SlideShare una empresa de Scribd logo
1 de 22
Intelligent Information Management:
Archive & eDiscovery
Andrew Blackham
Arrow ECS – Presales Specialist
Agenda
Symantec Enterprise Vault™ 10 Customer Presentation 2
Today’s Information Management Challenges1
Why Information Management?2
The Solution: Symantec Archiving & eDiscovery3
Q&A4
Agenda
Symantec Enterprise Vault™ 10 Customer Presentation 3
Today’s Information Management Challenges1
Why Information Management?2
The Solution: Symantec Archiving & eDiscovery3
Q&A4
Today’s Information Management Challenges
Symantec Enterprise Vault™ 10 Customer Presentation 4
•User mindset: keep everything forever
•Duplicated data causing more waste
•Unsustainable backup windows
•Over retention increasing costs
•Infinite retention = infinite waste
•Increased litigation risk and exposure
•Storage is cheap; search and review costly
•Improper use of backup systems
•Inefficient discovery and legal hold processes
Information Growth
& Waste
Fear of Deletion
Search and eDiscovery is
Always a Fire Drill
What If I Could…?
Symantec Enterprise Vault™ 10 Customer Presentation 5
Challenges
Execute an
Information
Governance
plan
Simplify search
and
eDiscovery…
Control local
email archives
(.pst & .nsf files)
Reduce storage
costs…
Improve backup
performance…
Better manage
unstructured
information…
Agenda
Symantec Enterprise Vault™ 10 Customer Presentation 6
Today’s Information Management Challenges1
Why Information Management?2
The Solution: Symantec Archiving & eDiscovery3
Q&A4
Symantec Information Management
8
Protect
Completely
Discover
Efficiently
Delete
Confidently
Dedupe
Everywhere
DR without a
tape mountain
Fewer duplicate
copies
Lower storage
costs
Reduce legal &
regulatory costs
Symantec Enterprise Vault™ 10 Customer Presentation
Agenda
Symantec Enterprise Vault™ 10 Customer Presentation 9
Today’s Information Management Challenges1
Why Information Management?2
The Solution: Symantec Archiving and eDiscovery3
Q&A4
Symantec Enterprise Vault
Symantec Enterprise Vault™ 10 Customer Presentation 10
•Resource management
•Retention management
•Discovery management
Flexible Policy-based
Archiving Software
•Proven: 10+ years
experience
•Intelligent: Ensures
archive remains
manageable
•Open: Investment
protection by extending
functionality
•Efficient: Minimizes
footprint to maintain low
TCO
Leading
Archiving Solution
•16,000+ customers and
33 MM+ users archived
•Production customers
archiving 5 MM+
messages/day
•Deployments archiving
1M+ users
Proven Technology
LEGAL
Archive and eDiscovery Platform
Symantec Enterprise Vault™ 10 Customer Presentation 11
CLASSIFICATION
Store
Migration
Deduplication
Compression
Transparency
Manage
Retention
Preservation
Deletion
Reporting
Archive
Discover
Guided Review
Legal Hold
Search
Supervision
INFO
SEC
EMAIL
SERVERS
FILE
SERVERS
IM
SERVERS
SHAREPOINT
LEGACY
DATABASES
DESKTOPS
HR
END
USERS
SOCIAL
MEDIA
Works with Your Existing Architecture
Symantec Enterprise Vault™ 10 Customer Presentation 12
OPEN APIs
EMAIL
SERVERS
FILE
SERVERS
IM
SERVERS
SHAREPOINT
LEGACY
DATABASES
DESKTOPS
Manage
Open Classification
Encryption
Open ECM
Discover
Open eDiscovery
Open Search
Store
Open Storage
SOCIAL
MEDIA
3rd Party Content,
Services & Solutions
Managed Services
& Hosting
Archiving: How it Works
Symantec Enterprise Vault™ 10 Customer Presentation 13
SAN, NFS, CIFS, DAS, etc.
Enterprise
Vault
Email SharePoint Files
13
1. Migrate
information to
archive
2. Apply deduplication
3. Reduce information
stores
4. Expire data over
time
5. Discover efficiently
Storage
MSFT BPOS
Office 365
Cloud
Social Media
Seamless End-User Experience
Symantec Enterprise Vault™ 10 Customer Presentation 14
User Access
• Dynamic shortcuts
• Preview archived content
• Forward, reply, delete
• Archive, restore and search
via toolbar/menus
• Option for client-less
deployment (“Universal
Shortcuts”)
• Support for Domino and
Outlook Web Access
Data Classification Services (DCS)
Symantec Enterprise Vault™ 10 Customer Presentation 15
Policy Driven Classification What does it do?
– Archive decision, retention, tags
– Reduces the cost of reactive
Discovery
– Prioritizes items for supervisory
review
– Analyzes content and metadata during
archiving
– Decides on an archiving and retention
strategy
– Assigns searchable classification tags
Take Control of PSTs & NSFs
16
• 2) Migrate PST/NSF into archive
– Even with mobile users
– Limited user action
Enterprise Vault
PC
Network
Share
• 1) Locate PST/NSF
– Network servers
– PCs
• 3) Optionally dispose PST
– Delete, hide
– Compact
Transparent End-User Access
Dedupe Across Email,
Attachments,
SharePoint, etc.
Symantec Enterprise Vault™ 10 Customer Presentation
Ease Email Migrations
Symantec Enterprise Vault™ 10 Customer Presentation 17
Exchange 200x Exchange 2010
Single User Archive
Efficient Storage
• Proactively archive most
of data in mailboxes
• Archiving reduces time
for mailbox move
• Data reduced because
of single instance storage
and compression
Backups are for Recovery, Archiving is for Discovery
• Used to recover systems and data due
to corruption or loss
• File, Directory, Volume, Application
• Limited resources consumption
– End-user recovery
– Help desk support
• Search across multiple content sources –
email, files, instant messages, social media
• Any event can trigger discovery
• Indexing and classification makes it easier
• Legal hold
• Improve resource and budget across:
– IT
– Legal
– Outside parties
Recovery Discovery
18Symantec Enterprise Vault™ 10 Customer Presentation
19
A Single Solution for the Entire Electronic Discovery
Reference Model
Information
Management
Identification
Preservation
Collection
Processing
Review
Analysis
Production
eDiscovery Timeline
Clearwell
The Electronic Discovery Reference Model (EDRM)
Symantec Enterprise Vault
Symantec Enterprise Vault™ 10 Customer Presentation
Symantec Enterprise Vault
Discovery Accelerator
Reduce Risk by Improving the Defensibility and
Repeatability of Your Processes
20Symantec Enterprise Vault™ 10 Customer Presentation
Leverage a
Comprehensive
Data Store
Ensure Consistent
Workflow
Provide
Transparency and
Real-Time Reporting
Enforce Retention
Policies and Legal
Holds
Maintain Chain of Custody
2 4 6 8 10
10 Weeks
Traditional
Process
Average Case Time Savings
with Clearwell1.5 Weeks
Automated
Process with
Symantec
Weeks
Case Study: NBC Universal
Streamline to Meet Court and Regulatory Deadlines
eDiscovery Case Timeline
• Search a centrally managed and indexed repository
• Rapidly target collections
• Minimize movement of data between tools
• Easily iterative between eDiscovery phases
• Accelerate early case assessment
21Symantec Enterprise Vault™ 10 Customer Presentation
Agenda
Symantec Enterprise Vault™ 10 Customer Presentation 22
Today’s Information Management Challenges1
Why Information Management?2
The Solution: Symantec Archiving & eDiscovery3
Q&A4
Thank you!
Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or
implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Thank you!
Symantec Enterprise Vault™ 10 Customer Presentation 23

