The Business of Big Data - MJ Flood...
Transcript of The Business of Big Data - MJ Flood...
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
The Business of Big Data:Revenue generation, defensibility and operational efficiencyDavid Kemp
HP Software Solutions
5th June 2015
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.2
AGENDA
• Understanding the size and complexity of Big Data
• Getting our arms round the data
• Records Management
• Surveillance
• Defensibility
• Q & A
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.4
19 of the top 25
FT Financial Institutions
HP is powering the world’s leading firms for risk management and regulatory compliance
10of the top 10
Global Banks
77of the top 100
Global Law Firms
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.5
Flight 276Tokyo/LHR260 Passengers
Building 5418120m
23.155.6926ºC / 72
Traffic Monitor
12.945.156.26
Jen Shitohara125.421.484.12
Yun Kim125.421.484.12
Shibuya Sta.Crossing
Shibuya Sta.Crossing
Building 259780m 23.155.69
27ºC / 73
Advertorial Lighting BracketStatus: OFF
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.6
Enterprise data growthCosts of managing data
1,820 TB of data created
Every 60 seconds…
YouTube
Viber
Qzone
Amazon Web Services
GoGrid
Rackspace
LimeLight
Jive Software
salesforce.com
Xactly
Paint.NET
Business
Education
Entertainment
Games
Lifestyle
Music
Navigation
News
Photo & Video
Productivity
Reference
Social networking
Sport
Travel
Utilities
Workbrain
SuccessFactors
Taleo
Workday
Finance
box.net
TripIt
Zynga
Zynga
Baidu
Yammer
Atlassian
Atlassian
MobilieIronSmugMug
SmugMug
Atlassian
Amazon
AmazoniHandy
PingMe
PingMe
Associatedcontent
Flickr
Snapfish
Answers.com
Tumblr.
Urban
Scribd.Pandora
MobileFrame.com
Mixi
CYworld
Renren
Yandex
Yandex
Heroku
RightScale
New Relic
AppFog
BromiumSplunk
CloudSigma
cloudability
kaggle
nebula
Parse
ScaleXtreme
SolidFire
Zillabyte
dotCloud
BeyondCore
Mozy
Fring Toggl
MailChimp
Hootsuite
Foursquare
buzzd
Dragon Diction
SuperCam
UPS Mobile
Fed Ex Mobile
Scanner Pro
DocuSign
HP ePrint
iSchedule
Khan Academy
BrainPOP
myHomework
Cookie Doodle
Ah! Fasion Girl
PaperHost
SLI Systems
NetSuite
OpSource
Joyent
Hosting.com
Tata Communications
Datapipe
PPM
Alterian
Hyland
NetDocuments
NetReach
OpenText
Xerox
Microsoft
IntraLinks
Qvidian
Sage
SugarCRM
Volusion
Zoho
Adobe
Avid
Corel
Microsoft
Serif
Yahoo
CyberShift
Saba
Softscape
Sonar6
Ariba
Yahoo!
Quadrem
Elemica
Kinaxis
CCC
DCC
SCMADP VirtualEdge
Cornerstone onDemand
CyberShift
KenexaSaba
Softscape
Sonar6
Workscape
Exact Online
FinancialForce.com
IntacctNetSuite
Plex Systems
Quickbooks
eBay
MRM
Claim processing
Payroll
Sales tracking & marketing
CommissionsDatabase
ERP
CRM
SCM
HCM
HCM
PLM
HP
EMC
Cost management
Order entry
Product configurator
Bills of materialEngineering
Inventory
Manufacturing projects
Quality control
SAP
Cash management
Accounts receivableFixed assetsCosting
Billing
Time and Expense
Activity managementTraining
Time & attendance
Rostering
Service
Data warehousing
The InternetGigabytes
Client/serverMegabytes
IBM
Unisys
Burroughs
Hitachi
NECBull
Fijitsu
Mainframe Kilobytes
Mobile, social, Big Data & the cloud
Zettabytes
TCO for unstructured data varies between $4/GB to $100/GB annually, but $25GB is a good rule of thumb*
*Source: ESG White Paper – The Cost of Managing Unstructured Data, May 2014
The volume, velocity and breadth of channels often overwhelms Information Management strategies leading to dark data
Storage costs are visible, soft costs such as opportunity & risk costs are less so, but no less real…
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.7
Video surveillance
Wire tapping
Internet of ThingsFacebook likes
Tweets
DronesOnline shopping Search queries Tweets
RBMS Social sentiment
CRM
Web logs
User clickstreams
Business data feedsMobile
SMS/MMS
User generated content
Apps YouTube
Service logs
The Era of ‘human information’
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.8
What is Human Information
Information that is created by people and understood by people
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.9
Why is human information different?
• Human Information is made up of ideas, is diverse and has context
• Human information is diverse: text, audio, video, social
• Human Information is not static – it’s dynamic and lives everywhere.
