SlideShare a Scribd company logo
Designing Storage Architectures for Data
Privacy, Compliance and Governance
For audio playback and Q&A go to:
bit.ly/StorageArchPrivacy
OurSpeakers
Scott Baker
Sr. Director, Content
and Data Intelligence
George Crump,
Founder and
Lead Analyst
In Regulations We Trust
The Big and Personal
Data of the Digital Citizen
● The Impact of GDPR and
Data Privacy
○ More than a European
Problem
■ Many countries and US
States are considering or
have adopted similar
regulations
The Most Common Challenges Business Face
Requirement Challenges
Transparency Guarantees harder with heterogeneous and silo’ed technology
Data Quality Tracking data across workloads and geographies with instant
ability to erase data if consent is withdrawn
Enforcement of Privacy Proving one, or more, data protection action(s) required if asked
Data Breach Preparedness Data silos cause challenges with collecting incident details and
taking action
Rights of the Digital Citizen Consent, purpose, intent, protection, and secure destruction of all
personal data retroactively
The Data Governance Gap - Real World Impact
TIME
EXPECTED
>37%: MOBILE
75%: UNUSED
<15%: CLASSIFIED
<10%
HAVE CDO
Data
Governance
GAP
REALITY
REFERENTIALVALUEOFDATA
(+)
(-)
WHAT?
WHERE?
WHAT TO DO
WITH IT?
WHO’S
RESPONSIBLE?
Data Centers Must Evolve from
Data Protection to Data Management
Backups - Move to
a Secondary Role
● Short retention (weeks, even days)
● Primary purpose is to recover the
most recent copy of data
● Critical apps protected by
replications, snapshots and copy
data management products
Archives - Taking a
Leading Role
● Long term retention
○ Primary purpose is to meet
regulations and compliance
○ Requires a shift from disk
backup or Big NAS
○ Must be searchable and
granular
Moving From Data
Governance to Intelligent
and Value-Based
Governance
What is Driving the Urgency for Data Governance
DATA
VOLUME
REACTIVE
APPROACHES
LACK OF
PROCESSES
FRAGMENTED
OWNERSHIP
LACK OF
SKILLS
TECHNOLOGY
SILOS
Closing the Data Governance GapREFERENTIALVALUEOFDATA
(+)
(-)
GAIN VISIBILITY
UNDERSTAND
TAKE
CONTROL
TIME
Data Services to Enable Intelligent Data Governance
Available Insightful Actionable
© Hitachi Vantara Corporation 2018. All Rights Reserved
Modeling for Value-Based Governance
Data Governance: Data Ingest & Aggregate
Start
Determine Type
Collect Contents
Contains
PII
Yes Categorize PII
Mark Sensitive
Migrate to HCP
No
Preserve
Yes Smooth, Augment
Normalize
No
Leave
In Place
Destroy
No Yes
Apply Custom
Retention Policy
Central
Index
Hitachi Content
Search
Mobilize / Make
Portable
Data Governance: Right to Rectification
Index 1
Hitachi Content
Search
Index 2
Index N
Start
Result Set
User Interface
Rectify On HCP?
Yes Can
Modify
Yes
No
Audit Request
No
Issue Ticket
(ServiceNOW)
No
Audit Request &
Inform Subject
Yes
Modify
Update Indexes with Modified Data
Content Intelligence: Right to be Forgotten
Start
Data Erasure
Requested
On HCP
Legally
Retained
Yes Rules
Override
No
No
Issue Ticket
(ServiceNOW)
Yes
Deny & Log
Details
Yes
Deny & Log
Details
No
Collect All Data
Via Criteria – For
Each Document
Is it
Mobile
Yes
Remove from
HCP Anywhere
No
Destroy
Notify
SubjectUpon Completion (destroyed or not)
Data Governance: Right to Data Portability
Start
Data Portability
Requested
Read
File
No
Send to Content
Intelligence
Yes Extract All
Relevant Data
Write Data to
New File in XML
Collect All Data
Via Criteria – For
Each Document
Create Dynamic
HCP/AW Space
Notify
Subject
Legal
Retained
Log
Details
Yes
Store
Transformed
Data (as XML file)
In HCP/AW Space
Include Report of
Data that could not
be included for legal
hold reasons.
© Hitachi Vantara Corporation 2018. All Rights Reserved
Intelligent Data Governance in Action
© Hitachi Vantara Corporation 2018. All Rights Reserved
Behind the Scene:
Realtime Data Profiling
© Hitachi Vantara Corporation 2018. All Rights Reserved
Behind the Scene:
Data Enrichment and Data Redaction
Data Services to Enable Intelligent Data Governance
Available Insightful Actionable
Thank you!
Storage Switzerland
http://www.storageswiss.com
georgeacrump@storageswiss.com
StorageSwiss on Twitter:
http://twitter.com/storageswiss
StorageSwiss on YouTube:
http://www.youtube.com/user/storageswiss
Hitachi
https://www.hitachivantara.com
Hitachi on Twitter:
https://twitter.com/HitachiVantara
Hitachi on Facebook:
https://www.facebook.com/HitachiVantara/
Designing Storage Architectures for Data
Privacy, Compliance and Governance
For complete audio and Q&A please
register for the On Demand Version:
bit.ly/StorageArchPrivacy

