Beware of the Risk Behind Big Data
Garth Landers Director, Product Marketing Information Intelligence Group Twitter - @garthlanders
© Copyright 2013 EMC Corporation. All rights reserved.
1
Agenda • Big Data/Dark Data • How to get control over Dark Data • Use Cases
© Copyright 2013 EMC Corporation. All rights reserved.
2
Big Data = Structured+Unstructured Data Internet Of Things
Non-Enterprise Information
Structured Information In Relational Databases
Managed & Unmanaged Unstructured Information
Telemetry, Location-Based Information etc.
The Digital Universe Is Growing By 7,600 PB / Day
© Copyright 2013 EMC Corporation. All rights reserved.
3
How Companies Are Using Big Data Analytics Functional Areas Where Companies Are Using Big Data 49%
Customer Intimacy
39%
Budgeting & Planning
37%
Operations & Supply Chain
33%
Customer Service
30%
Performance Management
28%
New Product Strategy
21%
Pricing
0
10
20
30
40
50
McKinsey Global Survey of 1,469 C-level executive respondents at a range of industries and company sizes, “Minding Your Digital Business,” 2012.
© Copyright 2013 EMC Corporation. All rights reserved.
4
Dark Data? “Data not being used to get a 360 degree view of the customer”
“Dark Data is the bulk of the organization universe”
© Copyright 2013 EMC Corporation. All rights reserved.
5
Big Data Burdens Big Data Challenges Storage Optimization Lack of Visibility Policy Enablement
Big Data Potential Better insight into business conditions New Products/Services Maximum leverage from IT investment
© Copyright 2013 EMC Corporation. All rights reserved.
6
Turning Dark Data into Big Data Big Data is useful…..if you are asking the right questions
Context •How old is my data? •What information about customers does it contain? •Who created it/uses it?
© Copyright 2013 EMC Corporation. All rights reserved.
Value
Location
•What can I get rid of? •What do I need to retain based on business value •What does it cost to store this data? •How can I reuse and maximize the value of my Big Data?
•Is my Big Data in the right place? •How/where will I move my Big Data?
7
Why Dark Data Proliferates…
Organizations have 6 or more repositories
Organizations have enforced retention policies for paper and electronic
AIIM Market Intelligence Report , 2011
AIIM Market Intelligence Report , 2011 Records Management Strategies – Plotting the changes”,
© Copyright 2013 EMC Corporation. All rights reserved.
8
"Companies don't need the guy who is good with a shovel anymore. … They need a guy who is good with a bulldozer."
The Cloud: Battle of the Tech Titans Businessweek March 3, 2011
© Copyright 2013 EMC Corporation. All rights reserved.
9
HOW DO YOU
GET CONTROL?
© Copyright 2011 2013 EMC Corporation. All rights reserved.
10
BIG DATA INTELLIGENCE IDENTIFY & INDEX
CLASSIFY
CATALOG
CATALOG
© Copyright 2013 EMC Corporation. All rights reserved.
SEARCH
ANALYZE
ANALYZE
REPORT
SET ACTION
ACT
ACT
11
What is Kazeon? … Actionable Visibility into Data Personal Archives (PSTs / NSFs)
Email Servers (Exchange / Domino)
Desktops / Laptops
Archives (SourceOne / eVault)
Kazeon Appliance • eDiscovery / FOIA • Kazeon
File Shares
SharePoint
© Copyright 2013 EMC Corporation. All rights reserved.
Custom Connectors
Documentum
Backups (Avamar )
12
IDENTIFY & INDEX
• Easily target loosely managed content sources like SharePoint and file shares for content identification • Powerful indexing options available for identification and retrieval of content • Categorize content based on predefined or custom made criteria
CATALOG
PRODUCTS
© Copyright 2013 EMC Corporation. All rights reserved.
13
Risk Assessment Dashboard Risk Report By Document Age
Risk Report By Document Owner
© Copyright 2013 EMC Corporation. All rights reserved.
