Más contenido relacionado
La actualidad más candente (20)
Similar a Beware of the Risk Behind Big Data (20)
Beware of the Risk Behind Big Data
- 1. 1© Copyright 2013 EMC Corporation. All rights reserved.
Beware of the Risk Behind
Big Data
Garth Landers
Director, Product Marketing
Information Intelligence Group
Twitter - @garthlanders
- 2. 2© Copyright 2013 EMC Corporation. All rights reserved.
Agenda
• Big Data/Dark Data
• How to get control over Dark Data
• Use Cases
- 3. 3© Copyright 2013 EMC Corporation. All rights reserved.
Big Data = Structured+Unstructured Data
Structured Information
In Relational Databases
Managed & Unmanaged
Unstructured Information
Internet Of Things
Telemetry, Location-Based Information etc.
Non-Enterprise Information
The Digital Universe Is Growing By 7,600 PB / Day
- 4. 4© Copyright 2013 EMC Corporation. All rights reserved.
Functional Areas Where Companies Are Using Big Data
How Companies Are Using Big Data Analytics
McKinsey Global Survey of 1,469 C-level executive respondents at a range of industries and company sizes, “Minding Your Digital Business,” 2012.
Customer Intimacy
Budgeting & Planning
Operations & Supply Chain
Customer Service
Performance Management
New Product Strategy
Pricing
0 10 20 30 40 50
49%
39%
37%
33%
30%
28%
21%
- 5. 5© Copyright 2013 EMC Corporation. All rights reserved.
Dark Data?
“Data not being used to get a 360 degree view of the
customer”
“Dark Data is the bulk of the organization universe”
- 6. 6© Copyright 2013 EMC Corporation. All rights reserved.
Big Data Burdens
Big Data Potential
Better insight into business conditions
New Products/Services
Maximum leverage from IT investment
Big Data Challenges
Storage Optimization
Lack of Visibility
Policy Enablement
- 7. 7© Copyright 2013 EMC Corporation. All rights reserved.
Turning Dark Data into Big Data
Big Data is useful…..if you are asking the right questions
Context
•How old is my data?
•What information
about customers does
it contain?
•Who created it/uses it?
Value
•What can I get rid of?
•What do I need to
retain based on
business value
•What does it cost to
store this data?
•How can I reuse and
maximize the value of
my Big Data?
Location
•Is my Big Data in the
right place?
•How/where will I move
my Big Data?
- 8. 8© Copyright 2013 EMC Corporation. All rights reserved.
Why Dark Data Proliferates…
Organizations have 6 or
more repositories
Organizations have enforced
retention policies for paper and
electronic
AIIM Market Intelligence Report , 2011
Records Management Strategies – Plotting the changes”,
AIIM Market Intelligence Report , 2011
- 9. 9© Copyright 2013 EMC Corporation. All rights reserved.
"Companies don't need the guy who is
good with a shovel anymore. …
They need a guy who is good with a
bulldozer."
The Cloud: Battle of the Tech Titans
Businessweek March 3, 2011
- 10. 10© Copyright 2013 EMC Corporation. All rights reserved.© Copyright 2011 EMC Corporation. All rights reserved. 10
HOW DO YOU
GET CONTROL?
- 11. 11© Copyright 2013 EMC Corporation. All rights reserved.
CATALOG ANALYZE ACT
BIG DATA INTELLIGENCE
CATALOG ANALYZE ACT
IDENTIFY &
INDEX
CLASSIFY SEARCH REPORT SET ACTION
- 12. 12© Copyright 2013 EMC Corporation. All rights reserved.
What is Kazeon?
… Actionable Visibility into Data
Email Servers
(Exchange / Domino)
File Shares
Desktops / Laptops
Custom
Connectors
Documentum
Personal Archives
(PSTs / NSFs)
SharePoint
Archives
(SourceOne / eVault)
Backups
(Avamar )
Kazeon Appliance
• eDiscovery / FOIA
• Kazeon
- 13. 13© Copyright 2013 EMC Corporation. All rights reserved.
IDENTIFY &
INDEX • Easily target loosely managed content
sources like SharePoint and file shares
for content identification
• Powerful indexing options available for
identification and retrieval of content
• Categorize content based on pre-
defined or custom made criteria
CATALOG
PRODUCTS
- 14. 14© Copyright 2013 EMC Corporation. All rights reserved.
Risk Assessment Dashboard
Risk Report
By
Document
Age
Risk Report
by
Document
Location
Risk Report
By
Document
Owner
Risk Report
By
Document
Type
- 15. 15© Copyright 2013 EMC Corporation. All rights reserved.
