDSKarina_Zamora
 
Seminario de DSLs con Groovy
Seminario de DSLs con GroovySeminario de DSLs con Groovy
Seminario de DSLs con GroovyParadigma Digital
 

Viewers also liked (20)

ビジネス研究委員会紹介
ビジネス研究委員会紹介ビジネス研究委員会紹介
ビジネス研究委員会紹介
 
perkembangan komputer dan pengaruhnya terhadap masyarakat
perkembangan komputer dan pengaruhnya terhadap masyarakatperkembangan komputer dan pengaruhnya terhadap masyarakat
perkembangan komputer dan pengaruhnya terhadap masyarakat
 
Urgencias psiquiátricas 2013
Urgencias psiquiátricas 2013Urgencias psiquiátricas 2013
Urgencias psiquiátricas 2013
 
7-Plantilla Leer de LCDS
7-Plantilla Leer de LCDS7-Plantilla Leer de LCDS
7-Plantilla Leer de LCDS
 
8-Plantilla Probar de LCDS
8-Plantilla Probar de LCDS8-Plantilla Probar de LCDS
8-Plantilla Probar de LCDS
 
Tablas de conversion circuitos logicos
Tablas de conversion  circuitos logicosTablas de conversion  circuitos logicos
Tablas de conversion circuitos logicos
 
Sensores
SensoresSensores
Sensores
 
Lr4 4.1 kimalova
Lr4 4.1 kimalovaLr4 4.1 kimalova
Lr4 4.1 kimalova
 
Tarea 1.1
Tarea 1.1Tarea 1.1
Tarea 1.1
 
Theodore payne 2013 - lecture notes
Theodore payne   2013 - lecture notesTheodore payne   2013 - lecture notes
Theodore payne 2013 - lecture notes
 
Taller 5
Taller 5Taller 5
Taller 5
 
全年教学计划(Pemulihan matematik in version bc)
全年教学计划(Pemulihan matematik in version bc)全年教学计划(Pemulihan matematik in version bc)
全年教学计划(Pemulihan matematik in version bc)
 
Teaser #1 – «Drilling tool Bogomolov»
Teaser #1 – «Drilling tool Bogomolov»Teaser #1 – «Drilling tool Bogomolov»
Teaser #1 – «Drilling tool Bogomolov»
 
Taller 4
Taller 4Taller 4
Taller 4
 
nxt
nxt nxt
nxt
 
5-Plantilla Ver de LCDS
5-Plantilla Ver de LCDS5-Plantilla Ver de LCDS
5-Plantilla Ver de LCDS
 
Lorain County Fitness Walks Branded Monthly Flyers
Lorain County Fitness Walks Branded Monthly FlyersLorain County Fitness Walks Branded Monthly Flyers
Lorain County Fitness Walks Branded Monthly Flyers
 
28 de febrero dia de andalucía. bueno
28 de febrero dia de andalucía. bueno28 de febrero dia de andalucía. bueno
28 de febrero dia de andalucía. bueno
 
4-Plantilla Introducción de LCDS
4-Plantilla Introducción de LCDS4-Plantilla Introducción de LCDS
4-Plantilla Introducción de LCDS
 
Seminario de DSLs con Groovy
Seminario de DSLs con GroovySeminario de DSLs con Groovy
Seminario de DSLs con Groovy
 

Similar to Rethinking Data Availability and Governance in a Mobile World

Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudInside Analysis
 
Everything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three SlidesEverything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three SlidesJohn Mancini
 
Top Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudTop Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudPrecisely
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
Modernizing the Analytics and Data Science Lifecycle for the Scalable Enterpr...
Modernizing the Analytics and Data Science Lifecycle for the Scalable Enterpr...Modernizing the Analytics and Data Science Lifecycle for the Scalable Enterpr...
Modernizing the Analytics and Data Science Lifecycle for the Scalable Enterpr...Data Con LA
 
Future of Making Things
Future of Making ThingsFuture of Making Things
Future of Making ThingsJC Davis
 