Risk Report by Document Location
Risk Report By Document Type
14
SET ACTION
• Transfer content to EMC Documentum or secure storage based on governance requirements • Delete duplicative, stale or unnecessary content reducing storage costs and freeing up primary storage • Create an automated policybased environment to increase productivity and free up resources
ACT
PRODUCTS
© Copyright 2013 EMC Corporation. All rights reserved.
15
File Migration – Deduplication Report
43.66% Savings can be obtained by leveraging de-duplication hardware for this file system.
© Copyright 2013 EMC Corporation. All rights reserved.
16
File Share Cleanup Report – Modified Report
Approximately 76% of the total storage scanned has not been modified in the past 180 – 364 days. This data is a candidate for cheaper tier of storage, or for archive.
© Copyright 2013 EMC Corporation. All rights reserved.
17
IT Policy Enforcement Example
Cleanup stale data through migration to inactive archive
Step 2: Select Action Move
Step 1: Step 1:
Select files not accessed in the past 365 days accessed in Select files not
the past 365 days
© Copyright 2013 EMC Corporation. All rights reserved.
18
IT Policy Enforcement Example (cont.) Cleanup stale data through migration to inactive archive
Step 3: Step 3:
Select target location – Tier_2_Storage
Select target location (Data Domain)
Step 4: Set enforcement schedule
© Copyright 2013 EMC Corporation. All rights reserved.
19
Kazeon Benefits • “Drop in” appliance – No need to setup an infrastructure, drop set and go.
• Repeatability – Use it on a continual basis to keep file monitoring in place, reducing costs and risk
• Flexibility – Can be applied to file shares, laptops, desktops, MS SharePoint, e-mail or Documentum
© Copyright 2013 EMC Corporation. All rights reserved.
20
SCENARIOS
ACCEPTABLE USE VIOLATIONS
DEFENSIBLE DELETION
© Copyright 2013 EMC Corporation. All rights reserved.
UNINTENDED EXPOSURE
21
DEFENSIBLE DELETION THE THEPROBLEM SOLUTION The Using process EMC Kazeon’s of manually automated searching indexing through and classification, vast sumslarge of content, volumesidentifying of business them records as can records, be identified and processing and transferred them to does EMCnot Documentum scale, taking to inordinate be amounts managed ofwith timeDocumentum and resources. Retention Policy Services Organizations do not have the resources to keep up with the huge volumes of content.
© Copyright 2013 EMC Corporation. All rights reserved.
22
Financial Services Provider
• Reduced risk of sensitive data being lost or stolen • Reduced risk by locating personally identifiable information spread across 100TB of data in 9 locations • Proactive daily scanning process of new data to assess risk and secure sensitive data
© Copyright 2013 EMC Corporation. All rights reserved.
23
ACCEPTABLE USE POLICY VIOLATIONS THE PROBLEM THE SOLUTION Employees Utilize violate EMC acceptable Kazeon to identify use policies, content storing with low personal business value. and other Defensibly non work delete related content. content on company servers. Content violates HR policy and drives up costs.
BACK © Copyright 2013 EMC Corporation. All rights reserved.
24
UNINTENDED EXPOSURE of sensitive info on informal systems
THE SOLUTION THE PROBLEM Utilize EMC Kazeon to identify Important business information with high value, such ascontent trade secrets, product intellectual property, trade plans and customer information potential risk. locatedsecrets, in unsecure or loosely managed environments like file Move to EMC Documentum, shares protect and Microsoft SharePoint with security,
information rights and retention policy management.
BACK © Copyright 2013 EMC Corporation. All rights reserved.
25
Questions and Answers
To type a question via WebEx, click on the Q&A tab Please select “Ask: All Panelists” to ensure your questions reach us. Thank you!
© Copyright 2013 EMC Corporation. All rights reserved.
26
Resources More Information – Kazeon File Intelligence: – http://www.emc.com/content-management/emc-kazeonfile-intelligence.htm
15 Minute Guides: – Understand and Secure Your Content: http://www.emc.com/collateral/software/15-minguide/h9774-15min-guide-understand-secure-contentgde.htm
© Copyright 2013 EMC Corporation. All rights reserved.
27
THANK YOU
© Copyright 2013 EMC Corporation. All rights reserved.
28