SM B13: Symantec Data Insight - B13.pdf · PDF file Key Enhancements in Data Insight 3.0...

Click here to load reader

  • date post

    06-Jun-2020
  • Category

    Documents

  • view

    2
  • download

    0

Embed Size (px)

Transcript of SM B13: Symantec Data Insight - B13.pdf · PDF file Key Enhancements in Data Insight 3.0...

  • 1

    SM B13: Symantec Data Insight

    John Dodds, Director Technical Product Manager Ketan Shah, Principal Product Manager

    SM B13: Symantec Data Insight

  • SYMANTEC VISION 2012

    What’s New and Futures 4

    Data Protection and Compliance 3

    Data Management 2

    Overview 1

    Agenda

    SM B13: Symantec Data Insight 2

  • SYMANTEC VISION 2012 3

    Unstructured Information Growth Leads to Challenges

    3

    • Inadequate metadata information

    • What is the data governance structure?

    • Pre-requisite for other business initiatives

    • Who has accessed the data over time?

    • When is the data no longer needed?

    • What is the optimal method to store data?

    • Contain leakage

    • Who should have access?

    • Are there gaps in the protection or entitlements scheme?

    Who Owns the Data? How is the Data Used? Protect the Data

    Data growth continues unabated… most of the growth during the next 5 years is unstructured data – the most difficult to manage from a process or tool point of view.

    Gartner, Data Center Conference, Top 10 Trends and How They will Impact Data Centers and IT, David Cappuccio, Dec 2011

    SM B13: Symantec Data Insight

  • SYMANTEC VISION 2012 4

    • Data Insight solution

    – Identifies data owners

    – Monitors data usage

    – Tracks audit trail

    – Reviews permissions

    • Data ownership/usage drives

    – Data security remediation

    – Data storage efficiency

    – Data management policy and compliance

    • Integrates with Data Loss Prevention, Storage, and Access Management

    Symantec Data Insight Improves Data Governance

    4

    Users

    Data (File Servers)

    File Activity Monitoring Technology

    Symantec Data Insight

    Microsoft Windows • NetApp DataONTAP • Microsoft Sharepoint EMC Celerra • UNIX file servers with Veritas Storage Foundation™

    SM B13: Symantec Data Insight

  • SYMANTEC VISION 2012

    Data Management 2

    Overview 1

    What’s New and Futures 4

    Data Protection and Compliance 3

    Agenda

    SM B13: Symantec Data Insight 5

  • SYMANTEC VISION 2012

    What Data Insight Brings to Data Management?

    6

    • Identify data owners and map to business

    •Promote accountability through chargeback

    • Identify stale/orphan data and classify based on owners

    •Guide cleanup, archiving and retention efforts

    •Understand usage and consumption patterns

    • Streamline data migration, growth planning and tiering

    Chargeback to Users Eliminate Orphan Data Improve Data

    Management Operations

    SM B13: Symantec Data Insight

  • SYMANTEC VISION 2012

    Identify Data Owners

    SM B13: Symantec Data Insight 7

  • SYMANTEC VISION 2012 8

    Rule-based Inference of Data Owners with Attributes to Classify or Map to Business