Does Every Cloud Have Silver Lining?
Does Every Cloud Have Silver Lining?Does Every Cloud Have Silver Lining?
Does Every Cloud Have Silver Lining?Lori Mankin
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing Now6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing NowHudson IT
 
Down to Business: Taking Action Quickly with Linked Data Services
Down to Business: Taking Action Quickly with Linked Data ServicesDown to Business: Taking Action Quickly with Linked Data Services
Down to Business: Taking Action Quickly with Linked Data ServicesInside Analysis
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
Developing a cloud strategy - Presentation Nexon ABC Event
Developing a cloud strategy - Presentation Nexon ABC EventDeveloping a cloud strategy - Presentation Nexon ABC Event
Developing a cloud strategy - Presentation Nexon ABC EventNexon Asia Pacific
 
Denodo Data Virtualization - IT Days in Luxembourg with Oktopus
Denodo Data Virtualization - IT Days in Luxembourg with OktopusDenodo Data Virtualization - IT Days in Luxembourg with Oktopus
Denodo Data Virtualization - IT Days in Luxembourg with OktopusDenodo
 
There are 250 Database products, are you running the right one?
There are 250 Database products, are you running the right one?There are 250 Database products, are you running the right one?
There are 250 Database products, are you running the right one?Aerospike, Inc.
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - finalAndrew White
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on CloudTu Pham
 
Réinventez le Data Management avec la Data Virtualization de Denodo
Réinventez le Data Management avec la Data Virtualization de DenodoRéinventez le Data Management avec la Data Virtualization de Denodo
Réinventez le Data Management avec la Data Virtualization de DenodoDenodo
 

Similar to Rethinking Data Availability and Governance in a Mobile World (20)

Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the Cloud
 
Everything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three SlidesEverything You Need to Know About Enterprise IT in Three Slides
Everything You Need to Know About Enterprise IT in Three Slides
 
Top Trends and Challenges in the Cloud
Top Trends and Challenges in the CloudTop Trends and Challenges in the Cloud
Top Trends and Challenges in the Cloud
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
Modernizing the Analytics and Data Science Lifecycle for the Scalable Enterpr...
Modernizing the Analytics and Data Science Lifecycle for the Scalable Enterpr...Modernizing the Analytics and Data Science Lifecycle for the Scalable Enterpr...
Modernizing the Analytics and Data Science Lifecycle for the Scalable Enterpr...
 
Future of Making Things
Future of Making ThingsFuture of Making Things
Future of Making Things
 
Does Every Cloud Have Silver Lining?
Does Every Cloud Have Silver Lining?Does Every Cloud Have Silver Lining?
Does Every Cloud Have Silver Lining?
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing Now6 Reasons To Embrace Cloud Computing Now
6 Reasons To Embrace Cloud Computing Now
 
Expectations in DRAAS from CSP
Expectations in DRAAS from CSPExpectations in DRAAS from CSP
Expectations in DRAAS from CSP
 
Down to Business: Taking Action Quickly with Linked Data Services
Down to Business: Taking Action Quickly with Linked Data ServicesDown to Business: Taking Action Quickly with Linked Data Services
Down to Business: Taking Action Quickly with Linked Data Services
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Developing a cloud strategy - Presentation Nexon ABC Event
Developing a cloud strategy - Presentation Nexon ABC EventDeveloping a cloud strategy - Presentation Nexon ABC Event
Developing a cloud strategy - Presentation Nexon ABC Event
 
Denodo Data Virtualization - IT Days in Luxembourg with Oktopus
Denodo Data Virtualization - IT Days in Luxembourg with OktopusDenodo Data Virtualization - IT Days in Luxembourg with Oktopus
Denodo Data Virtualization - IT Days in Luxembourg with Oktopus
 
There are 250 Database products, are you running the right one?
There are 250 Database products, are you running the right one?There are 250 Database products, are you running the right one?
There are 250 Database products, are you running the right one?
 
