SlideShare una empresa de Scribd logo
1 de 45
Descargar para leer sin conexión
Understanding Your Options for
Storing Archive Data to Meet
Compliance Challenges

Tony Pearson, IBM
sBR31




#IBMEDGE
This session will cover the IBM
      software and hardware solutions that
      your organization can use to store
      archive data, including features like
      immutability, Write-Once-Read-Many
      (WORM) technology and Non-Erasable,
      Non-Rewriteable (NENR) enforcement.
      The discussion will include high-level
      concepts like chronological and
      event-based retention, litigation hold
      and release, as well as an overview of
      the products and solutions from IBM
      that you can deploy today.




#IBMEDGE
Sessions -- Tony Pearson
   • Monday
           – 1:00pm   Storing Archive Data for Compliance Challenges
           – 4:15pm   IBM Watson: What it Means for Society
   • Tuesday
           – 4:15pm   Using Social Media: Birds of a Feather (BOF)
   • Wednesday
           – 9:00am   Data Footprint Reduction: IBM Storage options
           – 2:30pm   IBM's Storage Strategy in the Smarter Computing era
           – 4:15pm   IBM SONAS and the Cloud Storage Taxonomy
   • Thursday
           – 9:00am IBM Watson: What it Means for Society
           – 10:30am Tivoli Storage Productivity Center Overview
           – 5:30pm IBM Edge “Free for All” hosted by Scott Drummond




#IBMEDGE
Disclaimers
IBM customers are responsible for ensuring their own compliance
with legal requirements. It is the customer's sole responsibility to
obtain advice of competent legal counsel as to the identification and
interpretation of any relevant laws and regulatory requirements that
may affect the customer's business and any actions the customer
may need to take to comply with such laws.
     IBM does not provide legal advice or represent or warrant that its services or
     products will ensure that the customer is in compliance with any law.
The information contained in this documentation is provided for
informational purposes only. While efforts were made to verify the
completeness and accuracy of the information provided, it is provided
“as is” without warranty of any kind, express or implied. IBM shall not
be responsible for any damages arising out of the use of, or otherwise
related to, this documentation or any other documentation. Nothing
contained in this documentation is intended to, nor shall have the
effect of, creating any warranties or representations from IBM (or its
suppliers or licensors), or altering the terms and conditions of the
applicable license agreement governing the use of IBM software.



#IBMEDGE
Digital Information is Driving
Exponential Growth in Data
                                                   Risk, Stability
                                         Finance   PTBs of data
                                                   Deeper analysis
                                                   Nightly to hourly



           Consumer Insight                                                    Churn
           100Ms documents                                                     100K records/sec
Retail     Millions of Influencers
                                                                       Telco   9B/day
           Daily re-analysis                                                   10 ms/decision




                                                                       Drug, Treatment
                      Cyber Security
                                                                       Millions of SNPs
                      600,000 docs/sec                          Pharma 1000’s patients
Government            50B/day
                                                                       From weeks to days
                      1-2 ms/decision


                  …industries need to harness this data to
                deliver better and faster business insights
#IBMEDGE
Clients are Struggling to Keep Up
                                              Top Issues for Storage Managers



    Managing Storage Growth

 Proper Capacity Forecasting
      and Storage Reporting

                      Managing Costs

           Backup Administration
               and Management

            Managing Complexity
                                                   0%                               20%                  40%   60%



Source: TheInfoPro Storage Study (Q4 2009), n=186. *Note that due to multiple responses per interview,
total exceeds100%. This is a partial list of responses received, showing only the top 5 issues.




#IBMEDGE
The Information Challenge




#IBMEDGE
Archiving: Client Motivations



  Compliance/Risk                                      Systems Efficiency
  •   Manage to regulations (SOX, HIPPA etc).          •   Reduce high cost storage.
  •   Penalties and brand damage.                      •   Reduce backup & recovery resources.
  •   Exposure by keeping data too long.               •   Improve managed TB/Admin. ratio.
  •   Litigation support.                              •   Improve server performance/longevity.

  Document/Process Automation                          User Productivity
  • Go paperless in a process.                         • Improve application performance and
  • Integrate digitization to change/improve
    business processes.
                                                   &     availability.
                                                       • Reduce time to search for and access
  • Store all documents/images online to improve         historical/enterprise data.
    access/sharing.

  Information Innovation
  • Mine information for unique value.
  • Enhance business for competitive advantage
    or organizational improvement.



#IBMEDGE
What We are Finding in Customer Environments
  Current Storage Pyramid              Most companies, due to overprovisioning and poor visibility
                                       into their storage environment, have anywhere from 30% to
            0-1%    Tier 0             40% disk storage utilization

        40-60%         Tier 1          They have:
                                         – Overly complex storage management environments
           20-40%        Tier 2
                                         – Over provisioned storage
                                         – Limited transparency of the data value
                             Tier 3
           10-20%                        – Limited financial transparency
                                         – Limited use of tools & operational execution to reduce the amount of
                                           wasted data

                                       Over reliance on Tier 1 storage
                                       Rarely revisit tiering structure for applications & data once
                                       deployed

                                       Excessive replication which also has implications on archive,
                                       backup/recovery and disaster recovery

                                       Hold excessive data on-line which negatively impacts
                                       application performance & availability



#IBMEDGE
Unnecessary Information Eclipses
Your Necessary Information
     Unnecessary                                         Necessary
      Information                                       Information
      Over-Retained                                        Valued
        Irrelevant                                        High Risk
       Duplicated                                         Compliant



      How much of your information is over-retained, irrelevant or duplicated?
                     40% ... 50% ... 60% … How do you know?
    Why would you want to archive any information that is not necessary to keep?

#IBMEDGE
Archive Requires a
Smarter Strategy


     17%                                                                         22%                                                                     40%
      Amount of IT                                                         Companies that can                                                            Of the planet’s 
      budget spent on                                                      defensibly dispose                                                            data should be 
      storage1                                                             today3                                                                        archived4




    44x                                                                         98%
                                                                           Companies that cite 
                                                                                                                                                         The vast
                                                                                                                                                         majority
      Projected                                                            defensible disposal as                                                        of companies still 
      information growth,                                                  key result of                                                                 use backups as 
      2009‐20202                                                           governance programs3                                                          archives5

Sources: 1. Information Week Survey, December 2009. 2. IDC Digital Universe Study, May 2010. 3. CGOC Benchmark Report on Information Governance,
October 2010. 4 Source: Jon Toigo, CEO and Managing Principal, Toigo Partners International. 5. “Controlling Storage Cost Amid High Growth”, Forrester
Research, Inc., February 2010



#IBMEDGE
Definition of Backup vs. Archiving
 • Backup is for recovery from hardware failure
   and/or recent data corruption
 • Archive is for space management and long
   term retention
       – Archiving is an intelligent process for managing inactive
         or infrequently accessed data, that still has value, while
         providing the ability to preserve, search and retrieve the
         information during a specified retention period.




#IBMEDGE
Shifting how Archive is Viewed
•   Keeping Too Much          • Keep Needed Data
•   Disorganized                Only
                                 – Has some
•   Difficult to Find Items
                                   organizational
•   Slow to Retrieve               value/purpose
•   Little Value Provided     • Data is Indexed
                                 – Easy to Query/Find
                                 – Retrieval
                              • Low Cost to Maintain
                                for Long-term
                                 – Secured data.
                              • New Value Generation
                                 – Innovation / Analysis
The two faces of Archiving

 Space Management                           Enterprise Content Management
                                                   IBM Content Manager, CM OnDemand, IBM FileNet Image
 move old, inactive files                           Manager, P8 Content Manager, IBM Content Collector
 to less expensive                                  Enterprise Bundle, Hyland OnBase, EMC Documentum
 storage, resulting in
 reduced backup
                                 e-mail
 windows and reduced
                                         IBM Content Collector for Email, IBM CommonStore for
 storage costs                            Lotus Domino, IBM FileNet Email Manager, Symantec
                                          Enterprise Vault, Zantaz, AXS-One, EMC MailXtender


                  Databases
                         IBM Optim, IBM CommonStore for SAP,                          Data Retention
                          IBM FileNet Application Connector for SAP, Solix, EMC        Protect your data for the
                          DatabaseXtender
                                                                                       long term with non-
                                                                                       erasable, non-rewriteable
        File Systems                                                                   storage solutions and
             IBM Content Collector for File Systems, Tivoli Storage                   demonstrate compliance
              Manager (TSM) HSM for Windows and Space Management for
              Unix and Linux, TSM Archive Client, SSAM Client,                         to regulations
              Symantec/KVS Enterprise Vault, EMC DiskXtender


14
 #IBMEDGE
Addressing IT Motivations

           Space Management
           move old, inactive files
           to less expensive
           storage, resulting in      Systems Efficiency
           reduced backup             •   Reduce high cost storage.
           windows and reduced        •   Reduce backup & recovery resources.
                                      •   Improve managed TB/Admin ratio.
           storage costs              •   Improve server performance/longevity.


                                      User Productivity
                                      • Improve application performance and
                                        availability.
                                      • Reduce time to search for and access
                                        historical/enterprise data.