ACT
SET ACTION
• Transfer content to EMC
Documentum or secure storage
based on governance
requirements
• Delete duplicative, stale or
unnecessary content reducing
storage costs and freeing up
primary storage
• Create an automated policy-
based environment to increase
productivity and free up
resources
PRODUCTS
- 16. 16© Copyright 2013 EMC Corporation. All rights reserved.
File Migration – Deduplication Report
43.66% Savings can be obtained by leveraging de-duplication
hardware for this file system.
- 17. 17© Copyright 2013 EMC Corporation. All rights reserved.
File Share Cleanup Report – Modified Report
Approximately 76% of the total storage scanned has not been
modified in the past 180 – 364 days. This data is a candidate for
cheaper tier of storage, or for archive.
- 18. 18© Copyright 2013 EMC Corporation. All rights reserved.
IT Policy Enforcement Example
Cleanup stale data through migration to inactive archive
Step 1:
Select files not accessed in the past 365
days
Step 2:
Select
Action -
Move
Step 1:
Select files not accessed in
the past 365 days
- 19. 19© Copyright 2013 EMC Corporation. All rights reserved.
Step 3:
Select target location – Tier_2_Storage
Step 3:
Select target location
(Data Domain)
Step 4:
Set enforcement schedule
IT Policy Enforcement Example (cont.)
Cleanup stale data through migration to inactive archive
- 20. 20© Copyright 2013 EMC Corporation. All rights reserved.
Kazeon Benefits
• “Drop in” appliance
– No need to setup an infrastructure, drop set and go.
• Repeatability
– Use it on a continual basis to keep file monitoring in
place, reducing costs and risk
• Flexibility
– Can be applied to file shares, laptops, desktops, MS
SharePoint, e-mail or Documentum
- 21. 21© Copyright 2013 EMC Corporation. All rights reserved.
ACCEPTABLE
USE VIOLATIONS
DEFENSIBLE
DELETION UNINTENDED
EXPOSURE
SCENARIOS
- 22. 22© Copyright 2013 EMC Corporation. All rights reserved.
DEFENSIBLE DELETION
THE PROBLEM
The process of manually
searching through vast sums of
content, identifying them as
records, and processing them
does not scale, taking inordinate
amounts of time and resources.
Organizations do not have the
resources to keep up with the
huge volumes of content.
THE SOLUTION
Using EMC Kazeon’s automated
indexing and classification, large
volumes of business records can
be identified and transferred to
EMC Documentum to be
managed with Documentum
Retention Policy Services
- 23. 23© Copyright 2013 EMC Corporation. All rights reserved.© Copyright 2013 EMC Corporation. All rights reserved. 23
• Reduced risk of sensitive data being lost
or stolen
• Reduced risk by locating personally
identifiable information spread across
100TB of data in 9 locations
• Proactive daily scanning process of new
data to assess risk and secure sensitive
data
Financial Services Provider
- 24. 24© Copyright 2013 EMC Corporation. All rights reserved.
THE PROBLEM
Employees violate acceptable
use policies, storing personal
and other non work related
content on company servers.
Content violates HR policy and
drives up costs.
ACCEPTABLE USE POLICY VIOLATIONS
BACK
THE SOLUTION
Utilize EMC Kazeon to identify
content with low business value.
Defensibly delete content.
- 25. 25© Copyright 2013 EMC Corporation. All rights reserved.
THE PROBLEM
Important business information
such as trade secrets, product
plans and customer information
located in unsecure or loosely
managed environments like file
shares and Microsoft SharePoint
UNINTENDED EXPOSURE
of sensitive info on informal systems
BACK
THE SOLUTION
Utilize EMC Kazeon to identify
content with high value,
intellectual property, trade
secrets, potential risk.
Move to EMC Documentum,
protect with security,
information rights and retention
policy management.
- 26. 26© Copyright 2013 EMC Corporation. All rights reserved.
Questions and Answers
To type a question via WebEx, click on the Q&A tab
Please select “Ask: All Panelists”
to ensure your questions reach us. Thank you!
- 27. 27© Copyright 2013 EMC Corporation. All rights reserved.
Resources
More Information
– Kazeon File Intelligence:
– http://www.emc.com/content-management/emc-kazeon-
file-intelligence.htm
15 Minute Guides:
– Understand and Secure Your Content:
http://www.emc.com/collateral/software/15-min-
guide/h9774-15min-guide-understand-secure-content-
gde.htm