Brighttalk converged infrastructure and it operations management - final
Brighttalk   converged infrastructure and it operations management - finalBrighttalk   converged infrastructure and it operations management - final
Brighttalk converged infrastructure and it operations management - final
 
The Future of Enterprise IT
The Future of Enterprise IT The Future of Enterprise IT
The Future of Enterprise IT
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
Réinventez le Data Management avec la Data Virtualization de Denodo
Réinventez le Data Management avec la Data Virtualization de DenodoRéinventez le Data Management avec la Data Virtualization de Denodo
Réinventez le Data Management avec la Data Virtualization de Denodo
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Rethinking Data Availability and Governance in a Mobile World

  • 1. Grab some coffee and enjoy the pre-­show banter before the top of the hour!
  • 2. The Briefing Room Rethinking Data Availability and Governance in a Mobile World
  • 3. Twitter Tag: #briefr The Briefing Room Welcome Host: Eric Kavanagh eric.kavanagh@bloorgroup.com @eric_kavanagh
  • 4. Twitter Tag: #briefr The Briefing Room   Reveal the essential characteristics of enterprise software, good and bad   Provide a forum for detailed analysis of today s innovative technologies   Give vendors a chance to explain their product to savvy analysts   Allow audience members to pose serious questions... and get answers! Mission
  • 5. Twitter Tag: #briefr The Briefing Room Topics June: INNOVATORS July: SQL INNOVATION August: REAL-TIME DATA
  • 6. Twitter Tag: #briefr The Briefing Room Resistance is Futile Ø  Workers are mobile Ø  BYOD is here to stay Ø  End point security matters
  • 7. Twitter Tag: #briefr The Briefing Room Analyst: Malcolm Chisholm Malcolm Chisholm has over 25 years experience in data management, and has worked in a variety of sectors, with a concentration on finance. He is an independent consultant specializing in data governance, master/reference data management, metadata engineering, and the organization of Enterprise Information Management. Malcolm has authored the books: Managing Reference Data in Enterprise Databases; How to Build a Business Rules Engine; and Definitions in Information Management. He was awarded the DAMA International Professional Achievement Award for contributions to Master Data Management. He holds an M.A. from the University of Oxford and a Ph.D. from the University of Bristol.
  • 8. Twitter Tag: #briefr The Briefing Room Druva Druva offers converged data protection, which includes backup, availability and data governance to the mobile workforce   Its products include inSync for mobile devices and Phoenix for remote offices Druva leverages its Elastic Cloud Platform to deliver a scalable and secure service to archive, discover and serve information
  • 9. Twitter Tag: #briefr The Briefing Room Guest: Dave Packer Dave has more than 20 years of experience influencing products in the enterprise technology space, primarily focused on information management and governance. As a member of the Druva team, Dave leads Product Marketing, which serves an integral role leading product definition and direction. Prior to joining Druva, Dave has held executive positions at Autonomy Corp., Interwoven Inc., and Silicon Graphics. He was also instrumental in the product and market definition of the first widely deployed mobile device, Tablet PC, while at Uppercase, Inc., (acquired by Microsoft in 2000).
  • 10. RETHINKING DATA AVAILABILITY AND GOVERNANCE IN A MOBILE WORLD June 2015
  • 11. 11 “Druva has been a phenomenal answer to Dell for protecting our data” ABOUT DRUVA Company •  Fastest growing data protection company •  Headquartered in Silicon Valley •  Backed by Sequoia and EMC Ranked #1 by two years running Brad Hammack IT Emerging Technologies
  • 12. 12 TRUSTED BY 3,000+ GLOBAL ENTERPRISES