#IBMEDGE
Space Management

                          Policy-Driven
                   Information Lifecycle
                     Management (ILM)

                     Older, infrequently
                               accessed
                             information

                            Long-Term
                             Retention
                               Archive




#IBMEDGE
Use policy-based automation to
move data across storage tiers to
reduce costs                A systematic
                                                                                                                                            approach to
                                     Create/     Collaborate      Manage          Archive          Retire
                                     capture                                                                                                data lifecycle:
Service-level agreements (SLAs)




                                    Set policies and automate the movement of data to the optimum
                                                                                                                                            Online access with




                                                                                                            Performance and Functionality
                                                         environment over time

                                       SSD                                                                                                   assured authenticity
                                                                                                                                            Metadata-policy




                                                                                                                   Requirements
                                                                                                                                             management
                                                 Capacity
                                                  Online
                                                                                                                                            Higher service levels
                                                   NAS
                                                                                                                                            Streamline
                                                                                                                                             management and
                                  Performance                                                                                                lower total cost of
                                    Online                                                                                                   ownership (TCO)
                                      SAN                               Online
                                                                       Archival             Offline Tape
                                                                                                              Time
                                  Days       Months            Years                Decades
                                       Data: rate of change

  #IBMEDGE
Tape’s substantial cost advantage over
disk is forecast to continue through 2015
                  $/GB for Storage Media
                                             DRAM
    1.E+05
                                             NAND
                                             HDD 2002 estimated CAGR
                                             Tape                         Tape’s cost advantage over
    1.E+04                                   Credit Suisse 2008 Study
                                             Grochowski 2003
                                                                          disk also contributes to a
                                             IDC 08                       signification TCO advantage
                                             HDD History
    1.E+03
                                                                                     TCO Comparison
                                                                            16
    1.E+02
                                                                                              Disk   Tape
                                                                            14
 $/GByte




                                                                            12
    1.E+01
                                                                            10
                                                                            8
    1.E+00                                                                  6
                                                                            4

      1.E-01
                                                                            2
                                                                            0
                                                                                 10 yr Archive 5 yr Backup
      1.E-02                Tape                                                 (Clipper Gp) (ESG Study)


      1.E-03
           1990      1995    2000          2005        2010        2015
                                    Year



 #IBMEDGE
Blended Solutions: Reducing Costs and
           Increasing Flexibility
                                                                   • Lower costs primarily from:
Utilizing Tape Drastically Reduces TCO                                – Lower cost of media
10 year TCO example. Assumes 250TB storage, 25% growth/yr
                                                                      – Minimal need for Power &
                                                                        Cooling
            $7
                  $6,365,950                                       • Increased flexibility from ability
                                            Floor space
                                            Power & Cooling          to:
                                            Maintenance
                                                                      – Add capacity by simply adding
                                            Prod + DR Carts
                                                                        tape cartridges
Millions




                                            Hardware
           $3.5                                                       – Expand tape libraries over and
                                                                        around existing equipment in the
                                                    $2,255,346
                                                                        data center

                                    $946,405                       • Reliability: lower bit-error-
                                                                     rates, read verifications after
            $0                                                       writes.
                  SATA Disk            Tape        Blended Disk
                                                     and Tape
                  * TCO estimates based on IBM internal studies.



    #IBMEDGE
Automate Data Placement and
 Migration
 IBM Active Cloud Engine™

  File
  creation
                                    30 days
                                                         Optional TSM/HSM
                   Initial                               Server & Virtual or
                                                         Physical Tape Pool
                placement
                    SAS                       180 days

                         NL-SAS




              IBM SONAS and
           Storwize V7000 Unified




#IBMEDGE
Addressing Business Needs



  Compliance/Risk
  •   Manage to regulations (SOX, HIPPA etc).
  •   Penalties and brand damage.
  •   Exposure by keeping data too long.
  •   Litigation support.

  Document/Process Automation
  • Go paperless in a process.
  • Integrate digitization to change/improve
                                                   Data Retention
    business processes.                            Protect your data for the
  • Store all documents/images online to improve   long term with non-
    access/sharing.
                                                   erasable, non-rewriteable
                                                   storage solutions and
  Information Innovation                           demonstrate compliance
  • Mine information for unique value.
  • Enhance business for competitive advantage     to regulations
    or organizational improvement.



#IBMEDGE
Non-Erasable, Non-Rewriteable
(NENR) storage
                                WORM
 Optical Platters                      Tape Cartridges                        Disk Drives
       The original                           IBM LTO and                            Disk media is
       write-once,                            TS1100 drives                          not WORM, but
       read-many                              support WORM                           we can add
       (WORM) media,                          media                                  “software
       including DVD                                                                 enforcement”
       and CD-ROM                                                                    against
                                                                                     tampering
                                                       NENR

 From U.S. SEC 17a-4
 If employing any electronic storage media other than optical disk technology (including CD-ROM), the member, broker,
      or dealer must notify its designated examining authority at least 90 days prior to employing such storage media.

 The electronic storage media must:

      Preserve the records exclusively in a non-erasable, non-rewriteable, format;




#IBMEDGE
Comply with regulatory and security
 Requirements
           Why? So you can confidently protect your
              strategic information assets
            1. Use non-erasable, Non-rewriteable storage
               for data retention and regulatory compliance
               requirements
                •   WORM tape media (LTO and 3592)
                •   N series with SnapLock™ Compliance and
                    SnapLock™
            2. Complementing Software
                   System Storage Archive Manager
                   IBM Optim, Content Collectors and eDiscovery tools



#IBMEDGE
WORM Tape
   • 3592 cartridge media
           – 500 GB native capacity – Economy WORM Cartridge
              • Faster average retrieval time, lower cartridge price
           – 4 TB native capacity – Advanced WORM Cartridge
   • LTO cartridge media
           – LTO-3 400 GB native capacity WORM cartridge
           – LTO-4 800 GB native capacity WORM cartridge
           – LTO-5 1500 GB native capacity WORM cartridge
   • Benefits
           – Supports long term data retention applications
           – Helps comply with requirements for non-rewriteable, non-erasable
             media
           – Cost effective storage
           – Utilizes standard tape libraries and controllers




#IBMEDGE
IBM N series with SnapLock™
              • Non-erasable, non-rewritable magnetic
                disk storage
                 – Add-on software license
                 – Enabled at a volume level

              • Fine-grained management
                 – File-level retention policies
                 – Reclaim space with file expiration

              • Tamperproof ComplianceClock™
              • Open protocol interfaces
                 – Data access via CIFS and NFS
                 – Easy application integration without
                   closed, proprietary APIs

              • High performance—implemented on
                industry's fastest NAS platforms
              • SnapLock Compliance version
              • SnapLock Enterprise version

#IBMEDGE
Compliance Archive through Software
Enforcement
• System Storage Archive Manager (SSAM)
     – Is a special “hardened-for-archive” TSM server
     – Is an archive/retrieve only solution
           • Archive: copy data or file from client to preserve for later use
     – Facilitates compliance with regulatory requirements
     – Has special data retention protections
     – Accepts data from TSM client API or the SSAM client
           • SSAM client = Archive only version of TSM B/A client


• SSAM performs storage management
     – Manages data placement based on policies
     – Manages migration of data within storage hierarchy



#IBMEDGE
IBM System Storage Archive
Manager Overview
• SSAM is licensed by data capacity rather than number of
  processors
   – Primary storage pools only

• TSM support for Non-Erasable, Non-Rewriteable (NENR)
  media, including
   – SnapLock™ for IBM N series and NetApp storage
     devices
   – EMC Centera
   – IBM 3592 WORM tape
   – LTO WORM tape


#IBMEDGE
SSAM Data Retention Protection
• SSAM includes the following capabilities
   –Archive object protection
       • Archive object cannot be deleted until retention period is expired
   –Chronological (time) Based retention policies
   –Event Based retention policies
       • Allows starting retention period of objects based on an event
   –Deletion Hold / Release
       • Hold overrides retention time countdown
       • Hold & release controlled by API or SSAM/BA client



• Additional Data Retention Protection:
   –Decreasing retention time of archived objects is not possible
   –Deleting retention policies (management classes) is not possible
   –Administrator cannot delete nodes or objects


#IBMEDGE
Chronological and Event Based
Retention
  Chronological Based
                        Minimum
                      Fixed Period
                                                  X
      Day 0                                       Dispose after fixed period
                                                  from creation date

  Event Based with Fixed Protection Periods
             Minimum            Event

                                                           X
              Fixed Period             Fixed Period


      Day 0                                                Dispose after fixed period
                                                           from event date

  Event Based with no Fixed Protection Period
                               Event

                                     X
      Day 0                          Dispose after event


#IBMEDGE
Deletion Hold and Release API
Function
   Event-Based Retention Policy

                           API ‘Hold’
                            issued
                                                                 API ‘Release’
                                                                    issued       X
                  RETMIN                                RETVER


       Day 0                              API ‘Event’                       Automated
                                           issued                           Expiration
    Data stored
     in Archive                                                            Data deleted in
                                                                              Archive


  Chronological Retention Policy
                                                                 API ‘Release’
                                                                    issued       X
                    RETVER


       Day 0                 API ‘Hold’                                     Automated
                              issued                                        Expiration
    Data stored
     in Archive                                                            Data deleted in
                                                                              Archive


#IBMEDGE
TSM/SSAM Transparent encryption
  • TSM provides simple key management
      – Available for TSM API applications; e.g. DP Exchange, DP SQL,…
      – TSM API Client generates a random encryption key password
           • Per data object selected by “include. encrypt” and “exclude. encrypt” criteria
      – TSM API Client passes encrypted data object encryption key password to TSM Server
        across “the wire”
           • TSM Client-Server “Session Key” used to encrypt/decrypt
           • AES128 encryption used if BOTH Client and Server support it