Más contenido relacionado

La actualidad más candente

Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big DataNicolas Morales
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspectiveCraig Mullins
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...Everteam
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiEryk Budi Pratama
 
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow CanyonData Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow CanyonVlad Catrinescu
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive OverviewKim Jensen
 
Data Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer DataData Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer DataTrustArc
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedJerry Paul Acosta
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Everteam
 

La actualidad más candente (20)

Data Loss Prevention: Brainstorming
Data Loss Prevention: BrainstormingData Loss Prevention: Brainstorming
Data Loss Prevention: Brainstorming
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data Pribadi
 
Big security for big data
Big security for big dataBig security for big data
Big security for big data
 
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow CanyonData Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Data Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer DataData Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer Data
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2
 

Destacado

Symantec information protection portfolio
Symantec information protection portfolioSymantec information protection portfolio
Symantec information protection portfolioAlexander Stepanov
 
Vip strong authentication : No Passwords - infographic by Symantec
Vip strong authentication : No Passwords - infographic by SymantecVip strong authentication : No Passwords - infographic by Symantec
Vip strong authentication : No Passwords - infographic by SymantecCheapSSLsecurity
 
Strong authentication for your organization in a cost effective cloud-based...
Strong authentication for  your organization in a cost  effective cloud-based...Strong authentication for  your organization in a cost  effective cloud-based...
Strong authentication for your organization in a cost effective cloud-based...NetwayClub
 
Veritas Managed Enterprise Vault Infographic
Veritas Managed Enterprise Vault InfographicVeritas Managed Enterprise Vault Infographic
Veritas Managed Enterprise Vault InfographicVeritas Technologies LLC
 
Veritas Managed Enterprise Vault Sales Presentation
Veritas Managed Enterprise Vault Sales PresentationVeritas Managed Enterprise Vault Sales Presentation
Veritas Managed Enterprise Vault Sales PresentationIdeba
 