More Related Content

What's hot

How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
Neo4j
 
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID Inc
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
RishalHalid1
 
Five Big Bets in a Blockchain World (June 2018)
Five Big Bets in a Blockchain World (June 2018)Five Big Bets in a Blockchain World (June 2018)
Five Big Bets in a Blockchain World (June 2018)
Mike Wons
 
Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)
Jean-Michel Franco
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance
Jean-Michel Franco
 
Enacting the Data Subjects Access Rights for GDPR with Data Services and Data...
Enacting the Data Subjects Access Rights for GDPR with Data Services and Data...Enacting the Data Subjects Access Rights for GDPR with Data Services and Data...
Enacting the Data Subjects Access Rights for GDPR with Data Services and Data...
Jean-Michel Franco
 
GDPR 101
GDPR 101GDPR 101
Webinar: The Three New Requirements of Unstructured Data Protection
Webinar: The Three New Requirements of Unstructured Data ProtectionWebinar: The Three New Requirements of Unstructured Data Protection
Webinar: The Three New Requirements of Unstructured Data Protection
Storage Switzerland
 
BigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetBigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data Sheet
Dimitri Sirota
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
Dimitri Sirota
 
Optimize your info-driven business processes. How to move from paper to digital
Optimize your info-driven business processes. How to move from paper to digitalOptimize your info-driven business processes. How to move from paper to digital
Optimize your info-driven business processes. How to move from paper to digital
Christiana Kozakou
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
ekyklos Κύκλος Ιδεών για τη Εθνική Ανασυγκρότηση
 
Next Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity Strategy
Next Dimension Inc.
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
Capgemini
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
Druva
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Druva
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
Vuzion
 
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceGeek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
IDERA Software
 
iKnow Solutions Laura Eisenhardt
iKnow Solutions Laura EisenhardtiKnow Solutions Laura Eisenhardt
iKnow Solutions Laura Eisenhardt
BigDataExpo
 

What's hot (20)

How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
 
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
Five Big Bets in a Blockchain World (June 2018)
Five Big Bets in a Blockchain World (June 2018)Five Big Bets in a Blockchain World (June 2018)
Five Big Bets in a Blockchain World (June 2018)
 
Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)Are Your Data Ready for GDPR? (with MAPR and Talend)
Are Your Data Ready for GDPR? (with MAPR and Talend)
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance
 
Enacting the Data Subjects Access Rights for GDPR with Data Services and Data...
Enacting the Data Subjects Access Rights for GDPR with Data Services and Data...Enacting the Data Subjects Access Rights for GDPR with Data Services and Data...
Enacting the Data Subjects Access Rights for GDPR with Data Services and Data...
 
GDPR 101
GDPR 101GDPR 101
GDPR 101
 
Webinar: The Three New Requirements of Unstructured Data Protection
Webinar: The Three New Requirements of Unstructured Data ProtectionWebinar: The Three New Requirements of Unstructured Data Protection
Webinar: The Three New Requirements of Unstructured Data Protection
 
BigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetBigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data Sheet
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
Optimize your info-driven business processes. How to move from paper to digital
Optimize your info-driven business processes. How to move from paper to digitalOptimize your info-driven business processes. How to move from paper to digital
Optimize your info-driven business processes. How to move from paper to digital
 
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
14.3.2018, Παρουσίαση Κώστα Γκρίτση στην εκδήλωση «Προστασία Προσωπικών Δεδομ...
 