  • HW Tape Drive Encryption ( IBM TS1120-TS1140, LTO4-LTO5)
      – Device Class specification
      – One encryption key for each tape volume/cartridge
      – TSM Server generates, encrypts, and stores the encryption key in the TSM database along with
        other tape volume metadata
      – TSM supports HW provided encryption modes, Application, System and Library
      – TSM manages key in Application mode, other modes transparent to TSM


  • Backup-Archive client simple key management support (TSM 5.5)




#IBMEDGE
IBM Optim™ Solution Focus
              • Optim Data Growth Solution
                (Archiving)
                –   Improve performance
                –   Control data growth, save storage
                –   Support retention compliance
                –   Enable application retirement
                –   Streamline upgrades
              • Optim Test Data Management
                Solution
                – Create targeted, right sized test environments
                – Improve application quality
                – Speed iterative testing processes
              • Optim Data Privacy Solution
                – Mask confidential data
                – Comply with privacy policies



#IBMEDGE
IBM Optim Archive Concepts
           Information                     Archiving and Storage                            Access Models

                                     Optim Archiving Architecture                       Legal Control
                                                                                        •   Legal Hold & Discovery
 Enterprise Structured                                                                  •   Archive Management
                                        Optim Services
  Content                                  •   Records / Retention
                                                                                        •   Policy based Data Purge
 • Heterogeneous R-DBMS                    •   Complete Business Object
 • Legacy Data Store                       •   Process Execution / Audit / Monitoring
 • Related file system documents
                                                                                        Operational Control
                                           •   Provenance                               •   Tiered Storage
                                           •   Multi-tier Secure Access                 •   SLA
                                           •   Meta Data Capture and Retention          •   Process Monitoring
                                           •   Data Lifecycle Management                •   Search
                                        Retention Policy Enforcement                    •   Federated DBMS Security
                                        Storage Management
 Operational Processes
 • Archiving Process
 • Archive Catalog                             Immutable       Lifecycle                Analysis & Reporting
 • Embedded Controls & ILM                      Archives      Management                •   Search and Browsing
                                                                                        •   Business Intelligence



                                                                     Storage
                                           Virtual                Management
                                     Archive Collections           Integration


                                   Simplified, Prescriptive, Easy To Deploy



#IBMEDGE
Database Archiving Example
Before:                   After:           Current        Active          Online/Offline
                                            Data         Historical      Archive or Delete

                              0-2 yrs.                   3-4 yrs.       7+ yrs.
              Keep
           Everything
            Forever
                                                                        Archive Files
                                              Archive                   Compressed
                                                            Archive
                             Production                                 File Directory
Service Levels Missed         Database                     Database
                                                                        SAN                       Delete
                                              Retrieve
  Big databases run
   slower

Operations Risk                             Open Access to Application Data
  SQL accidently bulk
   modify/delete

Multiplying IT costs
  Growth for QA, Test,
   Dev, Reporting,
                                         Report          XML          ODBC /        Application
   Backup/Recovery                       Writer                       JDBC



#IBMEDGE
IBM’s innovative Smart Archive
Make data easier to find while lowering total costs

                                                            Archive Policy Management



                            Collect                                      Migrate                   Delete
                           Unchanged                                     Infrequently              Expired
                              data                                      accessed data               data

                                                         Months to                      Years to
     Applications                                         Years                         Decades



   Automate data migration over time to reduce cost and risk
        – Up to 70% of data is duplicate and hasn’t been accessed in over 90 days
        – “A well deployed archiving strategy can save up to 60% in backup costs and
          reduce your backup times by up to 80%”

Sources: “Top 10 Strategies for Surviving Unconstrained Data Growth,”
Gartner Symposium Presentation, October 2010


#IBMEDGE
IBM Content Collector Overview
Modular and Extensible … Powered by Unique Task Routing

                                                         Policy &
    Source Connectors                               Task Routing                    Target Connectors
  MESSAGING / EMAIL                                       Engine               IBM NATIVE
   Microsoft Exchange / PST                                                    FileNet P8
   Lotus Domino / NSF                                                          CM8
   Lotus iNotes / LotusLive                                                    FileNet Image Services
   Instant Messaging (3rd Party)                                               Tivoli Storage Manager
                                                  Task Connectors
  FILE SYSTEMS
   Microsoft File System                INTERNAL TASKS                        CUSTOM / OTHER
   Desktops (via Tivoli CDP)             Copy / Move / Delete / Stub          Microsoft File System
   Data ONTAP (NetApp / IBM N series)    De-Duplication
   Other File Systems                    Rules-Based Classification

  OTHER                                  EXTERNAL TASKS
   Optim Archive Files                   Records Declaration
   SAP Archive Files *                   Advanced Context Classification
   Microsoft SharePoint                  Rendering (3rd Party)
   Lotus Quickr **
   IBM Content Integrator               CUSTOM TASKS
   CMIS                                  API Support / Partner Apps
   Tivoli Storage Manager                Meta Data Enhancement / Cleansing
                                                                               * SAP available as specialized
                                          Encryption                                connector
  CUSTOM SOURCES                          System Lookups                      ** Lotus Quickr connector available
   API Support with SDK                  ILOG Rules Engine (or 3rd Party)          today with ECM services
                                          Policy Management




#IBMEDGE
Content Collection for Email Reference
Architecture
                                Domino       Exchange


                          Primary Messaging
                          System Data Store
           All Users              Source
                                 Connector   Content
                                             aware
                                                         Search    Few
                Copy, Move,                                        Authorized
                Delete, Stub,
                                  Task                  Analyze
                                Connectors
                                                        Retrieve   Users
                Classify etc
                                                        Disclose
                                             Links to
                                                            Hold
                                  Target      access
                                 Connector
                                                                    Archive
                          Archive                                  Storage
                          Data Store                               Hierarchy



#IBMEDGE
Archive Solution Architecture
  Three critical components are required to build a solution:
  1. Business application
  2. Content management application
  3. Storage Container: Rewriteable or Non-erasable / non-rewriteable (NENR) technology

     Business
    Application                Content Management or                 Storage Container
      content                   Archiving application                Retention System


     DB2
   SQL Server



Reports, Documents,              IBM Content Manager
Records, Customer                 IBM CM OnDemand
Correspondence                IBM FileNet Image Services

                                 IBM Content Collector
                                   IBM CommonStore
                                      IBM FileNet
                                    (Email Manager IS)


#IBMEDGE
eDiscovery
                                                                   • In 2006, Federal Rules of Civil

               $3M                                                   Procedure (FRCP) made all electronic
                                                                     data legally admissible for discovery in
                                                                     U.S. civil courts
                Average cost to collect, 
                cull and review 
                information per legal 
                case1
                                                                   • Western Europe is catching up, such
                                                                     as the U.K. Bribery Act and Foreign
                                                                     Corrupt Practices Act (FCPA)

               70%                                                 • Large corporations, especially those
                                                                     that deal with serial litigation and
                Portion of information 
                unnecessarily retained2                              those in highly regulated industries,
                                                                     are having the most difficulty adopting
                                                                     eDiscovery

Sources: 1 Litigation Cost Survey of Major Companies, 2010 (from
Conference on Civil Ligitation, Duke Law School, May 2010). 2
Industry estimates



#IBMEDGE
Superior eDiscovery Software
   Efficient litigation improve defensibility and lower the cost of eDiscovery response with
    Increase agility, response enabled by proactive information management
    targeted tools to collect, hold, manage, assess and intelligently cull collected electronic
                           information regardless of originating source




       IBM eDiscovery Manager                           IBM eDiscovery Analyzer
       • Tool for authorized IT users to help respond   • Early case assessment and smart culling for legal
         to discovery requests from legal                 professionals and litigation support specialists
       • Create and manage cases; search, assign,       • Smart refinement of case collections to help
         hold, preview, and export collected content      dramatically reduce eDiscovery costs
       • Built on and integrated with ECM platform      • Advanced conceptual search and content
         with full auditability for chain-of-custody      analytics for rapid case insight



#IBMEDGE
IBM Archiving Solutions
 Value is delivered to you by:

  Providing offerings for all types of data (e-mail, database, unstructured).

  Leveraging policy-based data automation software for data movement,
   replication, retention and deletion.

  Lowering TCO by leveraging tiered storage and increasing storage efficiencies.
        Disk systems, Tape Systems, Blended disk and tape

  Delivering flexible Non-erasable, Non-rewritable (NENR) and encryption
   options for securing data.
        “If it is worth saving, it is worth protecting”.

  Integrating IBM hardware, software and services into proven solutions.
        Packaged and custom configurations for organizations of all sizes.




#IBMEDGE
Thank You!