  • 13. 13 YOUR ENTERPRISE IS CHANGING 2x Growth of corporate data every 14 months (Source: Gartner) 2000 2015 Data Center 85% Endpoints 7% Remote Sites 8% Data Center 56% Endpoints 28% Remote Sites 10% Cloud 6%
  • 14. 14 CONFIDENCE & CONTROL NO LONGER EXIST •  High risk of permanent data loss •  Business continuity & end user productivity impact •  Lost visibility for compliance & legal requirements 8% Enterprise devices lost per year 26% Litigation includes data from mobile devices 60% Enterprises’ will have half of their infrastructure in the cloud by 2018
  • 15. 15 DRUVA: DATA CENTER CLASS AVAILABILITY & GOVERNANCE FOR THE MOBILE WORKFORCE User  Produc+vity   Corporate  Control  
  • 16. LEVERAGING THE POWER OFAWS ITAR FIPS 140-2 MPAA ISO 27001 SOC 1,2,3 ISAE 3402 PCI DSS HIPAA FISMA Moderate Security & ComplianceGlobal Reach Selectable Storage Regions Certified cloud operations
  • 17. 17 THE DRUVA DIFFERENCE •  Natively built on cloud technologies 99.999% data durability with guaranteed availability and access •  Patented deduplication engine 80% bandwidth and storage reduction •  Single data store for multiple enterprise workloads 100% elastic, proven scalability beyond a million+ devices •  Advanced cloud security & privacy Multi-layer security model, with zero vendor data access Data Governance Data Availability Druva Elastic Cloud File Classification & Analytics Auditing eDiscovery Integration Data Backup & Collection Data Recovery Data Loss Prevention Data Archival File Sharing Data Access Global Deduplication Engine Single Instance Storage Time- Indexed Metadata S3/Glacier (Storage) DynamoDB (Database) EC2 (Compute) Security&PrivacyFramework Device Refresh
  • 18. 18 CONVERGED DATA PROTECTION FOR THE MOBILE WORKFORCE for Endpoints for Remote Office Servers
  • 19. 19 ADDRESSING NEEDS OF THE GLOBAL ENTERPRISE Endpoint Backup A non-intrusive solution to ensure mobile data is protected from loss Endpoint Lifecycle Manage ongoing device refreshes, enforcement of BYOD policies and protection of data on endpoints Enterprise Mobility Centralized IT control over file-sharing that is secure and policy managed eDiscovery Enablement Collect and preserve data for eDiscovery with less time consuming and inexpensive processes
  • 20. 20 KEY REQUIREMENTS OF MOBILE DATA GOVERNANCE Time-indexed Data Collection Geo-location and fencing Federated Search Long-term retention eDiscovery Enablement Legal Hold Data   Segrega+on   Audit trails & activity streams
  • 21. 21 DRUVA DATA GOVERNANCE TODAY •  Legal hold policy and management o  Provides data collection, hold management console o  Preserves data ‘in place’, no additional storage o  Direct connect for eDiscovery platforms •  Compliance / Regulation support o  Tamper proof & extensive audit trails o  Regional data privacy policy configuration o  HIPAA compliant (KPMG audited) o  ISAE-3000 certified
  • 22. 22 LEARN MORE •  Experience Druva – Free Trial o  druva.com/trial •  Read Analyst Reports, White Papers, Case Studies & more o  druva.com/resources •  Learn about data availability & governance – Blog o  druva.com/blog
  • 23. The Leader in Converged Data Protection druva.com
  • 24. Twitter Tag: #briefr The Briefing Room Perceptions & Questions Analyst: Malcolm Chisholm
  • 25. Framing  the  Challenge  of  End  User  Compu+ng  Data   Governance   June  9,  2015   Presented  by  Malcolm  Chisholm   mchisholm@askget.com   ©  AskGet.com  Inc  2015  
  • 26. The  Challenge  of  Data  Governance   Data  Stewardship   Data  Policies   Data  Security   Legal,  Privacy  &   Compliance   Informa+on   Knowledge  Mgmt.   Data  Architecture  &   Modeling   Data  Life  Cycle   Change  Management   Data  Content   Management   Primary  Accountable  is  IT   Primary  Accountable  is   Opera+ons   Other  Primary  Accountable     Primary  Accountable  is  Data  Governance   •  Data  Governance  is  a  set  of  disciplines,  each  with  its  own  special  set  of  concerns  and  techniques   •  Some  of  these  disciplines  are  “pure”  Data  Governance;  others  involve  working  with  some  part  of  the   business  that  has  primary  responsibility  for  the  discipline   •  The  Data  Governance  disciplines  are  each  different  and  fairly  self-­‐contained   •  To  do  Data  Governance  well  we  need  to  master  all  of  the  disciplines  relevant  to  our  enterprise   •  Some  of  these  disciplines  are  emerging,  and  that  makes  them  difficult   ©  AskGet.com  Inc  2015  
