IRMS Conference 2014

34
SharePoint, Challenges and Solutions When Used as a DMS By Randy Perkins-Smart, BSc (Hons) MBCS CITP

description

IRMS Conference 2014 slides.

Transcript of IRMS Conference 2014

Page 1: IRMS Conference 2014

SharePoint,Challenges and SolutionsWhen Used as a DMSBy Randy Perkins-Smart, BSc (Hons) MBCS CITP

Page 2: IRMS Conference 2014

Me, Myself and I

Randy Perkins-Smart Twitter: @SharePointRandy LinkedIn:

LinkedIn.com/in/RandyPerkins Blog: SharePointRandy.com Email: Randy@Perkins-

Smart.net

Perkins-Smart Consulting Ltd Twitter: @PerkinsSmart Web Site: www.Perkins-Smart.net Telephone: +44 (0) 20 7175 0105

Page 3: IRMS Conference 2014

My Point of ViewThe views expressed in this

presentation are my own and do not reflect those of my

past or present employers or their clients.

Page 4: IRMS Conference 2014

Agenda Governance Risk Classification

Agenda

Page 5: IRMS Conference 2014

Governance

Page 6: IRMS Conference 2014
Page 7: IRMS Conference 2014

[Governance] relates to processes and decisions that seek to define actions, grant power and verify performance- http://en.wikipedia.org/wiki/Governance

Page 8: IRMS Conference 2014

What needs to be governed?

Audit Data No audit history To much audit data

Documents Templates Grammar

Security Sensitive information disclosed Useful information not found

Metadata Useful information not found

Page 9: IRMS Conference 2014

Governance Tools

OOTB AvePoint Metalogix Gimmel View Do Labs ConceptSearching Semaphore WAND

Page 10: IRMS Conference 2014

Risk

Page 11: IRMS Conference 2014

the possibility of incurring misfortune or lossCollins Dictionary - http://www.collinsdictionary.com/dictionary/english/risk

Page 12: IRMS Conference 2014

Snowden

Page 13: IRMS Conference 2014

Heartbleed& OpenSSL

Page 14: IRMS Conference 2014

Securing data

Strong Passwords Two-Factor Authentication SSL Active Directory Rights Management

Services (AD RMS) Database – SQL Server Transparent

data encryption (TDE)

Page 15: IRMS Conference 2014

Compliance

Page 16: IRMS Conference 2014

http://en.community.dell.com/dell-blogs/direct2dell/b/direct2dell/archive/2013/10/10/pci-and-cloud-q-amp-a-are-you-compliant.aspx

Page 17: IRMS Conference 2014

Office 365 Compliance Certified for ISO 27001 EU model clauses Data processing agreement HIPAA Business Associate Agreement (HIPAA

BAA) Federal Information Security Management Act

(FISMA) Family Educational Rights and Privacy Act

(FERPA)http://office.microsoft.com/en-us/business/office-365-security-and-privacy-verified-by-a-third-party-FX103089231.aspx

Page 18: IRMS Conference 2014

Compliance Tools AvePoint

AvePoint Compliance Guardian AvePoint Perimeter Compliance Detector DocAve Archiver DocAve eDiscovery DocAve Vault

Gimmal Compliance Suite for Microsoft

SharePoint

HiSoftware Compliance Sheriff® SP for

SharePoint HiSoftware Security Sheriff™ SP

for SharePoint Accessibility Foundation Module

(AFM) for SharePoint

Metalogix ControlPoint for SharePoint

Administration

Page 19: IRMS Conference 2014

Classification

Page 20: IRMS Conference 2014

Document Sets

http://media-cache-ak0.pinimg.com/originals/b4/2f/aa/b42faa31f896b6e410429d157de3c297.jpg

Page 21: IRMS Conference 2014

Microsoft Office Metadata Author Name

Author Initials

Company or organization name

Computer name

Name of the network server or hard disk where the document is saved

Other file properties and summary information

Non-visible portions of embedded OLE

objects

Names of previous document authors

Document revisions

Document versions

Template information

Hidden text or cells

Personalized views

Comments

…and more!

• Client Name

• Client Number

• Client Type

• Matter Name

• Matter Number

• Attorney / Lawyer Assigned

• Matter Type

• Matter Status

• First Court Date

• Next Court Date

• Matter Notes

• Matter Start Date

• Matter End Date

• Jurisdiction

• Region

Legal Metadata

Page 22: IRMS Conference 2014

Classificationof Data

Source: http://en.wikipedia.org/wiki/Classified_information_in_the_United_Kingdom

Nationality Caveat

Security Descriptors

UK Eyes Only Top secret Budget

CANUKUS Eyes Only

Secret Commercial

AUSCANNZUKUS Confidential Honours

Restricted Management

Protect Medical

Unclassified Personal

Policy

Staff

Visits

Page 23: IRMS Conference 2014

Auto Classification / Tagging Reduce cost

of tagging and miss-tagging associated with the inability to find information

Reduce risk associated with end user non-compliance issues

Standardise company processes associated with the identification and segregation of privacy data

E.g. ConceptSearching -http://www.conceptsearching.com

Page 24: IRMS Conference 2014

Meta Data Removal

Manual Microsoft Office

Automated Microsoft Office Third Party Tools Workshare Security (http://www.workshare.com/)

Combination

Page 25: IRMS Conference 2014

eDiscovery and Search

Page 26: IRMS Conference 2014

Magic Quadrant for E-Discovery Software

Page 27: IRMS Conference 2014

eDiscovery and Search Tools Microsoft

SharePoint 2013 eDiscovery Office 365 eDiscovery

Other Recommind HP / Autonomy eDiscovery

http://www.autonomy.com/offerings/ediscovery/

Page 28: IRMS Conference 2014

Social Media

Page 29: IRMS Conference 2014

Social Media Just because we are talking about the

enterprise don’t forget the consumer side of Social Media

Page 31: IRMS Conference 2014

Summary

Page 32: IRMS Conference 2014
Page 33: IRMS Conference 2014
Page 34: IRMS Conference 2014

Thank YouSlides:

h t t p : / / r a p s . c c /i rm s 2 0 1 4