    Session:                                 sBR31
    Presenter:                               Tony Pearson



#IBMEDGE
Intel, the Intel logo, Xeon and Xeon Inside are trademarks or registered
trademarks of Intel Corporation in the U.S. and /or other countries.
For More Information
                  Email:
                  tpearson@us.ibm.com

                  Twitter:
                  http://twitter.com/az99Øtony

                  Blog:
                  http://ibm.co/brAeZØ

                  Books:
                  http://www.lulu.com/spotlight/99Ø_tony

                  IBM Expert Network:
                  http://www.slideshare.net/az990tony




43
 #IBMEDGE
Don’t miss these valuable opportunities:

 Visit the Technical Edge      Solution Expo                          IBM Edge2012 Logo Store             Fill out your surveys!
 SmartSite for the most        IBM & Partner Exhibits, Theater        Visit the IBM Edge2012 Logo         We value your feedback –
 up-to-date conference         Presentations, Meet the Experts,       store, conveniently located in      Visit ibmtechu.com via web
 information!                  Receptions & Networking                the Bonnet Creek Conference         portal or mobile device to
                                                                      Center. Here you will find a        submit your session
 Simply log into               Monday        6:30 p.m. – 8:30 p.m.    selection of IBM logo items that    evaluations and receive an
 ibmtechu.com via web          Tuesday      11: 45 a.m. – 1:00 p.m.   range from apparel, pens,           entry to WIN prizes.
 portal or mobile device to    Tuesday       5:30 p.m. – 7:30 p.m.    pad folios and techie items –
 stay connected with the       Wednesday    11:45 a.m. – 1:00 p.m.    to toys for children.               The more evaluations
 Technical Edge                                                                                           submitted, the greater
 conference.                   Receptions                             Labs and Certification              chance of winning!
                               Monday     6:30 p.m. – 8:30 p.m.       Increase and validate your skills
 Build your own agenda,        Tuesday    5:30 p.m. – 7:30 p.m.       using the latest versions of IBM
 download presentations,                                              products:
 fill out your session
 surveys and check out our                                            Mon.     10:00 a.m. – 6:00 p.m.
 virtual e-literature stand.                                          Tues.     9:00 a.m. – 6:00 p.m.
                                                                      Wed.      9:00 a.m. – 6:00 p.m.
                                                                      Thur.     9:00 a.m. – 6:00 p.m.
                                                                      Fri.      7:00 a.m. – 12:00 p.m.




#IBMEDGE
Acknowledgements, disclaimers
and trademarks
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. IT
Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce. Intel, Intel logo, Intel
Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its
subsidiaries in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft, Windows, Windows NT, and
the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. ITIL is a registered trademark, and a registered community trademark of the Office
of Government Commerce, and is registered in the U.S. Patent and Trademark Office. UNIX is a registered trademark of The Open Group in the United States and other countries. Java
and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. Cell Broadband Engine is a trademark of Sony Computer Entertainment,
Inc. in the United States, other countries, or both and is used under license therefrom. Linear Tape-Open, LTO, the LTO Logo, Ultrium, and the Ultrium logo are trademarks of HP, IBM
Corp. and Quantum in the U.S. and other countries.

Other product and service names might be trademarks of IBM or other companies. Information is provided "AS IS" without warranty of any kind.

The customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and
performance characteristics may vary by customer.

Information concerning non-IBM products was obtained from a supplier of these products, published announcement material, or other publicly available sources and does not constitute an
endorsement of such products by IBM. Sources for non-IBM list prices and performance numbers are taken from publicly available information, including vendor announcements and
vendor worldwide homepages. IBM has not tested these products and cannot confirm the accuracy of performance, capability, or any other claims related to non-IBM products. Questions
on the capability of non-IBM products should be addressed to the supplier of those products.

All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.

Some information addresses anticipated future capabilities. Such information is not intended as a definitive statement of a commitment to specific levels of performance, function or delivery
schedules with respect to any future products. Such commitments are only made in IBM product announcements. The information is presented here to communicate IBM's current
investment and development activities as a good faith effort to help with our customers' future planning.

Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience
will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed.
Therefore, no assurance can be given that an individual user will achieve throughput or performance improvements equivalent to the ratios stated here.

Prices are suggested U.S. list prices and are subject to change without notice. Starting price may not include a hard drive, operating system or other features. Contact your IBM
representative or Business Partner for the most current pricing in your geography.

Photographs shown may be engineering prototypes. Changes may be incorporated in production models.

© IBM Corporation 2012. All rights reserved.
References in this document to IBM products or services do not imply that IBM intends to make them available in every country.

Trademarks of International Business Machines Corporation in the United States, other countries, or both can be found on the
World Wide Web at http://www.ibm.com/legal/copytrade.shtml.



 #IBMEDGE

Más contenido relacionado

La actualidad más candente

Information Storage and Management notes ssmeena
Information Storage and Management notes ssmeena Information Storage and Management notes ssmeena
Information Storage and Management notes ssmeena ssmeena7
 
Big Data Analytics with Spark
Big Data Analytics with SparkBig Data Analytics with Spark
Big Data Analytics with SparkMohammed Guller
 
Avaali Solutions - Sap archiving and document access by open text
Avaali Solutions - Sap archiving and document access by open textAvaali Solutions - Sap archiving and document access by open text
Avaali Solutions - Sap archiving and document access by open textAvaali
 
Introduction To Database Management System
Introduction To Database Management SystemIntroduction To Database Management System
Introduction To Database Management Systemcpjcollege
 
SAP HANA SPS08 Application Lifecycle Management
SAP HANA SPS08 Application Lifecycle ManagementSAP HANA SPS08 Application Lifecycle Management
SAP HANA SPS08 Application Lifecycle Management SAP Technology
 
Database management of blood bank
Database management of blood bank Database management of blood bank
Database management of blood bank SANDEEPKUMARSINGH97
 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management SystemAAKANKSHA JAIN
 
04 data flow architecture
04 data flow architecture 04 data flow architecture
04 data flow architecture Jadavsejal
 
Chapter 2 database environment
Chapter 2 database environmentChapter 2 database environment
Chapter 2 database environment>. <
 
SAP Technical Consultant CV
SAP Technical Consultant CVSAP Technical Consultant CV
SAP Technical Consultant CVBhavesh Panchal
 
Introduction to distributed database
Introduction to distributed databaseIntroduction to distributed database
Introduction to distributed databaseSonia Panesar
 
Data warehouse
Data warehouseData warehouse
Data warehouseRajThakuri
 
Distributed dbms architectures
Distributed dbms architecturesDistributed dbms architectures
Distributed dbms architecturesPooja Dixit
 
Sizing sap s 4 hana using the quick sizer tool
Sizing sap s 4 hana using the quick sizer toolSizing sap s 4 hana using the quick sizer tool
Sizing sap s 4 hana using the quick sizer toolJaleel Ahmed Gulammohiddin
 

La actualidad más candente (20)

Information Storage and Management notes ssmeena
Information Storage and Management notes ssmeena Information Storage and Management notes ssmeena
Information Storage and Management notes ssmeena
 
Big Data Analytics with Spark
Big Data Analytics with SparkBig Data Analytics with Spark
Big Data Analytics with Spark
 
Data Warehouse
Data Warehouse Data Warehouse
Data Warehouse
 
Avaali Solutions - Sap archiving and document access by open text
Avaali Solutions - Sap archiving and document access by open textAvaali Solutions - Sap archiving and document access by open text
Avaali Solutions - Sap archiving and document access by open text
 
SAP data archiving
SAP data archivingSAP data archiving
SAP data archiving
 
Introduction To Database Management System
Introduction To Database Management SystemIntroduction To Database Management System
Introduction To Database Management System
 
SAP HANA SPS08 Application Lifecycle Management
SAP HANA SPS08 Application Lifecycle ManagementSAP HANA SPS08 Application Lifecycle Management
SAP HANA SPS08 Application Lifecycle Management
 
Ddbms1
Ddbms1Ddbms1
Ddbms1
 
Data warehouse
Data warehouseData warehouse
Data warehouse
 
Database management of blood bank
Database management of blood bank Database management of blood bank
Database management of blood bank
 
Data mining notes
Data mining notesData mining notes
Data mining notes
 
HDFS Design Principles
HDFS Design PrinciplesHDFS Design Principles
HDFS Design Principles
 
Distributed Database Management System
Distributed Database Management SystemDistributed Database Management System
Distributed Database Management System
 
04 data flow architecture
04 data flow architecture 04 data flow architecture
04 data flow architecture
 
Chapter 2 database environment
Chapter 2 database environmentChapter 2 database environment
Chapter 2 database environment
 
SAP Technical Consultant CV
SAP Technical Consultant CVSAP Technical Consultant CV
SAP Technical Consultant CV
 
Introduction to distributed database
Introduction to distributed databaseIntroduction to distributed database
Introduction to distributed database
 
Data warehouse
Data warehouseData warehouse
Data warehouse
 
Distributed dbms architectures
Distributed dbms architecturesDistributed dbms architectures
Distributed dbms architectures
 
Sizing sap s 4 hana using the quick sizer tool
Sizing sap s 4 hana using the quick sizer toolSizing sap s 4 hana using the quick sizer tool
Sizing sap s 4 hana using the quick sizer tool
 

Similar a Storing Archive Data to meet Compliance Challenges

Future of cloud up presentation m_dawson
Future of cloud up presentation m_dawsonFuture of cloud up presentation m_dawson
Future of cloud up presentation m_dawsonKhazret Sapenov
 
Estrategia Information lifecycle Management
Estrategia Information lifecycle ManagementEstrategia Information lifecycle Management
Estrategia Information lifecycle ManagementJaime Contreras
 
OpTier McKinsey Big Data Overview
OpTier McKinsey Big Data OverviewOpTier McKinsey Big Data Overview
OpTier McKinsey Big Data Overviewnickychu
 
McKinsey Big Data Overview
McKinsey Big Data OverviewMcKinsey Big Data Overview
McKinsey Big Data Overviewoptier
 
McKinsey Big Data Overview
McKinsey Big Data OverviewMcKinsey Big Data Overview
McKinsey Big Data Overviewoptier
 
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...Proact Netherlands B.V.
 