Electronic Discovery 101 - From ESI to the EDRM
Electronic Discovery 101 - From ESI to the EDRMElectronic Discovery 101 - From ESI to the EDRM
Electronic Discovery 101 - From ESI to the EDRMRob Robinson
 

Destacado (7)

Symantec information protection portfolio
Symantec information protection portfolioSymantec information protection portfolio
Symantec information protection portfolio
 
EDRM - OLP
EDRM - OLPEDRM - OLP
EDRM - OLP
 
Vip strong authentication : No Passwords - infographic by Symantec
Vip strong authentication : No Passwords - infographic by SymantecVip strong authentication : No Passwords - infographic by Symantec
Vip strong authentication : No Passwords - infographic by Symantec
 
Strong authentication for your organization in a cost effective cloud-based...
Strong authentication for  your organization in a cost  effective cloud-based...Strong authentication for  your organization in a cost  effective cloud-based...
Strong authentication for your organization in a cost effective cloud-based...
 
Veritas Managed Enterprise Vault Infographic
Veritas Managed Enterprise Vault InfographicVeritas Managed Enterprise Vault Infographic
Veritas Managed Enterprise Vault Infographic
 
Veritas Managed Enterprise Vault Sales Presentation
Veritas Managed Enterprise Vault Sales PresentationVeritas Managed Enterprise Vault Sales Presentation
Veritas Managed Enterprise Vault Sales Presentation
 
Electronic Discovery 101 - From ESI to the EDRM
Electronic Discovery 101 - From ESI to the EDRMElectronic Discovery 101 - From ESI to the EDRM
Electronic Discovery 101 - From ESI to the EDRM
 

Similar a Data Retention and eDiscovery from Symantec

Intelligent Information Management: Archive & eDiscovery
Intelligent Information Management: Archive & eDiscoveryIntelligent Information Management: Archive & eDiscovery
Intelligent Information Management: Archive & eDiscoveryArrow ECS UK
 
Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]
Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]
Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]getsix Group
 
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...Proact Netherlands B.V.
 
Van backup only naar end-to-end-datamanagement vanuit één centrale GUI
Van backup only naar end-to-end-datamanagement vanuit één centrale GUIVan backup only naar end-to-end-datamanagement vanuit één centrale GUI
Van backup only naar end-to-end-datamanagement vanuit één centrale GUIProact Netherlands B.V.
 
Better together: Enterprise Vault.cloud and Microsoft Office 365
Better together: Enterprise Vault.cloud and Microsoft Office 365Better together: Enterprise Vault.cloud and Microsoft Office 365
Better together: Enterprise Vault.cloud and Microsoft Office 365proutley
 
EMC InfoArchive Overview: Offered by Sigma
EMC InfoArchive Overview: Offered by SigmaEMC InfoArchive Overview: Offered by Sigma
EMC InfoArchive Overview: Offered by SigmaJonathan Simpson
 
ISM-SLIDE and Data centered Architecture
ISM-SLIDE and Data centered ArchitectureISM-SLIDE and Data centered Architecture
ISM-SLIDE and Data centered ArchitectureReginR2
 
Backup and Archive Doesn't Have to be Complicated and Expensive
Backup and Archive Doesn't Have to be Complicated and ExpensiveBackup and Archive Doesn't Have to be Complicated and Expensive
Backup and Archive Doesn't Have to be Complicated and Expensivespectralogic
 
ADV Slides: Platforming Your Data for Success – Databases, Hadoop, Managed Ha...
ADV Slides: Platforming Your Data for Success – Databases, Hadoop, Managed Ha...ADV Slides: Platforming Your Data for Success – Databases, Hadoop, Managed Ha...
ADV Slides: Platforming Your Data for Success – Databases, Hadoop, Managed Ha...DATAVERSITY
 
Three Steps to Modern Media Asset Management with Active Archive
Three Steps to Modern Media Asset Management with Active ArchiveThree Steps to Modern Media Asset Management with Active Archive
Three Steps to Modern Media Asset Management with Active ArchiveAvere Systems
 
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...DATAVERSITY
 
Data Discovery and PCI DSS
Data Discovery and PCI DSSData Discovery and PCI DSS
Data Discovery and PCI DSSControlCase
 
Card Data Discovery and PCI DSS
Card Data Discovery and PCI DSSCard Data Discovery and PCI DSS
Card Data Discovery and PCI DSSKimberly Simon MBA
 
Key Architecture and Performance Principles to Optimize Data Management
Key Architecture and Performance Principles to Optimize Data ManagementKey Architecture and Performance Principles to Optimize Data Management
Key Architecture and Performance Principles to Optimize Data ManagementJana Lass
 
Logicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Australia
 
Regulatory Compliance and Long-Term Storage of Data
Regulatory Compliance and Long-Term Storage of DataRegulatory Compliance and Long-Term Storage of Data
Regulatory Compliance and Long-Term Storage of DataArkivum
 
Data Architecture Best Practices for Advanced Analytics
Data Architecture Best Practices for Advanced AnalyticsData Architecture Best Practices for Advanced Analytics
Data Architecture Best Practices for Advanced AnalyticsDATAVERSITY
 
Drive Information Governance and Significant Cost Savings with E-Mail Archivi...
Drive Information Governance and Significant Cost Savings with E-Mail Archivi...Drive Information Governance and Significant Cost Savings with E-Mail Archivi...
Drive Information Governance and Significant Cost Savings with E-Mail Archivi...John Wang
 

Similar a Data Retention and eDiscovery from Symantec (20)

Intelligent Information Management: Archive & eDiscovery
Intelligent Information Management: Archive & eDiscoveryIntelligent Information Management: Archive & eDiscovery
Intelligent Information Management: Archive & eDiscovery
 
Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]
Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]
Symantec Enterprise Vault.cloud for Microsoft Office 365 Better together [EN]
 
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
 
Van backup only naar end-to-end-datamanagement vanuit één centrale GUI
Van backup only naar end-to-end-datamanagement vanuit één centrale GUIVan backup only naar end-to-end-datamanagement vanuit één centrale GUI
Van backup only naar end-to-end-datamanagement vanuit één centrale GUI
 
Better together: Enterprise Vault.cloud and Microsoft Office 365
Better together: Enterprise Vault.cloud and Microsoft Office 365Better together: Enterprise Vault.cloud and Microsoft Office 365
Better together: Enterprise Vault.cloud and Microsoft Office 365
 
EMC InfoArchive Overview: Offered by Sigma
EMC InfoArchive Overview: Offered by SigmaEMC InfoArchive Overview: Offered by Sigma
EMC InfoArchive Overview: Offered by Sigma
 
ISM-SLIDE and Data centered Architecture
ISM-SLIDE and Data centered ArchitectureISM-SLIDE and Data centered Architecture
ISM-SLIDE and Data centered Architecture
 
Backup and Archive Doesn't Have to be Complicated and Expensive
Backup and Archive Doesn't Have to be Complicated and ExpensiveBackup and Archive Doesn't Have to be Complicated and Expensive
Backup and Archive Doesn't Have to be Complicated and Expensive
 
To Preserve or Collect
To Preserve or CollectTo Preserve or Collect
To Preserve or Collect
 
ADV Slides: Platforming Your Data for Success – Databases, Hadoop, Managed Ha...
ADV Slides: Platforming Your Data for Success – Databases, Hadoop, Managed Ha...ADV Slides: Platforming Your Data for Success – Databases, Hadoop, Managed Ha...
ADV Slides: Platforming Your Data for Success – Databases, Hadoop, Managed Ha...
 
Three Steps to Modern Media Asset Management with Active Archive
Three Steps to Modern Media Asset Management with Active ArchiveThree Steps to Modern Media Asset Management with Active Archive
Three Steps to Modern Media Asset Management with Active Archive
 
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
ADV Slides: The Evolution of the Data Platform and What It Means to Enterpris...
 
Data Discovery and PCI DSS
Data Discovery and PCI DSSData Discovery and PCI DSS
Data Discovery and PCI DSS
 
Data Discovery and PCI DSS
Data Discovery and PCI DSSData Discovery and PCI DSS
Data Discovery and PCI DSS
 
Card Data Discovery and PCI DSS
Card Data Discovery and PCI DSSCard Data Discovery and PCI DSS
Card Data Discovery and PCI DSS
 
Key Architecture and Performance Principles to Optimize Data Management
Key Architecture and Performance Principles to Optimize Data ManagementKey Architecture and Performance Principles to Optimize Data Management
Key Architecture and Performance Principles to Optimize Data Management
 
Logicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data Protection
 
Regulatory Compliance and Long-Term Storage of Data
Regulatory Compliance and Long-Term Storage of DataRegulatory Compliance and Long-Term Storage of Data
Regulatory Compliance and Long-Term Storage of Data
 
Data Architecture Best Practices for Advanced Analytics
Data Architecture Best Practices for Advanced AnalyticsData Architecture Best Practices for Advanced Analytics
Data Architecture Best Practices for Advanced Analytics
 
Drive Information Governance and Significant Cost Savings with E-Mail Archivi...
Drive Information Governance and Significant Cost Savings with E-Mail Archivi...Drive Information Governance and Significant Cost Savings with E-Mail Archivi...
Drive Information Governance and Significant Cost Savings with E-Mail Archivi...
 