Next Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity Strategy
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceGeek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
 
iKnow Solutions Laura Eisenhardt
iKnow Solutions Laura EisenhardtiKnow Solutions Laura Eisenhardt
iKnow Solutions Laura Eisenhardt
 

Similar to Webinar: Designing Storage Architectures for Data Privacy, Compliance and Governance

General Data Protection Regulation - BDW Meetup, October 11th, 2017
General Data Protection Regulation - BDW Meetup, October 11th, 2017General Data Protection Regulation - BDW Meetup, October 11th, 2017
General Data Protection Regulation - BDW Meetup, October 11th, 2017
Caserta
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Is Your Agency Data Challenged?
Is Your Agency Data Challenged?Is Your Agency Data Challenged?
Is Your Agency Data Challenged?
DLT Solutions
 
Cambriano's Data Governor reduces the Big Data footprint and saves the planet
Cambriano's Data Governor reduces the Big Data footprint and saves the planetCambriano's Data Governor reduces the Big Data footprint and saves the planet
Cambriano's Data Governor reduces the Big Data footprint and saves the planet
Martyn Richard Jones
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
daveGBE
 
3GRC approach to GDPR V 0.1 www.3grc.co.uk
3GRC  approach to GDPR V 0.1 www.3grc.co.uk3GRC  approach to GDPR V 0.1 www.3grc.co.uk
3GRC approach to GDPR V 0.1 www.3grc.co.uk
►David Clarke FBCS CITP
 
RFT for Business Intelligence and Data Strategy
RFT for Business Intelligence and Data StrategyRFT for Business Intelligence and Data Strategy
RFT for Business Intelligence and Data Strategy
SustainableEnergyAut
 
Defining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business EnvironmentDefining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business Environment
Caserta
 
Webinar: The All-Flash Fix – How to Create a Hybrid Storage Architecture
Webinar: The All-Flash Fix – How to Create a Hybrid Storage ArchitectureWebinar: The All-Flash Fix – How to Create a Hybrid Storage Architecture
Webinar: The All-Flash Fix – How to Create a Hybrid Storage Architecture
Storage Switzerland
 
Solving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for HealthcareSolving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for Healthcare
Delphix
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal Audit
Omo Osagiede
 
Big data governance as a corporate governance imperative
Big data governance as a corporate governance imperativeBig data governance as a corporate governance imperative
Big data governance as a corporate governance imperative
Guy Pearce
 
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
Webinar #2 - Transforming Challenges into Opportunities for Credit UnionsWebinar #2 - Transforming Challenges into Opportunities for Credit Unions
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
Denodo
 
Data Governance Workshop
Data Governance WorkshopData Governance Workshop
Data Governance Workshop
CCG
 
CIO WaterCooler Focus: GDPR - James Duthie
CIO WaterCooler Focus: GDPR - James DuthieCIO WaterCooler Focus: GDPR - James Duthie
CIO WaterCooler Focus: GDPR - James Duthie
Andrew Pryor
 
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...
Executive Leaders Network
 
Active Governance Across the Delta Lake with Alation
Active Governance Across the Delta Lake with AlationActive Governance Across the Delta Lake with Alation
Active Governance Across the Delta Lake with Alation
Databricks
 
Foundational Strategies for Trust in Big Data Part 3: Data Lineage
Foundational Strategies for Trust in Big Data Part 3: Data LineageFoundational Strategies for Trust in Big Data Part 3: Data Lineage
Foundational Strategies for Trust in Big Data Part 3: Data Lineage
Precisely
 
GDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of GraphsGDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of Graphs
Neo4j
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data Forum
Castlebridge Associates
 

Similar to Webinar: Designing Storage Architectures for Data Privacy, Compliance and Governance (20)

General Data Protection Regulation - BDW Meetup, October 11th, 2017
General Data Protection Regulation - BDW Meetup, October 11th, 2017General Data Protection Regulation - BDW Meetup, October 11th, 2017
General Data Protection Regulation - BDW Meetup, October 11th, 2017
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Is Your Agency Data Challenged?
Is Your Agency Data Challenged?Is Your Agency Data Challenged?
Is Your Agency Data Challenged?
 