Mdawson product strategy preso geek girls 12 7-12 sanitized
Mdawson product strategy preso geek girls 12 7-12 sanitizedMdawson product strategy preso geek girls 12 7-12 sanitized
Mdawson product strategy preso geek girls 12 7-12 sanitizedmtlgirlgeeks
 
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)Mark Heid
 
Why You Need to Govern Big Data
Why You Need to Govern Big DataWhy You Need to Govern Big Data
Why You Need to Govern Big DataIBM Analytics
 
Cloud storage infographic
Cloud storage infographicCloud storage infographic
Cloud storage infographicLeah Shergold
 
Do More With Less with DB2 for z/OS
Do More With Less with DB2 for z/OSDo More With Less with DB2 for z/OS
Do More With Less with DB2 for z/OSCuneyt Goksu
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...Agora Group
 
Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009Collabor8now Ltd
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planningAureusIT
 
Big data and the data quality imperative
Big data and the data quality imperativeBig data and the data quality imperative
Big data and the data quality imperativeTrillium Software
 
New Information Certification
New Information CertificationNew Information Certification
New Information CertificationAtle Skjekkeland
 
Embedded Analytics: The Next Mega-Wave of Innovation
Embedded Analytics: The Next Mega-Wave of InnovationEmbedded Analytics: The Next Mega-Wave of Innovation
Embedded Analytics: The Next Mega-Wave of InnovationInside Analysis
 
There are 250 Database products, are you running the right one?
There are 250 Database products, are you running the right one?There are 250 Database products, are you running the right one?
There are 250 Database products, are you running the right one?Aerospike, Inc.
 

Similar a Storing Archive Data to meet Compliance Challenges (20)

Future of cloud up presentation m_dawson
Future of cloud up presentation m_dawsonFuture of cloud up presentation m_dawson
Future of cloud up presentation m_dawson
 
Estrategia Information lifecycle Management
Estrategia Information lifecycle ManagementEstrategia Information lifecycle Management
Estrategia Information lifecycle Management
 
OpTier McKinsey Big Data Overview
OpTier McKinsey Big Data OverviewOpTier McKinsey Big Data Overview
OpTier McKinsey Big Data Overview
 
McKinsey Big Data Overview
McKinsey Big Data OverviewMcKinsey Big Data Overview
McKinsey Big Data Overview
 
McKinsey Big Data Overview
McKinsey Big Data OverviewMcKinsey Big Data Overview
McKinsey Big Data Overview
 
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
PROACT SYNC 2013 - Breakout - CommVault IntelliSnap Recovery Manager de inzet...
 
Mdawson product strategy preso geek girls 12 7-12 sanitized
Mdawson product strategy preso geek girls 12 7-12 sanitizedMdawson product strategy preso geek girls 12 7-12 sanitized
Mdawson product strategy preso geek girls 12 7-12 sanitized
 
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
 
Why You Need to Govern Big Data
Why You Need to Govern Big DataWhy You Need to Govern Big Data
Why You Need to Govern Big Data
 
Cloud storage infographic
Cloud storage infographicCloud storage infographic
Cloud storage infographic
 
Do More With Less with DB2 for z/OS
Do More With Less with DB2 for z/OSDo More With Less with DB2 for z/OS
Do More With Less with DB2 for z/OS
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...
 
Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planning
 
Big data and the data quality imperative
Big data and the data quality imperativeBig data and the data quality imperative
Big data and the data quality imperative
 
New Information Certification
New Information CertificationNew Information Certification
New Information Certification
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Embedded Analytics: The Next Mega-Wave of Innovation
Embedded Analytics: The Next Mega-Wave of InnovationEmbedded Analytics: The Next Mega-Wave of Innovation
Embedded Analytics: The Next Mega-Wave of Innovation
 
There are 250 Database products, are you running the right one?
There are 250 Database products, are you running the right one?There are 250 Database products, are you running the right one?
There are 250 Database products, are you running the right one?
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 

Más de Tony Pearson

Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfTony Pearson
 
L203326 intro-maria db-techu2020-v9
L203326 intro-maria db-techu2020-v9L203326 intro-maria db-techu2020-v9
L203326 intro-maria db-techu2020-v9Tony Pearson
 
S200743 storage-announcements-ist2020-v2001a
S200743 storage-announcements-ist2020-v2001aS200743 storage-announcements-ist2020-v2001a
S200743 storage-announcements-ist2020-v2001aTony Pearson
 
S200516 copy-data-management-ist2020-v2001c
S200516 copy-data-management-ist2020-v2001cS200516 copy-data-management-ist2020-v2001c
S200516 copy-data-management-ist2020-v2001cTony Pearson
 
S200515 storage-insights-ist2020-v2001d
S200515 storage-insights-ist2020-v2001dS200515 storage-insights-ist2020-v2001d
S200515 storage-insights-ist2020-v2001dTony Pearson
 
F200612 deliver-message-ist2020-v2001c
F200612 deliver-message-ist2020-v2001cF200612 deliver-message-ist2020-v2001c
F200612 deliver-message-ist2020-v2001cTony Pearson
 
Z111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aZ111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aTony Pearson
 
G111614 top-trends-sydney2019-v1910a
G111614 top-trends-sydney2019-v1910aG111614 top-trends-sydney2019-v1910a
G111614 top-trends-sydney2019-v1910aTony Pearson
 
G111416 personal-brand-sydney-v1910b
G111416 personal-brand-sydney-v1910bG111416 personal-brand-sydney-v1910b
G111416 personal-brand-sydney-v1910bTony Pearson
 
Z109889 z4 r-storage-dfsms-vegas-v1910b
Z109889 z4 r-storage-dfsms-vegas-v1910bZ109889 z4 r-storage-dfsms-vegas-v1910b
Z109889 z4 r-storage-dfsms-vegas-v1910bTony Pearson
 
Z110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909cZ110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909cTony Pearson
 
Z109889 z4 r-storage-dfsms-jburg-v1909d
Z109889 z4 r-storage-dfsms-jburg-v1909dZ109889 z4 r-storage-dfsms-jburg-v1909d
Z109889 z4 r-storage-dfsms-jburg-v1909dTony Pearson
 
S111477 scale-in-cloud-jburg-v1909d
S111477 scale-in-cloud-jburg-v1909dS111477 scale-in-cloud-jburg-v1909d
S111477 scale-in-cloud-jburg-v1909dTony Pearson
 
S110646 storage-for-ai-jburg-v1909c
S110646 storage-for-ai-jburg-v1909cS110646 storage-for-ai-jburg-v1909c
S110646 storage-for-ai-jburg-v1909cTony Pearson
 
G108263 personal-brand-berlin-v1904a
G108263 personal-brand-berlin-v1904aG108263 personal-brand-berlin-v1904a
G108263 personal-brand-berlin-v1904aTony Pearson
 
S108283 svc-storwize-lagos-v1905d
S108283 svc-storwize-lagos-v1905dS108283 svc-storwize-lagos-v1905d
S108283 svc-storwize-lagos-v1905dTony Pearson
 
G108277 ds8000-resiliency-lagos-v1905c
G108277 ds8000-resiliency-lagos-v1905cG108277 ds8000-resiliency-lagos-v1905c
G108277 ds8000-resiliency-lagos-v1905cTony Pearson
 
G108276 public-speaking-lagos-v1905b
G108276 public-speaking-lagos-v1905bG108276 public-speaking-lagos-v1905b
G108276 public-speaking-lagos-v1905bTony Pearson
 
G108266 stack-the-deck-lagos-v1905c
G108266 stack-the-deck-lagos-v1905cG108266 stack-the-deck-lagos-v1905c
G108266 stack-the-deck-lagos-v1905cTony Pearson
 
G107984 personal-brand-atlanta-v1904a
G107984 personal-brand-atlanta-v1904aG107984 personal-brand-atlanta-v1904a
G107984 personal-brand-atlanta-v1904aTony Pearson
 

Más de Tony Pearson (20)

Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdf
 
L203326 intro-maria db-techu2020-v9
L203326 intro-maria db-techu2020-v9L203326 intro-maria db-techu2020-v9
L203326 intro-maria db-techu2020-v9
 
S200743 storage-announcements-ist2020-v2001a
S200743 storage-announcements-ist2020-v2001aS200743 storage-announcements-ist2020-v2001a
S200743 storage-announcements-ist2020-v2001a
 
S200516 copy-data-management-ist2020-v2001c
S200516 copy-data-management-ist2020-v2001cS200516 copy-data-management-ist2020-v2001c
S200516 copy-data-management-ist2020-v2001c
 
S200515 storage-insights-ist2020-v2001d
S200515 storage-insights-ist2020-v2001dS200515 storage-insights-ist2020-v2001d
S200515 storage-insights-ist2020-v2001d
 
F200612 deliver-message-ist2020-v2001c
F200612 deliver-message-ist2020-v2001cF200612 deliver-message-ist2020-v2001c
F200612 deliver-message-ist2020-v2001c
 
Z111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910aZ111806 strengthen-security-sydney-v1910a
Z111806 strengthen-security-sydney-v1910a
 