Más de Arrow ECS UK

Grow your future with leasing.
Grow your future with leasing.Grow your future with leasing.
Grow your future with leasing.Arrow ECS UK
 
Arrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow ECS UK
 
Arrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow ECS UK
 
Arrow Live Class Link
Arrow Live Class LinkArrow Live Class Link
Arrow Live Class LinkArrow ECS UK
 
Arrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS UK
 
2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internetArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow ECS UK
 
Arrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow ECS UK
 
Arrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow ECS UK
 
Helping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMHelping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMArrow ECS UK
 
Arrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow ECS UK
 
IBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewIBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewArrow ECS UK
 
Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Arrow ECS UK
 
IBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateIBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateArrow ECS UK
 
How to Win against the Competition
How to Win against the CompetitionHow to Win against the Competition
How to Win against the CompetitionArrow ECS UK
 
Align IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersAlign IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersArrow ECS UK
 
Working with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelWorking with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelArrow ECS UK
 

Más de Arrow ECS UK (20)

Grow your future with leasing.
Grow your future with leasing.Grow your future with leasing.
Grow your future with leasing.
 
Arrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education Partner
 
Arrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training Centre
 
Arrow Live Class Link
Arrow Live Class LinkArrow Live Class Link
Arrow Live Class Link
 
Arrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business Partners
 
2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
 
Arrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart Simmons
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
 
Arrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian French
 
Arrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David Fearne
 
Arrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete Story
 
Helping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMHelping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBM
 
Arrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV Jam
 
IBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewIBM Business Analytics Marketing Overview
IBM Business Analytics Marketing Overview
 
Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...
 
IBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateIBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan template
 
How to Win against the Competition
How to Win against the CompetitionHow to Win against the Competition
How to Win against the Competition
 
Align IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersAlign IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business Partners
 
Working with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelWorking with the IBM Business Analytics Channel
Working with the IBM Business Analytics Channel
 

Último

H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Último (20)

H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Data Retention and eDiscovery from Symantec

