Beware of the Risk Behind Big Data

Beware of the Risk Behind Big Data Garth Landers Director, Product Marketing Information Intelligence Group Twitter - @garthlanders © Copyright 2013...
Author: Angela Dixon
4 downloads 0 Views 2MB Size
Beware of the Risk Behind Big Data

Garth Landers Director, Product Marketing Information Intelligence Group Twitter - @garthlanders

© Copyright 2013 EMC Corporation. All rights reserved.

1

Agenda • Big Data/Dark Data • How to get control over Dark Data • Use Cases

© Copyright 2013 EMC Corporation. All rights reserved.

2

Big Data = Structured+Unstructured Data Internet Of Things

Non-Enterprise Information

Structured Information In Relational Databases

Managed & Unmanaged Unstructured Information

Telemetry, Location-Based Information etc.

The Digital Universe Is Growing By 7,600 PB / Day

© Copyright 2013 EMC Corporation. All rights reserved.

3

How Companies Are Using Big Data Analytics Functional Areas Where Companies Are Using Big Data 49%

Customer Intimacy

39%

Budgeting & Planning

37%

Operations & Supply Chain

33%

Customer Service

30%

Performance Management

28%

New Product Strategy

21%

Pricing

0

10

20

30

40

50

McKinsey Global Survey of 1,469 C-level executive respondents at a range of industries and company sizes, “Minding Your Digital Business,” 2012.

© Copyright 2013 EMC Corporation. All rights reserved.

4

Dark Data? “Data not being used to get a 360 degree view of the customer”

“Dark Data is the bulk of the organization universe”

© Copyright 2013 EMC Corporation. All rights reserved.

5

Big Data Burdens Big Data Challenges Storage Optimization Lack of Visibility Policy Enablement

Big Data Potential Better insight into business conditions New Products/Services Maximum leverage from IT investment

© Copyright 2013 EMC Corporation. All rights reserved.

6

Turning Dark Data into Big Data Big Data is useful…..if you are asking the right questions

Context •How old is my data? •What information about customers does it contain? •Who created it/uses it?

© Copyright 2013 EMC Corporation. All rights reserved.

Value

Location

•What can I get rid of? •What do I need to retain based on business value •What does it cost to store this data? •How can I reuse and maximize the value of my Big Data?

•Is my Big Data in the right place? •How/where will I move my Big Data?

7

Why Dark Data Proliferates…

Organizations have 6 or more repositories

Organizations have enforced retention policies for paper and electronic

AIIM Market Intelligence Report , 2011

AIIM Market Intelligence Report , 2011 Records Management Strategies – Plotting the changes”,

© Copyright 2013 EMC Corporation. All rights reserved.

8

"Companies don't need the guy who is good with a shovel anymore. … They need a guy who is good with a bulldozer."

The Cloud: Battle of the Tech Titans Businessweek March 3, 2011

© Copyright 2013 EMC Corporation. All rights reserved.

9

HOW DO YOU

GET CONTROL?

© Copyright 2011 2013 EMC Corporation. All rights reserved.

10

BIG DATA INTELLIGENCE IDENTIFY & INDEX

CLASSIFY

CATALOG

CATALOG

© Copyright 2013 EMC Corporation. All rights reserved.

SEARCH

ANALYZE

ANALYZE

REPORT

SET ACTION

ACT

ACT

11

What is Kazeon? … Actionable Visibility into Data Personal Archives (PSTs / NSFs)

Email Servers (Exchange / Domino)

Desktops / Laptops

Archives (SourceOne / eVault)

Kazeon Appliance • eDiscovery / FOIA • Kazeon

File Shares

SharePoint

© Copyright 2013 EMC Corporation. All rights reserved.

Custom Connectors

Documentum

Backups (Avamar )

12

IDENTIFY & INDEX

• Easily target loosely managed content sources like SharePoint and file shares for content identification • Powerful indexing options available for identification and retrieval of content • Categorize content based on predefined or custom made criteria

CATALOG

PRODUCTS

© Copyright 2013 EMC Corporation. All rights reserved.

13

Risk Assessment Dashboard Risk Report By Document Age

Risk Report By Document Owner

© Copyright 2013 EMC Corporation. All rights reserved.