Cambriano's Data Governor reduces the Big Data footprint and saves the planet
Cambriano's Data Governor reduces the Big Data footprint and saves the planetCambriano's Data Governor reduces the Big Data footprint and saves the planet
Cambriano's Data Governor reduces the Big Data footprint and saves the planet
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
3GRC approach to GDPR V 0.1 www.3grc.co.uk
3GRC  approach to GDPR V 0.1 www.3grc.co.uk3GRC  approach to GDPR V 0.1 www.3grc.co.uk
3GRC approach to GDPR V 0.1 www.3grc.co.uk
 
RFT for Business Intelligence and Data Strategy
RFT for Business Intelligence and Data StrategyRFT for Business Intelligence and Data Strategy
RFT for Business Intelligence and Data Strategy
 
Defining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business EnvironmentDefining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business Environment
 
Webinar: The All-Flash Fix – How to Create a Hybrid Storage Architecture
Webinar: The All-Flash Fix – How to Create a Hybrid Storage ArchitectureWebinar: The All-Flash Fix – How to Create a Hybrid Storage Architecture
Webinar: The All-Flash Fix – How to Create a Hybrid Storage Architecture
 
Solving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for HealthcareSolving the Data Management Challenge for Healthcare
Solving the Data Management Challenge for Healthcare
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal Audit
 
Big data governance as a corporate governance imperative
Big data governance as a corporate governance imperativeBig data governance as a corporate governance imperative
Big data governance as a corporate governance imperative
 
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
Webinar #2 - Transforming Challenges into Opportunities for Credit UnionsWebinar #2 - Transforming Challenges into Opportunities for Credit Unions
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
 
Data Governance Workshop
Data Governance WorkshopData Governance Workshop
Data Governance Workshop
 
CIO WaterCooler Focus: GDPR - James Duthie
CIO WaterCooler Focus: GDPR - James DuthieCIO WaterCooler Focus: GDPR - James Duthie
CIO WaterCooler Focus: GDPR - James Duthie
 
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...
 
Active Governance Across the Delta Lake with Alation
Active Governance Across the Delta Lake with AlationActive Governance Across the Delta Lake with Alation
Active Governance Across the Delta Lake with Alation
 
Foundational Strategies for Trust in Big Data Part 3: Data Lineage
Foundational Strategies for Trust in Big Data Part 3: Data LineageFoundational Strategies for Trust in Big Data Part 3: Data Lineage
Foundational Strategies for Trust in Big Data Part 3: Data Lineage
 
GDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of GraphsGDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of Graphs
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data Forum
 

More from Storage Switzerland

Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Storage Switzerland
 
Webinar: Five Reasons Modern Data Centers Need Tape
Webinar: Five Reasons Modern Data Centers Need TapeWebinar: Five Reasons Modern Data Centers Need Tape
Webinar: Five Reasons Modern Data Centers Need Tape
Storage Switzerland
 
Special Presentation of Meet The CEOs - Commvault and Hedvig
Special Presentation of Meet The CEOs - Commvault and HedvigSpecial Presentation of Meet The CEOs - Commvault and Hedvig
Special Presentation of Meet The CEOs - Commvault and Hedvig
Storage Switzerland
 
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Storage Switzerland
 
Webinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Webinar: Complete Your Cloud Transformation - Store Your Data in The CloudWebinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Webinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Storage Switzerland
 
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCIWebinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Storage Switzerland
 
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Storage Switzerland
 
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Storage Switzerland
 
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data GrowthWebinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Storage Switzerland
 
Webinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup StorageWebinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup Storage
Storage Switzerland
 
Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?
Storage Switzerland
 
Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?
Storage Switzerland
 
Webinar: 5 Critical Enterprise Cloud Backup Capabilities
Webinar: 5 Critical Enterprise Cloud Backup CapabilitiesWebinar: 5 Critical Enterprise Cloud Backup Capabilities
Webinar: 5 Critical Enterprise Cloud Backup Capabilities
Storage Switzerland
 
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft AzureWebinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Storage Switzerland
 
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage CostsWebinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Storage Switzerland
 
Webinar: Does Your Data Center Need NVMe?
Webinar: Does Your Data Center Need NVMe?Webinar: Does Your Data Center Need NVMe?
Webinar: Does Your Data Center Need NVMe?
Storage Switzerland
 
Webinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs DownWebinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs Down
Storage Switzerland
 
Webinar: How to Put an End to Hyperconverged Silos
Webinar: How to Put an End to Hyperconverged SilosWebinar: How to Put an End to Hyperconverged Silos
Webinar: How to Put an End to Hyperconverged Silos
Storage Switzerland
 
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
Storage Switzerland
 
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Storage Switzerland
 

More from Storage Switzerland (20)

Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
 
Webinar: Five Reasons Modern Data Centers Need Tape
Webinar: Five Reasons Modern Data Centers Need TapeWebinar: Five Reasons Modern Data Centers Need Tape
Webinar: Five Reasons Modern Data Centers Need Tape
 
Special Presentation of Meet The CEOs - Commvault and Hedvig
Special Presentation of Meet The CEOs - Commvault and HedvigSpecial Presentation of Meet The CEOs - Commvault and Hedvig
Special Presentation of Meet The CEOs - Commvault and Hedvig
 
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
Panel Discussion: Is Computational Storage a Better Path to Extreme Performance?
 
Webinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Webinar: Complete Your Cloud Transformation - Store Your Data in The CloudWebinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
Webinar: Complete Your Cloud Transformation - Store Your Data in The Cloud
 
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCIWebinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
 
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
Webinar: Designing a Storage Consolidation Strategy for Today, the Future and...
 
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?
 
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data GrowthWebinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
Webinar: Rearchitecting Storage for the Next Wave of Splunk Data Growth
 
Webinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup StorageWebinar: Three Steps to Modernizing Backup Storage
Webinar: Three Steps to Modernizing Backup Storage
 
Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?
 
Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?Webinar: NAS vs Object - Can NAS Make a Comeback?
Webinar: NAS vs Object - Can NAS Make a Comeback?
 
Webinar: 5 Critical Enterprise Cloud Backup Capabilities
Webinar: 5 Critical Enterprise Cloud Backup CapabilitiesWebinar: 5 Critical Enterprise Cloud Backup Capabilities
Webinar: 5 Critical Enterprise Cloud Backup Capabilities
 
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft AzureWebinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
Webinar: Overcoming the Shortcomings of Legacy NAS with Microsoft Azure
 
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage CostsWebinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
Webinar: 3 Steps to be a Storage Superhero - How to Slash Storage Costs
 
Webinar: Does Your Data Center Need NVMe?
Webinar: Does Your Data Center Need NVMe?Webinar: Does Your Data Center Need NVMe?
Webinar: Does Your Data Center Need NVMe?
 
Webinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs DownWebinar: All in the Cloud - Data Protection Up, Costs Down
Webinar: All in the Cloud - Data Protection Up, Costs Down
 
Webinar: How to Put an End to Hyperconverged Silos
Webinar: How to Put an End to Hyperconverged SilosWebinar: How to Put an End to Hyperconverged Silos
Webinar: How to Put an End to Hyperconverged Silos
 
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
15 Minute Friday: Tips for The Weekend - Stop the Unstructured Data Madness
 
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
Webinar: 2019 Storage Strategies Series - What’s Your Plan for Object Storage?
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 

Webinar: Designing Storage Architectures for Data Privacy, Compliance and Governance