  • 1. Intelligent Information Management: Archive & eDiscovery Andrew Blackham Arrow ECS – Presales Specialist
  • 2. Agenda Symantec Enterprise Vault™ 10 Customer Presentation 2 Today’s Information Management Challenges1 Why Information Management?2 The Solution: Symantec Archiving & eDiscovery3 Q&A4
  • 3. Agenda Symantec Enterprise Vault™ 10 Customer Presentation 3 Today’s Information Management Challenges1 Why Information Management?2 The Solution: Symantec Archiving & eDiscovery3 Q&A4
  • 4. Today’s Information Management Challenges Symantec Enterprise Vault™ 10 Customer Presentation 4 •User mindset: keep everything forever •Duplicated data causing more waste •Unsustainable backup windows •Over retention increasing costs •Infinite retention = infinite waste •Increased litigation risk and exposure •Storage is cheap; search and review costly •Improper use of backup systems •Inefficient discovery and legal hold processes Information Growth & Waste Fear of Deletion Search and eDiscovery is Always a Fire Drill
  • 5. What If I Could…? Symantec Enterprise Vault™ 10 Customer Presentation 5 Challenges Execute an Information Governance plan Simplify search and eDiscovery… Control local email archives (.pst & .nsf files) Reduce storage costs… Improve backup performance… Better manage unstructured information…
  • 6. Agenda Symantec Enterprise Vault™ 10 Customer Presentation 6 Today’s Information Management Challenges1 Why Information Management?2 The Solution: Symantec Archiving & eDiscovery3 Q&A4
  • 7. Symantec Information Management 8 Protect Completely Discover Efficiently Delete Confidently Dedupe Everywhere DR without a tape mountain Fewer duplicate copies Lower storage costs Reduce legal & regulatory costs Symantec Enterprise Vault™ 10 Customer Presentation
  • 8. Agenda Symantec Enterprise Vault™ 10 Customer Presentation 9 Today’s Information Management Challenges1 Why Information Management?2 The Solution: Symantec Archiving and eDiscovery3 Q&A4
  • 9. Symantec Enterprise Vault Symantec Enterprise Vault™ 10 Customer Presentation 10 •Resource management •Retention management •Discovery management Flexible Policy-based Archiving Software •Proven: 10+ years experience •Intelligent: Ensures archive remains manageable •Open: Investment protection by extending functionality •Efficient: Minimizes footprint to maintain low TCO Leading Archiving Solution •16,000+ customers and 33 MM+ users archived •Production customers archiving 5 MM+ messages/day •Deployments archiving 1M+ users Proven Technology
  • 10. LEGAL Archive and eDiscovery Platform Symantec Enterprise Vault™ 10 Customer Presentation 11 CLASSIFICATION Store Migration Deduplication Compression Transparency Manage Retention Preservation Deletion Reporting Archive Discover Guided Review Legal Hold Search Supervision INFO SEC EMAIL SERVERS FILE SERVERS IM SERVERS SHAREPOINT LEGACY DATABASES DESKTOPS HR END USERS SOCIAL MEDIA
  • 11. Works with Your Existing Architecture Symantec Enterprise Vault™ 10 Customer Presentation 12 OPEN APIs EMAIL SERVERS FILE SERVERS IM SERVERS SHAREPOINT LEGACY DATABASES DESKTOPS Manage Open Classification Encryption Open ECM Discover Open eDiscovery Open Search Store Open Storage SOCIAL MEDIA 3rd Party Content, Services & Solutions Managed Services & Hosting
  • 12. Archiving: How it Works Symantec Enterprise Vault™ 10 Customer Presentation 13 SAN, NFS, CIFS, DAS, etc. Enterprise Vault Email SharePoint Files 13 1. Migrate information to archive 2. Apply deduplication 3. Reduce information stores 4. Expire data over time 5. Discover efficiently Storage MSFT BPOS Office 365 Cloud Social Media
  • 13. Seamless End-User Experience Symantec Enterprise Vault™ 10 Customer Presentation 14 User Access • Dynamic shortcuts • Preview archived content • Forward, reply, delete • Archive, restore and search via toolbar/menus • Option for client-less deployment (“Universal Shortcuts”) • Support for Domino and Outlook Web Access
  • 14. Data Classification Services (DCS) Symantec Enterprise Vault™ 10 Customer Presentation 15 Policy Driven Classification What does it do? – Archive decision, retention, tags – Reduces the cost of reactive Discovery – Prioritizes items for supervisory review – Analyzes content and metadata during archiving – Decides on an archiving and retention strategy – Assigns searchable classification tags
  • 15. Take Control of PSTs & NSFs 16 • 2) Migrate PST/NSF into archive – Even with mobile users – Limited user action Enterprise Vault PC Network Share • 1) Locate PST/NSF – Network servers – PCs • 3) Optionally dispose PST – Delete, hide – Compact Transparent End-User Access Dedupe Across Email, Attachments, SharePoint, etc. Symantec Enterprise Vault™ 10 Customer Presentation
  • 16. Ease Email Migrations Symantec Enterprise Vault™ 10 Customer Presentation 17 Exchange 200x Exchange 2010 Single User Archive Efficient Storage • Proactively archive most of data in mailboxes • Archiving reduces time for mailbox move • Data reduced because of single instance storage and compression
  • 17. Backups are for Recovery, Archiving is for Discovery • Used to recover systems and data due to corruption or loss • File, Directory, Volume, Application • Limited resources consumption – End-user recovery – Help desk support • Search across multiple content sources – email, files, instant messages, social media • Any event can trigger discovery • Indexing and classification makes it easier • Legal hold • Improve resource and budget across: – IT – Legal – Outside parties Recovery Discovery 18Symantec Enterprise Vault™ 10 Customer Presentation
  • 18. 19 A Single Solution for the Entire Electronic Discovery Reference Model Information Management Identification Preservation Collection Processing Review Analysis Production eDiscovery Timeline Clearwell The Electronic Discovery Reference Model (EDRM) Symantec Enterprise Vault Symantec Enterprise Vault™ 10 Customer Presentation Symantec Enterprise Vault Discovery Accelerator
  • 19. Reduce Risk by Improving the Defensibility and Repeatability of Your Processes 20Symantec Enterprise Vault™ 10 Customer Presentation Leverage a Comprehensive Data Store Ensure Consistent Workflow Provide Transparency and Real-Time Reporting Enforce Retention Policies and Legal Holds Maintain Chain of Custody
  • 20. 2 4 6 8 10 10 Weeks Traditional Process Average Case Time Savings with Clearwell1.5 Weeks Automated Process with Symantec Weeks Case Study: NBC Universal Streamline to Meet Court and Regulatory Deadlines eDiscovery Case Timeline • Search a centrally managed and indexed repository • Rapidly target collections • Minimize movement of data between tools • Easily iterative between eDiscovery phases • Accelerate early case assessment 21Symantec Enterprise Vault™ 10 Customer Presentation
  • 21. Agenda Symantec Enterprise Vault™ 10 Customer Presentation 22 Today’s Information Management Challenges1 Why Information Management?2 The Solution: Symantec Archiving & eDiscovery3 Q&A4
  • 22. Thank you! Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Thank you! Symantec Enterprise Vault™ 10 Customer Presentation 23