G111614 top-trends-sydney2019-v1910a
G111614 top-trends-sydney2019-v1910aG111614 top-trends-sydney2019-v1910a
G111614 top-trends-sydney2019-v1910a
 
G111416 personal-brand-sydney-v1910b
G111416 personal-brand-sydney-v1910bG111416 personal-brand-sydney-v1910b
G111416 personal-brand-sydney-v1910b
 
Z109889 z4 r-storage-dfsms-vegas-v1910b
Z109889 z4 r-storage-dfsms-vegas-v1910bZ109889 z4 r-storage-dfsms-vegas-v1910b
Z109889 z4 r-storage-dfsms-vegas-v1910b
 
Z110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909cZ110932 strengthen-security-jburg-v1909c
Z110932 strengthen-security-jburg-v1909c
 
Z109889 z4 r-storage-dfsms-jburg-v1909d
Z109889 z4 r-storage-dfsms-jburg-v1909dZ109889 z4 r-storage-dfsms-jburg-v1909d
Z109889 z4 r-storage-dfsms-jburg-v1909d
 
S111477 scale-in-cloud-jburg-v1909d
S111477 scale-in-cloud-jburg-v1909dS111477 scale-in-cloud-jburg-v1909d
S111477 scale-in-cloud-jburg-v1909d
 
S110646 storage-for-ai-jburg-v1909c
S110646 storage-for-ai-jburg-v1909cS110646 storage-for-ai-jburg-v1909c
S110646 storage-for-ai-jburg-v1909c
 
G108263 personal-brand-berlin-v1904a
G108263 personal-brand-berlin-v1904aG108263 personal-brand-berlin-v1904a
G108263 personal-brand-berlin-v1904a
 
S108283 svc-storwize-lagos-v1905d
S108283 svc-storwize-lagos-v1905dS108283 svc-storwize-lagos-v1905d
S108283 svc-storwize-lagos-v1905d
 
G108277 ds8000-resiliency-lagos-v1905c
G108277 ds8000-resiliency-lagos-v1905cG108277 ds8000-resiliency-lagos-v1905c
G108277 ds8000-resiliency-lagos-v1905c
 
G108276 public-speaking-lagos-v1905b
G108276 public-speaking-lagos-v1905bG108276 public-speaking-lagos-v1905b
G108276 public-speaking-lagos-v1905b
 
G108266 stack-the-deck-lagos-v1905c
G108266 stack-the-deck-lagos-v1905cG108266 stack-the-deck-lagos-v1905c
G108266 stack-the-deck-lagos-v1905c
 
G107984 personal-brand-atlanta-v1904a
G107984 personal-brand-atlanta-v1904aG107984 personal-brand-atlanta-v1904a
G107984 personal-brand-atlanta-v1904a
 

Último

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Storing Archive Data to meet Compliance Challenges