    8 SM B13: Symantec Data Insight

  • SYMANTEC VISION 2012 9

    Track Actual Consumption at the Business Unit or Department Level

    9 SM B13: Symantec Data Insight

  • SYMANTEC VISION 2012

    Recognize Stale Data Categorized by Age

    10 SM B13: Symantec Data Insight

  • SYMANTEC VISION 2012 11

    Report Consumption by Type

    SM B13: Symantec Data Insight 11

  • SYMANTEC VISION 2012 12

    Understand Frequency of Usage

    12 SM B13: Symantec Data Insight

  • SYMANTEC VISION 2012

    Data Protection and Compliance 3

    Overview 1

    What’s New and Futures 4

    Agenda

    SM B13: Symantec Data Insight 13

    Data Management 2

  • SYMANTEC VISION 2012

    How Data Insight Fits into Protection and Compliance

    14

    For unstructured data…

    • Identify users, notify them and protect with Data Loss Prevention

    • Identify custodians to engage for compliance

    • Investigate data breaches; monitor sensitive data usage

    • Audit activity to data

    • Find data at greatest risk of exposure and lock it down

    • Review access for compliance

    •Data owner identification •Data owner remediation

    Discover

    •Open share and risk score •Effective permissions

    Protect

    •Data monitoring and access alerts

    Monitor

    SM B13: Symantec Data Insight

  • SYMANTEC VISION 2012

    Audit Historical Access

    15 SM B13: Symantec Data Insight

  • SYMANTEC VISION 2012

    Set Policies to Monitor Sensitive Data Usage

    16

    • Monitor activity to data

    • Select folders or use DLP classification

    • Alert if activity exceeds threshold

    • Monitor activity of users

    • Alert if user activity deviates from baseline

    SM B13: Symantec Data Insight

  • SYMANTEC VISION 2012

    Review Effective Permissions

    SM B13: Symantec Data Insight 17

  • SYMANTEC VISION 2012

    Locate ‘Open Shares’

    18 SM B13: Symantec Data Insight

  • SYMANTEC VISION 2012

    Data Loss Prevention View for Incident and Data Owner

    SM B13: Symantec Data Insight 19

    John Smith

    Data Insight

  • SYMANTEC VISION 2012

    Data Loss Prevention Risk Scoring Identifies Data at Greatest Risk

    SM B13: Symantec Data Insight 20

    Highlights the most risky folders

    Score is based on incident type, severity and folder accessibility

    Tells the organization where to focus initial data clean up

    and lock down efforts

  • SYMANTEC VISION 2012

    What’s New and Futures 4

    Overview 1

    Agenda

    SM B13: Symantec Data Insight 21

    Data Management 2

    Data Protection and Compliance 3

  • SYMANTEC VISION 2012

    0001010001011 1101101010100 1110010101011 1001101010010 1011010100001 1011001111001 0101010001010 0101010100101 1001010100101 0110101010101 0101010101011 0101010110101 0001010001011 1101101010100 1110010101011 1001101010010 1011010100001 1011001111001 0101010001010

    Bridging IT and Business Gap is the Key to Getting in Control of Runaway Data Growth

    22

    • “I know I have millions of files that have not been used for a long time – what do I do with them?”

    • “I know there is sensitive information out there – where is it and how is it being used?”

    • “How do I comply with data access guidelines? I am not sure I am the right person to make the call…”

    • Business owners are the true ‘custodians’

    – How do we identify them? – How do we empower them?

    • How can we enable them with

    – The right reports for visibility – The right recommendations

    for decision making – The right automation to

    simplify remediation

    … that the business owner is in the best position to solve

    Runaway unstructured data growth leads to serious challenges for IT…

    SM B13: Symantec Data Insight

  • SYMANTEC VISION 2012

    Key Enhancements in Data Insight 3.0

    23 23

    • Discover and manage data custodians

    • Engage custodians automatically

    • Enable large-scale automation

    • Veritas Storage Foundation integration

    • NetApp NFS, SharePoint permissions support

    • Support for LDAP, NIS/NIS+ directory services

    • Optimized indexing and query

    • Lower TCO considerations

    • Tuned for very large data sets and event rates

    Data Custodian Management

    Comprehensive Coverage

    Enhanced Scale and Performance

    SM B13: Symantec Data Insight

  • SYMANTEC VISION 2012

    Automate Data Governance

    24

    Automate Reports 3

    Case Studies

    1. Efficiency

    2. Regulatory Compliance

    • Confidently delete, archive or move stale/orphan data while adhering to data retention guidelines

    • Review access permissions and activity to achieve compliance

    Identify Folders 1

    Symantec Data Insight

    00010100010111101101010100111001010101 11001101010010101101010000110110011110 01010101000101001010101001011001010100 10101101010101010101010101011010101011 01010001010001011110110101010011100101

    Assign Custodians 2

    3. Risk Reduction • Review activity and alerts to spot inappropriate use, notify owner that data is exposed, streamline Data Loss Prevention remediation

    SM B13: Symantec Data Insight

  • SYMANTEC VISION 2012

    Adding Custodians

    25 SM B13: Symantec Data Insight

  • SYMANTEC VISION 2012

    Custodian Centric Reporting

    26

    Quick view of all data relevant to a single custodian

    Email relevant data only to custodian

    automatically

    SM B13: Symantec Data Insight

  • SYMANTEC V