SM B13: Symantec Data Insight - Veritasvox.veritas.com/legacyfs/online/veritasdata/SM B13.pdf ·...
Transcript of SM B13: Symantec Data Insight - Veritasvox.veritas.com/legacyfs/online/veritasdata/SM B13.pdf ·...
1
SM B13: Symantec Data Insight
John Dodds, Director Technical Product Manager Ketan Shah, Principal Product Manager
SM B13: Symantec Data Insight
SYMANTEC VISION 2012
What’s New and Futures 4
Data Protection and Compliance 3
Data Management 2
Overview 1
Agenda
SM B13: Symantec Data Insight 2
SYMANTEC VISION 2012 3
Unstructured Information Growth Leads to Challenges
3
• Inadequate metadata information
• What is the data governance structure?
• Pre-requisite for other business initiatives
• Who has accessed the data over time?
• When is the data no longer needed?
• What is the optimal method to store data?
• Contain leakage
• Who should have access?
• Are there gaps in the protection or entitlements scheme?
Who Owns the Data? How is the Data Used? Protect the Data
Data growth continues unabated… most of the growth during the next 5 years is unstructured data – the most difficult to manage from a process or tool point of view.
”
“
Gartner, Data Center Conference, Top 10 Trends and How They will Impact Data Centers and IT, David Cappuccio, Dec 2011
SM B13: Symantec Data Insight
SYMANTEC VISION 2012 4
• Data Insight solution
– Identifies data owners
– Monitors data usage
– Tracks audit trail
– Reviews permissions
• Data ownership/usage drives
– Data security remediation
– Data storage efficiency
– Data management policy and compliance
• Integrates with Data Loss Prevention, Storage, and Access Management
Symantec Data Insight Improves Data Governance
4
Users
Data (File Servers)
File Activity Monitoring Technology
Symantec Data Insight
Microsoft Windows • NetApp DataONTAP • Microsoft Sharepoint EMC Celerra • UNIX file servers with Veritas Storage Foundation™
SM B13: Symantec Data Insight
SYMANTEC VISION 2012
Data Management 2
Overview 1
What’s New and Futures 4
Data Protection and Compliance 3
Agenda
SM B13: Symantec Data Insight 5
SYMANTEC VISION 2012
What Data Insight Brings to Data Management?
6
• Identify data owners and map to business
•Promote accountability through chargeback
• Identify stale/orphan data and classify based on owners
•Guide cleanup, archiving and retention efforts
•Understand usage and consumption patterns
• Streamline data migration, growth planning and tiering
Chargeback to Users Eliminate Orphan Data Improve Data
Management Operations
SM B13: Symantec Data Insight
SYMANTEC VISION 2012
Identify Data Owners
SM B13: Symantec Data Insight 7
SYMANTEC VISION 2012 8
Rule-based Inference of Data Owners with Attributes to Classify or Map to Business
8 SM B13: Symantec Data Insight
SYMANTEC VISION 2012 9
Track Actual Consumption at the Business Unit or Department Level
9 SM B13: Symantec Data Insight
SYMANTEC VISION 2012
Recognize Stale Data Categorized by Age
10 SM B13: Symantec Data Insight
SYMANTEC VISION 2012 11
Report Consumption by Type
SM B13: Symantec Data Insight 11
SYMANTEC VISION 2012 12
Understand Frequency of Usage
12 SM B13: Symantec Data Insight
SYMANTEC VISION 2012
Data Protection and Compliance 3
Overview 1
What’s New and Futures 4
Agenda
SM B13: Symantec Data Insight 13
Data Management 2
SYMANTEC VISION 2012
How Data Insight Fits into Protection and Compliance
14
For unstructured data…
• Identify users, notify them and protect with Data Loss Prevention
• Identify custodians to engage for compliance
• Investigate data breaches; monitor sensitive data usage
• Audit activity to data
• Find data at greatest risk of exposure and lock it down
• Review access for compliance
•Data owner identification •Data owner remediation
Discover
•Open share and risk score •Effective permissions
Protect
•Data monitoring and access alerts
Monitor
SM B13: Symantec Data Insight
SYMANTEC VISION 2012
Audit Historical Access
15 SM B13: Symantec Data Insight
SYMANTEC VISION 2012
Set Policies to Monitor Sensitive Data Usage
16
• Monitor activity to data
• Select folders or use DLP classification
• Alert if activity exceeds threshold
• Monitor activity of users
• Alert if user activity deviates from baseline
SM B13: Symantec Data Insight
SYMANTEC VISION 2012
Review Effective Permissions
SM B13: Symantec Data Insight 17
SYMANTEC VISION 2012
Locate ‘Open Shares’
18 SM B13: Symantec Data Insight
SYMANTEC VISION 2012
Data Loss Prevention View for Incident and Data Owner
SM B13: Symantec Data Insight 19
John Smith
Data Insight
SYMANTEC VISION 2012
Data Loss Prevention Risk Scoring Identifies Data at Greatest Risk
SM B13: Symantec Data Insight 20
Highlights the most risky folders
Score is based on incident type, severity and folder accessibility
Tells the organization where to focus initial data clean up
and lock down efforts
SYMANTEC VISION 2012
What’s New and Futures 4
Overview 1
Agenda
SM B13: Symantec Data Insight 21
Data Management 2
Data Protection and Compliance 3
SYMANTEC VISION 2012
0001010001011110110101010011100101010111001101010010101101010000110110011110010101010001010010101010010110010101001010110101010101010101010101101010101101010001010001011110110101010011100101010111001101010010101101010000110110011110010101010001010
Bridging IT and Business Gap is the Key to Getting in Control of Runaway Data Growth
22
• “I know I have millions of files that have not been used for a long time – what do I do with them?”