  • 1. Understanding Your Options for Storing Archive Data to Meet Compliance Challenges Tony Pearson, IBM sBR31 #IBMEDGE
  • 2. This session will cover the IBM software and hardware solutions that your organization can use to store archive data, including features like immutability, Write-Once-Read-Many (WORM) technology and Non-Erasable, Non-Rewriteable (NENR) enforcement. The discussion will include high-level concepts like chronological and event-based retention, litigation hold and release, as well as an overview of the products and solutions from IBM that you can deploy today. #IBMEDGE
  • 3. Sessions -- Tony Pearson • Monday – 1:00pm Storing Archive Data for Compliance Challenges – 4:15pm IBM Watson: What it Means for Society • Tuesday – 4:15pm Using Social Media: Birds of a Feather (BOF) • Wednesday – 9:00am Data Footprint Reduction: IBM Storage options – 2:30pm IBM's Storage Strategy in the Smarter Computing era – 4:15pm IBM SONAS and the Cloud Storage Taxonomy • Thursday – 9:00am IBM Watson: What it Means for Society – 10:30am Tivoli Storage Productivity Center Overview – 5:30pm IBM Edge “Free for All” hosted by Scott Drummond #IBMEDGE
  • 4. Disclaimers IBM customers are responsible for ensuring their own compliance with legal requirements. It is the customer's sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer's business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law. The information contained in this documentation is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information provided, it is provided “as is” without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this documentation or any other documentation. Nothing contained in this documentation is intended to, nor shall have the effect of, creating any warranties or representations from IBM (or its suppliers or licensors), or altering the terms and conditions of the applicable license agreement governing the use of IBM software. #IBMEDGE
  • 5. Digital Information is Driving Exponential Growth in Data Risk, Stability Finance PTBs of data Deeper analysis Nightly to hourly Consumer Insight Churn 100Ms documents 100K records/sec Retail Millions of Influencers Telco 9B/day Daily re-analysis 10 ms/decision Drug, Treatment Cyber Security Millions of SNPs 600,000 docs/sec Pharma 1000’s patients Government 50B/day From weeks to days 1-2 ms/decision …industries need to harness this data to deliver better and faster business insights #IBMEDGE
  • 6. Clients are Struggling to Keep Up Top Issues for Storage Managers Managing Storage Growth Proper Capacity Forecasting and Storage Reporting Managing Costs Backup Administration and Management Managing Complexity 0% 20% 40% 60% Source: TheInfoPro Storage Study (Q4 2009), n=186. *Note that due to multiple responses per interview, total exceeds100%. This is a partial list of responses received, showing only the top 5 issues. #IBMEDGE
  • 8. Archiving: Client Motivations Compliance/Risk Systems Efficiency • Manage to regulations (SOX, HIPPA etc). • Reduce high cost storage. • Penalties and brand damage. • Reduce backup & recovery resources. • Exposure by keeping data too long. • Improve managed TB/Admin. ratio. • Litigation support. • Improve server performance/longevity. Document/Process Automation User Productivity • Go paperless in a process. • Improve application performance and • Integrate digitization to change/improve business processes. & availability. • Reduce time to search for and access • Store all documents/images online to improve historical/enterprise data. access/sharing. Information Innovation • Mine information for unique value. • Enhance business for competitive advantage or organizational improvement. #IBMEDGE
  • 9. What We are Finding in Customer Environments Current Storage Pyramid  Most companies, due to overprovisioning and poor visibility into their storage environment, have anywhere from 30% to 0-1% Tier 0 40% disk storage utilization 40-60% Tier 1  They have: – Overly complex storage management environments 20-40% Tier 2 – Over provisioned storage – Limited transparency of the data value Tier 3 10-20% – Limited financial transparency – Limited use of tools & operational execution to reduce the amount of wasted data  Over reliance on Tier 1 storage  Rarely revisit tiering structure for applications & data once deployed  Excessive replication which also has implications on archive, backup/recovery and disaster recovery  Hold excessive data on-line which negatively impacts application performance & availability #IBMEDGE
  • 10. Unnecessary Information Eclipses Your Necessary Information Unnecessary Necessary Information Information Over-Retained Valued Irrelevant High Risk Duplicated Compliant How much of your information is over-retained, irrelevant or duplicated? 40% ... 50% ... 60% … How do you know? Why would you want to archive any information that is not necessary to keep? #IBMEDGE
  • 11. Archive Requires a Smarter Strategy 17% 22% 40% Amount of IT  Companies that can  Of the planet’s  budget spent on  defensibly dispose  data should be  storage1 today3 archived4 44x 98% Companies that cite  The vast majority Projected  defensible disposal as  of companies still  information growth,  key result of  use backups as  2009‐20202 governance programs3 archives5 Sources: 1. Information Week Survey, December 2009. 2. IDC Digital Universe Study, May 2010. 3. CGOC Benchmark Report on Information Governance, October 2010. 4 Source: Jon Toigo, CEO and Managing Principal, Toigo Partners International. 5. “Controlling Storage Cost Amid High Growth”, Forrester Research, Inc., February 2010 #IBMEDGE
  • 12. Definition of Backup vs. Archiving • Backup is for recovery from hardware failure and/or recent data corruption • Archive is for space management and long term retention – Archiving is an intelligent process for managing inactive or infrequently accessed data, that still has value, while providing the ability to preserve, search and retrieve the information during a specified retention period. #IBMEDGE
  • 13. Shifting how Archive is Viewed • Keeping Too Much • Keep Needed Data • Disorganized Only – Has some • Difficult to Find Items organizational • Slow to Retrieve value/purpose • Little Value Provided • Data is Indexed – Easy to Query/Find – Retrieval • Low Cost to Maintain for Long-term – Secured data. • New Value Generation – Innovation / Analysis
  • 14. The two faces of Archiving Space Management Enterprise Content Management  IBM Content Manager, CM OnDemand, IBM FileNet Image move old, inactive files Manager, P8 Content Manager, IBM Content Collector to less expensive Enterprise Bundle, Hyland OnBase, EMC Documentum storage, resulting in reduced backup e-mail windows and reduced  IBM Content Collector for Email, IBM CommonStore for storage costs Lotus Domino, IBM FileNet Email Manager, Symantec Enterprise Vault, Zantaz, AXS-One, EMC MailXtender Databases  IBM Optim, IBM CommonStore for SAP, Data Retention IBM FileNet Application Connector for SAP, Solix, EMC Protect your data for the DatabaseXtender long term with non- erasable, non-rewriteable File Systems storage solutions and  IBM Content Collector for File Systems, Tivoli Storage demonstrate compliance Manager (TSM) HSM for Windows and Space Management for Unix and Linux, TSM Archive Client, SSAM Client, to regulations Symantec/KVS Enterprise Vault, EMC DiskXtender 14 #IBMEDGE
  • 15. Addressing IT Motivations Space Management move old, inactive files to less expensive storage, resulting in Systems Efficiency reduced backup • Reduce high cost storage. windows and reduced • Reduce backup & recovery resources. • Improve managed TB/Admin ratio. storage costs • Improve server performance/longevity. User Productivity • Improve application performance and availability. • Reduce time to search for and access historical/enterprise data. #IBMEDGE
  • 16. Space Management Policy-Driven Information Lifecycle Management (ILM) Older, infrequently accessed information Long-Term Retention Archive #IBMEDGE
  • 17. Use policy-based automation to move data across storage tiers to reduce costs A systematic approach to Create/ Collaborate Manage Archive Retire capture data lifecycle: Service-level agreements (SLAs) Set policies and automate the movement of data to the optimum Online access with Performance and Functionality environment over time SSD assured authenticity Metadata-policy Requirements management Capacity Online Higher service levels NAS Streamline management and Performance lower total cost of Online ownership (TCO) SAN Online Archival Offline Tape Time Days Months Years Decades Data: rate of change #IBMEDGE
  • 18. Tape’s substantial cost advantage over disk is forecast to continue through 2015 $/GB for Storage Media DRAM 1.E+05 NAND HDD 2002 estimated CAGR Tape Tape’s cost advantage over 1.E+04 Credit Suisse 2008 Study Grochowski 2003 disk also contributes to a IDC 08 signification TCO advantage HDD History 1.E+03 TCO Comparison 16 1.E+02 Disk Tape 14 $/GByte 12 1.E+01 10 8 1.E+00 6 4 1.E-01 2 0 10 yr Archive 5 yr Backup 1.E-02 Tape (Clipper Gp) (ESG Study) 1.E-03 1990 1995 2000 2005 2010 2015 Year #IBMEDGE
  • 19. Blended Solutions: Reducing Costs and Increasing Flexibility • Lower costs primarily from: Utilizing Tape Drastically Reduces TCO – Lower cost of media 10 year TCO example. Assumes 250TB storage, 25% growth/yr – Minimal need for Power & Cooling $7 $6,365,950 • Increased flexibility from ability Floor space Power & Cooling to: Maintenance – Add capacity by simply adding Prod + DR Carts tape cartridges Millions Hardware $3.5 – Expand tape libraries over and around existing equipment in the $2,255,346 data center $946,405 • Reliability: lower bit-error- rates, read verifications after $0 writes. SATA Disk Tape Blended Disk and Tape * TCO estimates based on IBM internal studies. #IBMEDGE
  • 20. Automate Data Placement and Migration IBM Active Cloud Engine™ File creation 30 days Optional TSM/HSM Initial Server & Virtual or Physical Tape Pool placement SAS 180 days NL-SAS IBM SONAS and Storwize V7000 Unified #IBMEDGE
  • 21. Addressing Business Needs Compliance/Risk • Manage to regulations (SOX, HIPPA etc). • Penalties and brand damage. • Exposure by keeping data too long. • Litigation support. Document/Process Automation • Go paperless in a process. • Integrate digitization to change/improve Data Retention business processes. Protect your data for the • Store all documents/images online to improve long term with non- access/sharing. erasable, non-rewriteable storage solutions and Information Innovation demonstrate compliance • Mine information for unique value. • Enhance business for competitive advantage to regulations or organizational improvement. #IBMEDGE
  • 22. Non-Erasable, Non-Rewriteable (NENR) storage WORM Optical Platters Tape Cartridges Disk Drives The original IBM LTO and Disk media is write-once, TS1100 drives not WORM, but read-many support WORM we can add (WORM) media, media “software including DVD enforcement” and CD-ROM against tampering NENR From U.S. SEC 17a-4 If employing any electronic storage media other than optical disk technology (including CD-ROM), the member, broker, or dealer must notify its designated examining authority at least 90 days prior to employing such storage media. The electronic storage media must: Preserve the records exclusively in a non-erasable, non-rewriteable, format; #IBMEDGE
  • 23. Comply with regulatory and security Requirements Why? So you can confidently protect your strategic information assets 1. Use non-erasable, Non-rewriteable storage for data retention and regulatory compliance requirements • WORM tape media (LTO and 3592) • N series with SnapLock™ Compliance and SnapLock™ 2. Complementing Software  System Storage Archive Manager  IBM Optim, Content Collectors and eDiscovery tools #IBMEDGE
  • 24. WORM Tape • 3592 cartridge media – 500 GB native capacity – Economy WORM Cartridge • Faster average retrieval time, lower cartridge price – 4 TB native capacity – Advanced WORM Cartridge • LTO cartridge media – LTO-3 400 GB native capacity WORM cartridge – LTO-4 800 GB native capacity WORM cartridge – LTO-5 1500 GB native capacity WORM cartridge • Benefits – Supports long term data retention applications – Helps comply with requirements for non-rewriteable, non-erasable media – Cost effective storage – Utilizes standard tape libraries and controllers #IBMEDGE
  • 25. IBM N series with SnapLock™ • Non-erasable, non-rewritable magnetic disk storage – Add-on software license – Enabled at a volume level • Fine-grained management – File-level retention policies – Reclaim space with file expiration • Tamperproof ComplianceClock™ • Open protocol interfaces – Data access via CIFS and NFS – Easy application integration without closed, proprietary APIs • High performance—implemented on industry's fastest NAS platforms • SnapLock Compliance version • SnapLock Enterprise version #IBMEDGE
  • 26. Compliance Archive through Software Enforcement • System Storage Archive Manager (SSAM) – Is a special “hardened-for-archive” TSM server – Is an archive/retrieve only solution • Archive: copy data or file from client to preserve for later use – Facilitates compliance with regulatory requirements – Has special data retention protections – Accepts data from TSM client API or the SSAM client • SSAM client = Archive only version of TSM B/A client • SSAM performs storage management – Manages data placement based on policies – Manages migration of data within storage hierarchy #IBMEDGE
  • 27. IBM System Storage Archive Manager Overview • SSAM is licensed by data capacity rather than number of processors – Primary storage pools only • TSM support for Non-Erasable, Non-Rewriteable (NENR) media, including – SnapLock™ for IBM N series and NetApp storage devices – EMC Centera – IBM 3592 WORM tape – LTO WORM tape #IBMEDGE