  • 1. Designing Storage Architectures for Data Privacy, Compliance and Governance For audio playback and Q&A go to: bit.ly/StorageArchPrivacy
  • 2. OurSpeakers Scott Baker Sr. Director, Content and Data Intelligence George Crump, Founder and Lead Analyst
  • 4. The Big and Personal Data of the Digital Citizen ● The Impact of GDPR and Data Privacy ○ More than a European Problem ■ Many countries and US States are considering or have adopted similar regulations
  • 5. The Most Common Challenges Business Face Requirement Challenges Transparency Guarantees harder with heterogeneous and silo’ed technology Data Quality Tracking data across workloads and geographies with instant ability to erase data if consent is withdrawn Enforcement of Privacy Proving one, or more, data protection action(s) required if asked Data Breach Preparedness Data silos cause challenges with collecting incident details and taking action Rights of the Digital Citizen Consent, purpose, intent, protection, and secure destruction of all personal data retroactively
  • 6. The Data Governance Gap - Real World Impact TIME EXPECTED >37%: MOBILE 75%: UNUSED <15%: CLASSIFIED <10% HAVE CDO Data Governance GAP REALITY REFERENTIALVALUEOFDATA (+) (-) WHAT? WHERE? WHAT TO DO WITH IT? WHO’S RESPONSIBLE?
  • 7. Data Centers Must Evolve from Data Protection to Data Management
  • 8. Backups - Move to a Secondary Role ● Short retention (weeks, even days) ● Primary purpose is to recover the most recent copy of data ● Critical apps protected by replications, snapshots and copy data management products
  • 9. Archives - Taking a Leading Role ● Long term retention ○ Primary purpose is to meet regulations and compliance ○ Requires a shift from disk backup or Big NAS ○ Must be searchable and granular
  • 10. Moving From Data Governance to Intelligent and Value-Based Governance
  • 11. What is Driving the Urgency for Data Governance DATA VOLUME REACTIVE APPROACHES LACK OF PROCESSES FRAGMENTED OWNERSHIP LACK OF SKILLS TECHNOLOGY SILOS
  • 12. Closing the Data Governance GapREFERENTIALVALUEOFDATA (+) (-) GAIN VISIBILITY UNDERSTAND TAKE CONTROL TIME
  • 13. Data Services to Enable Intelligent Data Governance Available Insightful Actionable
  • 14. © Hitachi Vantara Corporation 2018. All Rights Reserved Modeling for Value-Based Governance
  • 15. Data Governance: Data Ingest & Aggregate Start Determine Type Collect Contents Contains PII Yes Categorize PII Mark Sensitive Migrate to HCP No Preserve Yes Smooth, Augment Normalize No Leave In Place Destroy No Yes Apply Custom Retention Policy Central Index Hitachi Content Search Mobilize / Make Portable
  • 16. Data Governance: Right to Rectification Index 1 Hitachi Content Search Index 2 Index N Start Result Set User Interface Rectify On HCP? Yes Can Modify Yes No Audit Request No Issue Ticket (ServiceNOW) No Audit Request & Inform Subject Yes Modify Update Indexes with Modified Data
  • 17. Content Intelligence: Right to be Forgotten Start Data Erasure Requested On HCP Legally Retained Yes Rules Override No No Issue Ticket (ServiceNOW) Yes Deny & Log Details Yes Deny & Log Details No Collect All Data Via Criteria – For Each Document Is it Mobile Yes Remove from HCP Anywhere No Destroy Notify SubjectUpon Completion (destroyed or not)
  • 18. Data Governance: Right to Data Portability Start Data Portability Requested Read File No Send to Content Intelligence Yes Extract All Relevant Data Write Data to New File in XML Collect All Data Via Criteria – For Each Document Create Dynamic HCP/AW Space Notify Subject Legal Retained Log Details Yes Store Transformed Data (as XML file) In HCP/AW Space Include Report of Data that could not be included for legal hold reasons.
  • 19. © Hitachi Vantara Corporation 2018. All Rights Reserved Intelligent Data Governance in Action
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. © Hitachi Vantara Corporation 2018. All Rights Reserved Behind the Scene: Realtime Data Profiling
  • 25.
  • 26.
  • 27. © Hitachi Vantara Corporation 2018. All Rights Reserved Behind the Scene: Data Enrichment and Data Redaction
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. Data Services to Enable Intelligent Data Governance Available Insightful Actionable
  • 33. Thank you! Storage Switzerland http://www.storageswiss.com georgeacrump@storageswiss.com StorageSwiss on Twitter: http://twitter.com/storageswiss StorageSwiss on YouTube: http://www.youtube.com/user/storageswiss Hitachi https://www.hitachivantara.com Hitachi on Twitter: https://twitter.com/HitachiVantara Hitachi on Facebook: https://www.facebook.com/HitachiVantara/
  • 34. Designing Storage Architectures for Data Privacy, Compliance and Governance For complete audio and Q&A please register for the On Demand Version: bit.ly/StorageArchPrivacy

Editor's Notes

  1. SPEAKER SCRIPT GDPR
  2. SPEAKER SCRIPT The drivers behind the need for a more intelligent approach to data governance should be obvious. You hear them mentioned all the time – growth, speed, variety, and veracity of data. But there is so much more that is creating a sense of urgency for better data management and governance. To highlight a few that are affecting the way our customers are do business today, consider the following: The growth of data is constant – leaving organization’s continually facing the challenges of aggregating, managing, governing, and creating new value from their data Organizations don’t often realize there is a problem with their data in advance of a situation. Reacting creates in-the-moment data management solutions that fail to scale as the business grows, applications change, and new data formats are adopted A lack of processes, data management systems, and inadequate data strategies contribute toward data quality issues and untrustworthy data sets. Lack of data ownership is a key shortfall for most organizations. This fragmentation is often across different departments and stakeholders, versus the business as a whole. Many organizations are unable to invoke enough support to improve their data culture. This is often driven by a lack of knowledge or skillset on the proper techniques to manage data effectively. Lastly, reactive approaches, incomplete processes, fragmented data ownership, and insufficient skills are catalysts that foster single-purpose solution adoption that ultimately traps data in technology silos that ultimately increase compliance and productivity risks for the business