Notas del editor

  1. Information Growth and Waste: This is not a new problem and customers are probably tired of hearing it, but in reality the problem is only getting worse. It’s estimated that unstructured data is now approximately 80% of the data being managed, often with infrastructuresthat were originally designed for corporate transactional data. To make the situation worse, up to 70% of that data is duplicate and hasn’t been accessed in more than 90 days. Over the next five years storage demand is expected to grow 35 – 65%. Fear of Deletion: There are many schools of thought about how long to keep information. Some are ultra conservitive and don’t want to keep anything. These are the minority. The majority ends up keeping everything forever. This is driven primarily by the fear of deletion or “what if I need this in the future?” Organizations without a formal retention and deletion policy tend to over retain information well past its usable life. Over retention is the primary driver for the first point we made about Information Growth and Waste. However, the hidden problems to over retention lay in the backup system. Symantec recently ran an Information Management Health Check Survey and found that 25% of data backed didn’t need to be backup up at all. The survey also found that 45% of backup storage had an infinite retention policy or was on legal hold and 40% of the data on legal hold was not even relevant to the matter. Keeping this amount of information hidden in the backup system puts the company at a tremendous risk and exposes them to sanctions, fines and other risks if ever challenged.Search is Always a Fire Drill: When was the last time you looked on your calendar and saw an appointment from the legal team that you will need to search your entire infrastructure for an email from 18 months ago? Rarely if ever, that’s because searches and e-discovery are typically fire drills. Drop what you’re doing, find something and they needed it yesterday. Although the cost of storage is cheap and companies can store a lot of information and barely impact the budget it begins to add up and what was once a asset quickly becomes a liability. Symantec estimates the cost of to review a document for e-discovery is approximately 1500 - 3000 times the cost to store that document. Taking into account the processing fees (~$1200/GB), Hosting fees (~$1400/GB), Legal review (~$200/hr) and the productivity time taken to find the document in the first place. This only gets worse when organizations dump everything into their backup system. If those tapes are offsite they’ll need to find the specific tape, pay to have it pulled and shipped back onsite, pay to put it back, etc. All these different processes lead to an inefficient discovery process which wastes time, money and gives the opponent competitive edge. SourcesGartner 28th Annual Data Center Conference December 1-4, 2009; Sheila ChildsStorage Strategy: Why You Need One, and What it Should Include; Gartner Publication Date 29 October 2009; ValdizFilksSymantec 2010 Information Management Health Check Customer SurveySymantec 2010 Information Management Health CheckCooperation Is Key for Managing E-Discovery in 2010; Gartner 11 March 2010 ; Deb Logan
  2. IT Must Evolve to Meet New DemandsWe see a significant change in the role of IT in enterprises from system-centric to information-centric.To date, IT has brought significant productivity benefits to organizations by automating key business processes and driving efficiencies. This landscape was characterized by various business applications working centralized databases, supported by physical infrastructure. A lot of what IT departments did was focused on managing systems, including PCs, servers, storage, and networks.Today, the role of IT is starting look very different. Organizations are looking for the next level of productivity and business agility by improving collaboration and knowledge sharing. They are looking to better connect their employees, teams, business partners and customers to each other. This is changing the nature of data into highly distributed, largely unstructured information. The infrastructure is moving virtual within the company or turning into an external cloud. Instead of focusing of physical systems management, the role of IT is transforming into more information-centric tasks with governance, policies, risks, and controls.This evolution is also apparent in how applications are being designed. Historically, the entire ‘stack’ from database, OS, server, storage were defined per application. Today applications are being written to run on virtually any platform and by design will be agile to move from one system to another based on events (performance, availability, workload, etc).
  3. Symantec believes that the time for better information management is now: without it, storage costs spiral, information becomes harder to find, risks of legal action and privacy breaches escalate and the return on virtualization is diminished.There are four actions every organization should take to eliminate information islands and effectively and efficiently manage information:Protect Completely by backing up, whether it is a physical or a virtual environment; archiving for the long term; and stopping data lossDeduplicate Everywhere.Deduplicate as close to information sources as possible is how organizations derive the biggest benefit.Delete Confidently, use backup and archiving technology to establish policies and delete automatically to reduce storage and the risk from keeping everything, foreverDiscover Efficiently, to deliver a compliance- and litigation-ready information infrastructure. Auditors, investigators and lawyers will be able to find information without disrupting the IT environment.---------***-------Despite these complications, the business benefits of keeping just what you need are substantial. First of all, you can keep just the data you need to restore systems back to a recent state – without having to hold them any longer than a month or two. In other words, you keep them *just* for DR, and don’t pretend it’s a usable long term repository – no tape mountain.Secondly, information proliferates. There have been more than 10 drafts of this presentation, and those have been attached to multiple emails, uploaded to sharepoint and stored on file shares – as well as back ups of each of those systems. Eliminating redundant copies and deleting the older versions saves far more storage than you might initially imagine – so deletion is not just about lower primary storage costs. It’s repeated across all of your systems.Storage costs, however, pale in comparison to legal and regulatory costs because it’s 1500 times more expensive to review a document than to store it. e-discovery review means looking a thousands – sometimes millions – of documents that might be potentially relevant. This is a skilled task – which means the cost per hour is very high. The longer you keep things, the worse this gets – there’s no need to review information that has been automatically deleted according to a standard information management policy.