  • 27. The  Endpoint  Data  Challenge   •  Because  of  its  close  rela+onships  with  IT  and  Opera+ons,  Data  Governance  tends  to  focus  on  corporate   systems.   •  However,  many  enterprises  have  segments  of  their  workforce  that  are  mobile  and/or  dispersed  from   central  offices.      These  staff  are  crea+ng  data  at  their  endpoints  that  is  not  captured  in  corporate  systems.   •  Even  staff  in  corporate  centers  are  doing  work  on  their  PC’s  that  is  not  captured  by  corporate  systems.   •  Leaving  aside  discussion  of  Cloud  for  now,  which  has  added  even  more  complexity.   IT   Opera+ons   Data   Governance   Corporate  Systems   Mobile,  Dispersed,  Self-­‐enabling     Segments  of  Workforce   ?   ©  AskGet.com  Inc  2015  
  • 28. End-­‐User  Compu+ng   •  Endpoints  are  where  data  is  at,  but  what  is  going  on  at  the  endpoints?   •  Answer:  End-­‐User  Compu+ng  (EUC)   •  Much  –  but  far  from  all  –  the  types  of  data  management  that  we  see  in  corporate  systems  are  going  on  in   EUC   •  It  is  very  rare  to  find  any  staff  who  have  received  training  on  EUC  Data  Governance  (“EUC  Governance”),   and  this  is  not  a  tradi+onal  area  of  focus  of  Data  Governance.   •  Hence,  the  quality  of  data  management  is  unknown,  but  can  be  guessed  to  be  at  low  maturity  –  which  is   risky.   Data  Acquisi+on   File  Transfer   Analysis   Communica+on   Repor+ng   Reports   Models   Files   Contracts   Publica+ons   …   ©  AskGet.com  Inc  2015  
  • 29. Why  Is  EUC  Governance  Needed?   •  Employees  go  away  –  some+mes  suddenly.     •  What  happens  to  the  data  they  have  been   working  with?   GAME OVER Termina+on   New  Job   Other   Reasons   Stolen   Destroyed   Lost   •  Endpoint  devices  go  away  –  some+mes   suddenly.     •  What  data  has  gone  missing,  what  are  the   consequences,  and  can  the  data  be  recovered?   •  There  are  some  obvious  reasons  why  EUC  governance  is  needed   •  Here  are  a  couple  –  there  are  a  lot  more   ©  AskGet.com  Inc  2015  
  • 30. The  Challenge  of  EUC  Governance:  1  –  No  Close  Partner   •  We  saw  before  that  for  some  Data  Governance  disciplines  there  are  natural  partners.     •  IT  is  a  partner  with  EUC  Governance,  but  has  a  rela+vely  narrow  focus,  and  may  not  understand  the  Data   Governance  aspects     •  Legal  and  HR  could  be  other  partners     •  The  end  users  themselves  can  be  resistant  to  Data  Governance,  but  ul+mately  need  to  be  enrolled     •  CONCLUSION:  Data  Governance  must  lead  in  this  area   G AM E OV ER Termination New  Job Other   Reasons Stolen Destroyed Lost Data  Stewardship Data  Policies Data  Security Legal,  Privacy  &   Compliance Information   Knowledge  Mgmt. Data  Architecture  &   Modeling Data  Life  Cycle Change  Management Data  Content   Management Primary  Accountable  is  IT Primary  Accountable  is   Operations Other  Primary  Accountable   Primary  Accountable  is  Data  Governance ©  AskGet.com  Inc  2015  