Risk Report by Document Location

Risk Report By Document Type

14

SET ACTION

• Transfer content to EMC Documentum or secure storage based on governance requirements • Delete duplicative, stale or unnecessary content reducing storage costs and freeing up primary storage • Create an automated policybased environment to increase productivity and free up resources

ACT

PRODUCTS

© Copyright 2013 EMC Corporation. All rights reserved.

15

File Migration – Deduplication Report

43.66% Savings can be obtained by leveraging de-duplication hardware for this file system.

© Copyright 2013 EMC Corporation. All rights reserved.

16

File Share Cleanup Report – Modified Report

Approximately 76% of the total storage scanned has not been modified in the past 180 – 364 days. This data is a candidate for cheaper tier of storage, or for archive.

© Copyright 2013 EMC Corporation. All rights reserved.

17

IT Policy Enforcement Example

Cleanup stale data through migration to inactive archive

Step 2: Select Action Move

Step 1: Step 1:

Select files not accessed in the past 365 days accessed in Select files not

the past 365 days

© Copyright 2013 EMC Corporation. All rights reserved.

18

IT Policy Enforcement Example (cont.) Cleanup stale data through migration to inactive archive

Step 3: Step 3:

Select target location – Tier_2_Storage

Select target location (Data Domain)

Step 4: Set enforcement schedule

© Copyright 2013 EMC Corporation. All rights reserved.

19

Kazeon Benefits • “Drop in” appliance – No need to setup an infrastructure, drop set and go.

• Repeatability – Use it on a continual basis to keep file monitoring in place, reducing costs and risk

• Flexibility – Can be applied to file shares, laptops, desktops, MS SharePoint, e-mail or Documentum

© Copyright 2013 EMC Corporation. All rights reserved.

20

SCENARIOS

ACCEPTABLE USE VIOLATIONS

DEFENSIBLE DELETION

© Copyright 2013 EMC Corporation. All rights reserved.

UNINTENDED EXPOSURE

21

DEFENSIBLE DELETION THE THEPROBLEM SOLUTION The Using process EMC Kazeon’s of manually automated searching indexing through and classification, vast sumslarge of content, volumesidentifying of business them records as can records, be identified and processing and transferred them to does EMCnot Documentum scale, taking to inordinate be amounts managed ofwith timeDocumentum and resources. Retention Policy Services Organizations do not have the resources to keep up with the huge volumes of content.

© Copyright 2013 EMC Corporation. All rights reserved.

22

Financial Services Provider

• Reduced risk of sensitive data being lost or stolen • Reduced risk by locating personally identifiable information spread across 100TB of data in 9 locations • Proactive daily scanning process of new data to assess risk and secure sensitive data

© Copyright 2013 EMC Corporation. All rights reserved.

23

ACCEPTABLE USE POLICY VIOLATIONS THE PROBLEM THE SOLUTION Employees Utilize violate EMC acceptable Kazeon to identify use policies, content storing with low personal business value. and other Defensibly non work delete related content. content on company servers. Content violates HR policy and drives up costs.

BACK © Copyright 2013 EMC Corporation. All rights reserved.

24

UNINTENDED EXPOSURE of sensitive info on informal systems

THE SOLUTION THE PROBLEM Utilize EMC Kazeon to identify Important business information with high value, such ascontent trade secrets, product intellectual property, trade plans and customer information potential risk. locatedsecrets, in unsecure or loosely managed environments like file Move to EMC Documentum, shares protect and Microsoft SharePoint with security,

information rights and retention policy management.

BACK © Copyright 2013 EMC Corporation. All rights reserved.

25

Questions and Answers

To type a question via WebEx, click on the Q&A tab Please select “Ask: All Panelists” to ensure your questions reach us. Thank you!

© Copyright 2013 EMC Corporation. All rights reserved.

26

Resources  More Information – Kazeon File Intelligence: – http://www.emc.com/content-management/emc-kazeonfile-intelligence.htm

 15 Minute Guides: – Understand and Secure Your Content: http://www.emc.com/collateral/software/15-minguide/h9774-15min-guide-understand-secure-contentgde.htm

© Copyright 2013 EMC Corporation. All rights reserved.

27

THANK YOU

© Copyright 2013 EMC Corporation. All rights reserved.

28