How to Manage Data Growth: Addressing Analysis, Security and Protection

26
HOW TO MANAGE DATA GROWTH: Addressing analysis, security and protection

Transcript of How to Manage Data Growth: Addressing Analysis, Security and Protection

Page 1: How to Manage Data Growth: Addressing Analysis, Security and Protection

HOW TO MANAGE DATA GROWTH:Addressing analysis, security and protection

Page 2: How to Manage Data Growth: Addressing Analysis, Security and Protection

Senior managementhas long viewed

storage as a cost item,

not a strategic investment.

Page 3: How to Manage Data Growth: Addressing Analysis, Security and Protection

As a cost item,storage presented

problems for IT managers.

Page 4: How to Manage Data Growth: Addressing Analysis, Security and Protection

End userscreated and stored

more data.

Page 5: How to Manage Data Growth: Addressing Analysis, Security and Protection

Some companieseven created

keep-everything-forever

data retention policies.

Page 6: How to Manage Data Growth: Addressing Analysis, Security and Protection

Piles of data continued

to grow with no hope of

leveling off.

Page 7: How to Manage Data Growth: Addressing Analysis, Security and Protection

So IT had torepeatedly ask for more storage.

Page 8: How to Manage Data Growth: Addressing Analysis, Security and Protection

without tangible ROI.

Defending those budget requests

was hard

Page 9: How to Manage Data Growth: Addressing Analysis, Security and Protection

Storage admins were left to wrestle withthree problems:

Page 10: How to Manage Data Growth: Addressing Analysis, Security and Protection

2. Find tools to decipher, manage and protect data;

3. And actually derive value from that data.

1. Control growth;

Page 11: How to Manage Data Growth: Addressing Analysis, Security and Protection

Disparate tools to:

• Analyze usage patterns• Make data searchable• Assess security• Protect data

Each with its own user interface,

complexity and price tag

Page 12: How to Manage Data Growth: Addressing Analysis, Security and Protection

What IT teams really needed was a way to transform data storage.

from a cost to a benefit.

Page 13: How to Manage Data Growth: Addressing Analysis, Security and Protection

From a potential liability

into a self-aware asset

Page 14: How to Manage Data Growth: Addressing Analysis, Security and Protection

From a weakness

into aprotected strength

Page 15: How to Manage Data Growth: Addressing Analysis, Security and Protection

Smart storagearms users with

powerful data insights.

Page 16: How to Manage Data Growth: Addressing Analysis, Security and Protection

Data-driven decisions add the context employees need to

increase the ROI of every task.

Page 17: How to Manage Data Growth: Addressing Analysis, Security and Protection

So, it made sense tobring insights

to the point of storage.

Page 18: How to Manage Data Growth: Addressing Analysis, Security and Protection

You’re managingdozens of terabytes

today.

Page 19: How to Manage Data Growth: Addressing Analysis, Security and Protection

You know thatthe load will be

larger tomorrow.

Page 20: How to Manage Data Growth: Addressing Analysis, Security and Protection

Are there any unusual

access patterns?

How will you figure out:

Page 21: How to Manage Data Growth: Addressing Analysis, Security and Protection

Is corporate storage beingused for personal files?

Page 22: How to Manage Data Growth: Addressing Analysis, Security and Protection

Are therecompliance violations

in the stored data?

Page 23: How to Manage Data Growth: Addressing Analysis, Security and Protection

What data can wemove off

to cheaper storage tiers?

Page 24: How to Manage Data Growth: Addressing Analysis, Security and Protection

The only way to answer those questions is to track and catalog

all data interactions.

Page 25: How to Manage Data Growth: Addressing Analysis, Security and Protection

Identify potential risks and exposures

before they turn into headlines.