• “I know there is sensitive information out there – where is it and how is it being used?”
• “How do I comply with data access guidelines? I am not sure I am the right person to make the call…”
• Business owners are the true ‘custodians’
– How do we identify them? – How do we empower them?
• How can we enable them with
– The right reports for visibility – The right recommendations
for decision making – The right automation to
simplify remediation
… that the business owner is in the best position to solve
Runaway unstructured data growth leads to serious challenges for IT…
SM B13: Symantec Data Insight
SYMANTEC VISION 2012
Key Enhancements in Data Insight 3.0
23 23
• Discover and manage data custodians
• Engage custodians automatically
• Enable large-scale automation
• Veritas Storage Foundation integration
• NetApp NFS, SharePoint permissions support
• Support for LDAP, NIS/NIS+ directory services
• Optimized indexing and query
• Lower TCO considerations
• Tuned for very large data sets and event rates
Data Custodian Management
Comprehensive Coverage
Enhanced Scale and Performance
SM B13: Symantec Data Insight
SYMANTEC VISION 2012
Automate Data Governance
24
Automate Reports 3
Case Studies
1. Efficiency
2. Regulatory Compliance
• Confidently delete, archive or move stale/orphan data while adhering to data retention guidelines
• Review access permissions and activity to achieve compliance
Identify Folders 1
Symantec Data Insight
0001010001011110110101010011100101010111001101010010101101010000110110011110010101010001010010101010010110010101001010110101010101010101010101101010101101010001010001011110110101010011100101
Assign Custodians 2
3. Risk Reduction • Review activity and alerts to spot inappropriate use, notify owner that data is exposed, streamline Data Loss Prevention remediation
SM B13: Symantec Data Insight
SYMANTEC VISION 2012
Adding Custodians
25 SM B13: Symantec Data Insight
SYMANTEC VISION 2012
Custodian Centric Reporting
26
Quick view of all data relevant to a single custodian
Email relevant data only to custodian
automatically
SM B13: Symantec Data Insight
SYMANTEC VISION 2012
Benefits
Data Insight and Veritas Storage Foundation™ from Symantec - Integration
27
• Data governance for Unix/Storage Foundation servers
• Data ownership /usage classification to guide tiering and compression
Unix Server with Storage Foundation 6.0 Collectors
Users
Register/Scan
Publish events
NFS Access
SM B13: Symantec Data Insight
SYMANTEC VISION 2012
NFS/Unix User Activity
28 SM B13: Symantec Data Insight
SYMANTEC VISION 2012
APP7400 - Symantec HA/DR Futures and Roadmap
This information is about pre-release software. Any unreleased update to the product or other planned modification is subject to ongoing evaluation by Symantec and therefore subject to change. This information is provided without warranty of any kind, express or implied. Customers who purchase Symantec products should make their purchase decision based upon features that are currently available.”
Copyright© 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Legal Notice and Safe Harbor – <Slides Removed>
NEW FEATURE AHEAD
SM B13: Symantec Data Insight 29
SYMANTEC VISION 2012
Symantec Data Insight Training Offering
Symantec Education Services
Symantec Training is EASY because:
• Training from Symantec gives you the product knowledge you need to be effective in your job.
• Shorten your implementations and spend less time with support
• For more information, visit http://go.symantec.com/education_elibrary
Data Insight training helps you quickly learn how you can reduce storage
cost by gaining visibility and control into the ownership and usage of
unstructured data. Data Insight web-based training is a 12-month
eLearning subscription available through the eLibrary
eLibrary offers the most up to date training anytime, anywhere
Extend your investment by purchasing Symantec Education
30
Thank you!
Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Thank you!
SM B13: Symantec Data Insight 31