  • 28. SSAM Data Retention Protection • SSAM includes the following capabilities –Archive object protection • Archive object cannot be deleted until retention period is expired –Chronological (time) Based retention policies –Event Based retention policies • Allows starting retention period of objects based on an event –Deletion Hold / Release • Hold overrides retention time countdown • Hold & release controlled by API or SSAM/BA client • Additional Data Retention Protection: –Decreasing retention time of archived objects is not possible –Deleting retention policies (management classes) is not possible –Administrator cannot delete nodes or objects #IBMEDGE
  • 29. Chronological and Event Based Retention Chronological Based Minimum Fixed Period X Day 0 Dispose after fixed period from creation date Event Based with Fixed Protection Periods Minimum Event X Fixed Period Fixed Period Day 0 Dispose after fixed period from event date Event Based with no Fixed Protection Period Event X Day 0 Dispose after event #IBMEDGE
  • 30. Deletion Hold and Release API Function Event-Based Retention Policy API ‘Hold’ issued API ‘Release’ issued X RETMIN RETVER Day 0 API ‘Event’ Automated issued Expiration Data stored in Archive Data deleted in Archive Chronological Retention Policy API ‘Release’ issued X RETVER Day 0 API ‘Hold’ Automated issued Expiration Data stored in Archive Data deleted in Archive #IBMEDGE
  • 31. TSM/SSAM Transparent encryption • TSM provides simple key management – Available for TSM API applications; e.g. DP Exchange, DP SQL,… – TSM API Client generates a random encryption key password • Per data object selected by “include. encrypt” and “exclude. encrypt” criteria – TSM API Client passes encrypted data object encryption key password to TSM Server across “the wire” • TSM Client-Server “Session Key” used to encrypt/decrypt • AES128 encryption used if BOTH Client and Server support it • HW Tape Drive Encryption ( IBM TS1120-TS1140, LTO4-LTO5) – Device Class specification – One encryption key for each tape volume/cartridge – TSM Server generates, encrypts, and stores the encryption key in the TSM database along with other tape volume metadata – TSM supports HW provided encryption modes, Application, System and Library – TSM manages key in Application mode, other modes transparent to TSM • Backup-Archive client simple key management support (TSM 5.5) #IBMEDGE
  • 32. IBM Optim™ Solution Focus • Optim Data Growth Solution (Archiving) – Improve performance – Control data growth, save storage – Support retention compliance – Enable application retirement – Streamline upgrades • Optim Test Data Management Solution – Create targeted, right sized test environments – Improve application quality – Speed iterative testing processes • Optim Data Privacy Solution – Mask confidential data – Comply with privacy policies #IBMEDGE
  • 33. IBM Optim Archive Concepts Information Archiving and Storage Access Models Optim Archiving Architecture Legal Control • Legal Hold & Discovery Enterprise Structured • Archive Management Optim Services Content • Records / Retention • Policy based Data Purge • Heterogeneous R-DBMS • Complete Business Object • Legacy Data Store • Process Execution / Audit / Monitoring • Related file system documents Operational Control • Provenance • Tiered Storage • Multi-tier Secure Access • SLA • Meta Data Capture and Retention • Process Monitoring • Data Lifecycle Management • Search Retention Policy Enforcement • Federated DBMS Security Storage Management Operational Processes • Archiving Process • Archive Catalog Immutable Lifecycle Analysis & Reporting • Embedded Controls & ILM Archives Management • Search and Browsing • Business Intelligence Storage Virtual Management Archive Collections Integration Simplified, Prescriptive, Easy To Deploy #IBMEDGE
  • 34. Database Archiving Example Before: After: Current Active Online/Offline Data Historical Archive or Delete 0-2 yrs. 3-4 yrs. 7+ yrs. Keep Everything Forever Archive Files Archive Compressed Archive Production File Directory Service Levels Missed Database Database SAN Delete Retrieve Big databases run slower Operations Risk Open Access to Application Data SQL accidently bulk modify/delete Multiplying IT costs Growth for QA, Test, Dev, Reporting, Report XML ODBC / Application Backup/Recovery Writer JDBC #IBMEDGE
  • 35. IBM’s innovative Smart Archive Make data easier to find while lowering total costs Archive Policy Management Collect Migrate Delete Unchanged Infrequently Expired data accessed data data Months to Years to Applications Years Decades Automate data migration over time to reduce cost and risk – Up to 70% of data is duplicate and hasn’t been accessed in over 90 days – “A well deployed archiving strategy can save up to 60% in backup costs and reduce your backup times by up to 80%” Sources: “Top 10 Strategies for Surviving Unconstrained Data Growth,” Gartner Symposium Presentation, October 2010 #IBMEDGE
  • 36. IBM Content Collector Overview Modular and Extensible … Powered by Unique Task Routing Policy & Source Connectors Task Routing Target Connectors MESSAGING / EMAIL Engine IBM NATIVE  Microsoft Exchange / PST  FileNet P8  Lotus Domino / NSF  CM8  Lotus iNotes / LotusLive  FileNet Image Services  Instant Messaging (3rd Party)  Tivoli Storage Manager Task Connectors FILE SYSTEMS  Microsoft File System INTERNAL TASKS CUSTOM / OTHER  Desktops (via Tivoli CDP)  Copy / Move / Delete / Stub  Microsoft File System  Data ONTAP (NetApp / IBM N series)  De-Duplication  Other File Systems  Rules-Based Classification OTHER EXTERNAL TASKS  Optim Archive Files  Records Declaration  SAP Archive Files *  Advanced Context Classification  Microsoft SharePoint  Rendering (3rd Party)  Lotus Quickr **  IBM Content Integrator CUSTOM TASKS  CMIS  API Support / Partner Apps  Tivoli Storage Manager  Meta Data Enhancement / Cleansing * SAP available as specialized  Encryption connector CUSTOM SOURCES  System Lookups ** Lotus Quickr connector available  API Support with SDK  ILOG Rules Engine (or 3rd Party) today with ECM services  Policy Management #IBMEDGE
  • 37. Content Collection for Email Reference Architecture Domino Exchange Primary Messaging System Data Store All Users Source Connector Content aware Search Few Copy, Move, Authorized Delete, Stub, Task Analyze Connectors Retrieve Users Classify etc Disclose Links to Hold Target access Connector Archive Archive Storage Data Store Hierarchy #IBMEDGE
  • 38. Archive Solution Architecture Three critical components are required to build a solution: 1. Business application 2. Content management application 3. Storage Container: Rewriteable or Non-erasable / non-rewriteable (NENR) technology Business Application Content Management or Storage Container content Archiving application Retention System DB2 SQL Server Reports, Documents, IBM Content Manager Records, Customer IBM CM OnDemand Correspondence IBM FileNet Image Services IBM Content Collector IBM CommonStore IBM FileNet (Email Manager IS) #IBMEDGE
  • 39. eDiscovery • In 2006, Federal Rules of Civil $3M Procedure (FRCP) made all electronic data legally admissible for discovery in U.S. civil courts Average cost to collect,  cull and review  information per legal  case1 • Western Europe is catching up, such as the U.K. Bribery Act and Foreign Corrupt Practices Act (FCPA) 70% • Large corporations, especially those that deal with serial litigation and Portion of information  unnecessarily retained2 those in highly regulated industries, are having the most difficulty adopting eDiscovery Sources: 1 Litigation Cost Survey of Major Companies, 2010 (from Conference on Civil Ligitation, Duke Law School, May 2010). 2 Industry estimates #IBMEDGE
  • 40. Superior eDiscovery Software Efficient litigation improve defensibility and lower the cost of eDiscovery response with Increase agility, response enabled by proactive information management targeted tools to collect, hold, manage, assess and intelligently cull collected electronic information regardless of originating source IBM eDiscovery Manager IBM eDiscovery Analyzer • Tool for authorized IT users to help respond • Early case assessment and smart culling for legal to discovery requests from legal professionals and litigation support specialists • Create and manage cases; search, assign, • Smart refinement of case collections to help hold, preview, and export collected content dramatically reduce eDiscovery costs • Built on and integrated with ECM platform • Advanced conceptual search and content with full auditability for chain-of-custody analytics for rapid case insight #IBMEDGE
  • 41. IBM Archiving Solutions Value is delivered to you by:  Providing offerings for all types of data (e-mail, database, unstructured).  Leveraging policy-based data automation software for data movement, replication, retention and deletion.  Lowering TCO by leveraging tiered storage and increasing storage efficiencies.  Disk systems, Tape Systems, Blended disk and tape  Delivering flexible Non-erasable, Non-rewritable (NENR) and encryption options for securing data.  “If it is worth saving, it is worth protecting”.  Integrating IBM hardware, software and services into proven solutions.  Packaged and custom configurations for organizations of all sizes. #IBMEDGE
  • 42. Thank You! Session: sBR31 Presenter: Tony Pearson #IBMEDGE Intel, the Intel logo, Xeon and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and /or other countries.
  • 43. For More Information Email: tpearson@us.ibm.com Twitter: http://twitter.com/az99Øtony Blog: http://ibm.co/brAeZØ Books: http://www.lulu.com/spotlight/99Ø_tony IBM Expert Network: http://www.slideshare.net/az990tony 43 #IBMEDGE
  • 44. Don’t miss these valuable opportunities: Visit the Technical Edge Solution Expo IBM Edge2012 Logo Store Fill out your surveys! SmartSite for the most IBM & Partner Exhibits, Theater Visit the IBM Edge2012 Logo We value your feedback – up-to-date conference Presentations, Meet the Experts, store, conveniently located in Visit ibmtechu.com via web information! Receptions & Networking the Bonnet Creek Conference portal or mobile device to Center. Here you will find a submit your session Simply log into Monday 6:30 p.m. – 8:30 p.m. selection of IBM logo items that evaluations and receive an ibmtechu.com via web Tuesday 11: 45 a.m. – 1:00 p.m. range from apparel, pens, entry to WIN prizes. portal or mobile device to Tuesday 5:30 p.m. – 7:30 p.m. pad folios and techie items – stay connected with the Wednesday 11:45 a.m. – 1:00 p.m. to toys for children. The more evaluations Technical Edge submitted, the greater conference. Receptions Labs and Certification chance of winning! Monday 6:30 p.m. – 8:30 p.m. Increase and validate your skills Build your own agenda, Tuesday 5:30 p.m. – 7:30 p.m. using the latest versions of IBM download presentations, products: fill out your session surveys and check out our Mon. 10:00 a.m. – 6:00 p.m. virtual e-literature stand. Tues. 9:00 a.m. – 6:00 p.m. Wed. 9:00 a.m. – 6:00 p.m. Thur. 9:00 a.m. – 6:00 p.m. Fri. 7:00 a.m. – 12:00 p.m. #IBMEDGE
  • 45. Acknowledgements, disclaimers and trademarks Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office. UNIX is a registered trademark of The Open Group in the United States and other countries. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom. Linear Tape-Open, LTO, the LTO Logo, Ultrium, and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and other countries. Other product and service names might be trademarks of IBM or other companies. Information is provided "AS IS" without warranty of any kind. The customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. Information concerning non-IBM products was obtained from a supplier of these products, published announcement material, or other publicly available sources and does not constitute an endorsement of such products by IBM. Sources for non-IBM list prices and performance numbers are taken from publicly available information, including vendor announcements and vendor worldwide homepages. IBM has not tested these products and cannot confirm the accuracy of performance, capability, or any other claims related to non-IBM products. Questions on the capability of non-IBM products should be addressed to the supplier of those products. All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Some information addresses anticipated future capabilities. Such information is not intended as a definitive statement of a commitment to specific levels of performance, function or delivery schedules with respect to any future products. Such commitments are only made in IBM product announcements. The information is presented here to communicate IBM's current investment and development activities as a good faith effort to help with our customers' future planning. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput or performance improvements equivalent to the ratios stated here. Prices are suggested U.S. list prices and are subject to change without notice. Starting price may not include a hard drive, operating system or other features. Contact your IBM representative or Business Partner for the most current pricing in your geography. Photographs shown may be engineering prototypes. Changes may be incorporated in production models. © IBM Corporation 2012. All rights reserved. References in this document to IBM products or services do not imply that IBM intends to make them available in every country. Trademarks of International Business Machines Corporation in the United States, other countries, or both can be found on the World Wide Web at http://www.ibm.com/legal/copytrade.shtml. #IBMEDGE