  4. Flexible Policy-based Archiving Software Resource Management:How can the organization keep these systems running and costs under control? With sprawling message stores, longer backup windows, annoying end-user quotas, and out-of-control "rogue" archives (such as Microsoft PST files), IT is struggling to control the growth of unstructures information.Retention management:How can the organization enforce a consistent retention policy on email and unstructured information? At the same time, IT organizations are being mandated by legal and compliance groups to implement enterprise wide policies on retention for corporate information found in email, files and other sources, rather than leaving it in end users' hands.Discovery management:How can the organization quickly retrieve the content it needs within its mass of unstructured information? As email has increasingly become the "smoking gun" in litigation and regulatory investigations, most large organizations now know that if the email message is out there, they may be asked to find it...or worse yet, find a document amongst all other unstructured information.Leading Archiving SolutionProven technology– Enterprise vault has been in the market for 10+ years and has more customers around the world than any other product on the market.Intelligent – EV’s policy engine uses classification and other variables to determine how long information should be kept in the archive. Unlike some systems that are all or nothing. Open: EV’s API’s has allowed for a robust partner eco-system that develops new ways to leverage the archive and allows customers to extend the functionality of the archive to increase the return on their investment. Efficient: EV has been designed to have a very small archiving footprint. For example, the index size at it’s most data intensive setting is only 12% of the original document. Compare that to other products who suggest 4:1 storage ratio’s and have index sizes well over 100% of the original document. Where is the storage optimization benefit?Proven Technology 15,000+ customers and 31 MM+ users archivedProduction customers archiving 5 MM+ messages/dayDeployments archiving 300K+ users
  5. DCS is initially only available for Microsoft Exchange email.
  6. Why this acquisition makes sense… what does the combined solution provide…You have business needs across the enterprise to manage, protect and utilize your information in the most efficient manner possible. If you are unfamiliar with the Electronic Discovery Reference Model, it acts as a guide for the practices necessary to manage enterprise data efficiently and the processes necessary to provide/protect the business value associated with that data, as it moves throughout the e-discovery workflow. Symantec is now offering the most comprehensive, easily deployed and practical offering for enterprise information governance and legal risk management. The business has an interest in information proportional to its value to the enterprise, (i.e. what information either drives revenue/value, or what information is of value (relevant docs in a legal case)) This requires significant resources and investment to manage the lifecycle of valuable information in the most cost efficient manner, and when necessary, manage the e-discovery processes associated with that information. [This is a point where you can discuss what types of technology are currently being used, how does the prospect store, archive, access data, do they use technology to automate retention/disposition, how do they manage the e-discovery process]By merging these two solutions, Symantec now enables departments across the organization (HR, IT, Info Sec, Legal, RIM) to automate the entire information management lifecycle, and streamline their e-discovery workflows. This acquisition enables a seamless transition from Symantec’s information management systems & processes to Clearwell’s advanced e-discovery platform, and subsequently provides the fastest (and most proven) ROI in the market.
  7. Enterprise Vault, Enterprise Vault.cloud and Clearwell reduce risk across the information governance continuum. This is generally accomplished by improving the defensibility and repeatability of your information management and eDiscovery processes.With Enterprise Vault and Clearwell, you can maintain a comprehensive repository of essential data sources. This includes email, SharePoint, databases, file servers, endpoints, IM and social media. You may also collect information from unstructured data sources such as laptops and desktops. Having a central data repository eliminates the guesswork often associated with information management. It also reduces exposure by automatically expiring data pursuant to your established retention policies. Coupling this repository with the Clearwell eDiscovery platform allows you to put documents on legal hold and provide a chain of custody for each document across the entire process, from archiving and preservation through review and production.A reliable chain of custody – together with the Clearwell transparent and real-time reporting of all user actions, case status, and exceptions – allows you to demonstrate the reasonableness of your eDiscovery process when required for regulatory actions and litigation. You can show a consistent and repeatable eDiscovery workflow for all legal, regulatory, and investigative matters.
  8. Streamline the end to end information management and eDiscovery lifecycle to meet court and regulatory deadlinesCentrally managed and indexed repository to easily search and access documents pertinent to eDiscoveryPerform rapid targeted collection across all essential data sourcesConduct collection, processing, analysis, review and production in one application, eliminating time consuming movement of data between toolsSupports the iterative eDiscovery workflows required by real-world casesAccelerate early case assessment from weeks to hours using advanced search and analytics to quickly understand case facts