  • 31. Data  Stewardship Data  Policies Data  Security Legal,  Privacy  &   Compliance Information   Knowledge  Mgmt. Data  Architecture  &   Modeling Data  Life  Cycle Change  Management Data  Content   Management Primary  Accountable  is  IT Primary  Accountable  is   Operations Other  Primary  Accountable   Primary  Accountable  is  Data  Governance The  Challenge  of  EUC  Governance:  2  –  Complexity   •  EUC  Governance  is  composed  of  many  (but  not  all)  of  the  disciplines  of  Data  Governance     •  EUC  Governance  may  have  some  special  characteris+cs  that  also  make  it  its  own  discipline     •  It  is  up  to  Data  Governance  to  figure  this  out,  and  come  up  with  conceptual  frameworks  for  EUC   Governance     •  CONCLUSION:  Data  Governance  must  lead  in  this  area   G AM E OV ER Termination New  Job Other   Reasons Stolen Destroyed Lost * * * * * * ©  AskGet.com  Inc  2015  
  • 32. 1.You have shown us a number of capabilities that Druva has. I understand that IT is a natural partner for meeting the data backup and recovery use cases. However, who is the natural partner in the enterprise for the Data Governance use cases you have described? Data Governance units are often highly aligned to supporting IT and Operations, rather than the mobile dispersed workforce. Given this, will Data Governance be ready to drive adoption of Druva? Does Data Governance need to be more mature to deal with what Druva offers? 2.You demonstrated the Data Availability layer in your architecture. A big problem for enterprises today is uncontrolled use of personal file sharing capabilities, like Dropbox. In your file sharing capability, can you control who is sharing what within the enterprise? Sometimes, one organizational unit must not be allowed to see what another is doing. 3.This is a follow up to the previous question. How should Data Governance go about figuring out what the rules are for permitted file sharing? This would not only include who can see what files, but what they are allowed to do with them (e.g., use the data to derive further data). 4.The environment you provide is essentially another production environment. Do you have recommendations about how to prevent it being used in manner that drives chaos? For instance, who can do eDiscovery, under what circumstances, and what do they do with the results? Who decides if a legal hold can be placed, what it covers, and when it can be released? In the past great technological advances (like ETL) have actually enabled poor data management practices that have indeed driven chaos.
  • 33. 5.The environment that Druva creates seems like a natural point of ingestion for Big Data projects. Do you see the data in the Druva environment being used in this way, and do you know anything of the use cases involved? 6.Closely related to the previous question, some segments of the work force are dealing with customers. Could I use the Druva environment to pull in data for analysis to ultimately update a Customer MDM hub, both for Customer static information and Customer propensity information? 7.You have file classification and auditing. Can this be extended to profiling? Suppose I need to find unprotected Social Security Numbers in the endpoints? Or can I find copies of contracts or other legal agreements (like NDA’s) that are on people’s endpoints? 8.Suppose that Data Governance finds in the Druva environment that Person X has sensitive data on their PC that should not be there. Other than Excel and email, how can Data Governance alert Person X, and track their actions to purge the sensitive data? 9.What are the latencies involved? Suppose Person Y loads an unencrypted copy of a hospital’s patient list onto their PC, and they are not really supposed to do this. How long would it be before I could reasonably detect this in the Druva environment? Would I have to have thought of this use case in advance, or would something alert me?
  • 34. Twitter Tag: #briefr The Briefing Room
  • 35. Twitter Tag: #briefr The Briefing Room Upcoming Topics www.insideanalysis.com June: INNOVATORS July: SQL INNOVATION August: REAL-TIME DATA
  • 36. Twitter Tag: #briefr The Briefing Room THANK YOU for your ATTENTION! Some images provided courtesy of Wikimedia Commons and http://en.memory- alpha.wikia.com/wiki/File:Borg_2366.jpg