• Information is complicated
• Meaning is relative and has a context
• Ideas don’t match - they have distance
Social data is “human information” which is fundamentally different
Mercury is the patron god of financial gain, commerce, eloquence luck, trickery and thieves; he is also the guide of souls to the underworld
A heavy metal, mercury, is toxic and can cause diseases including Hunter-Russell syndrome
“This slow rate, combined with mercury's nearness to the sun, causes a daytime temperature of more than 400 °C.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.10
Strong Information & Weak InformationKey Words are small amounts of very strong information without
context
“Mercury”
Is it a planet? Is it a car?Is it an element?
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.11
“A heavy element and the only metal that is liquid at standard conditions for
temperature and pressure with the symbol Hg and atomic number 80,
commonly known as quicksilver”
With high certainty; its an element!
Strong Information & Weak Information
Larger amounts of weaker information is what humans refer to as “context”
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.12
Insight from 100% of the data
Data is exploding but traditional data technologies impose limits - We need connected intelligence
Structureddata
Humaninformation
Machine data
Connected
Intelligenc
e
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.13
The different flavors of information
Inte
rna
l
UnstructuredStructured
Ex
tern
al
High Velocity
Enterprise
"Dark Data"
Web logs
Contracts
Reports
Social Media
Data
Facebook,
Twitter, Tumblr
Communities,
Blogs
Commercial
Data
Credit BureausBusiness
Information
Mobile Payments
Market Research
Operational
DataTransactions
Monitoring
SensorMeter’s, RFID,
GPS
Census
Weather
Geoinformation
Open Data
Public
Data
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.14
Blending every data source
OperationalEnterprise
"Dark Data"
Public Commercial
Social Media
Economic
Population
Contracts
Mobile
Weather
Transactions
Monitoring
Sensor
Sentiment
Network
Industry
Correlations and patterns from disparate, linked data sources yield the greatest insights and transformative opportunities.
Reports
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.15
Big Data Investments Continue to Rise
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
2012 2013 2014
Investments in Big Data Technology
Don't know
No plans
Plan within 2yrs
Plan within 1yr
Yes
Q01. Has your organization already invested in technology specifically designed to address the big data challenge?
n=302n=473 n=720
58% 64% 73%
Percentage
investing or
planning
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.16
Need for an automated Comprehension Engine
• Volumes too vast
• Ideas too complex
• Confused by multiple language
• Data formats too diverse
• Data in federated silos eg. UBS / Airframe Manufacturer
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.17
Mathematical Algorithm solutions
• Leverages long standing mathematical principles
• Forms an understanding of all content
• Conceptual and keyword
• Detects patterns and relationships
• Enables automation – audio/video analysis, sentiment analysis, automatic hyperlinking, 500+ others functions
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.18
Personalization from
forms/questionnaires,
geodemographic
profiling
Aggregate content,
tag & categorizeHypertext links to
similar content
Searching for
information
E-mailing information
to relevant recipients
Reformatting for multi-
channel delivery, e.g.
PDF to XML
Answering customer
inquiries via a helpdesk
Manual ProcessesNotes
News
Feeds
Internet
Database
Files
Document
Management
XML
Information Theoryand Bayesian
Inference
Integration
ThroughUnderstanding
Audio/ Media
Aggregation
Automatic
categorization
Hyperlinking
Profiling
Personalization
Collaboration
Delivery
Retrieval
Routing
Alerting
Process Automation
Understanding/Automation Removes Manual ProcessesCorporate Fraud management automated
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.19
HP Intelligent Data Operating Layer (IDOL)
The Operating System for human information
Connect
Understand
Over 500 functions to derive actionable insights
Act & Automate
the meaning, concepts and key attributes in all types of information, including docs, emails, databases, social media, rich media…
Access virtually any source of information400 Connectors and 1000+ file types
Secure
Dynamic
Over 500 functions to derive actionable insights
Act & Automate
Continuous learning ability &Language Independent
Superior speed, scalability, and simplicityBuilt in security & compliance functionality
𝑃 𝜃 𝑥 =𝑃 𝑥 𝜃 𝑃 𝜃
𝜃′∈𝛩𝑃 𝑥 𝜃′ 𝑃 𝜃′
𝐻 = −
𝑖
𝑝𝑖 log2 𝑝𝑖
Ability to understand meaning makes us unique in the market
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.20
Store, explore, govern, protect & serve
SolutionsPlatform
HP Software Big Data business group portfolio
Compliance
Litigation Readiness
Storage Optimization
Database Archiving
eDiscovery
Supervision
Legal Hold
Enterprise Search& Analytics
Vertica Big Data Analytics
Media Intelligence
Video Surveillance
IDOL & IDOL on Demand
Knowledge Mgmt.
Content Access& Extraction
Records Mgmt.
Legal Content Mgmt.
Business Process Mgmt.
Document Mgmt.
Records Mgmt.
Legacy Clean Up
Server Data Protection
Virtual Machine Data Protection
Remote & BranchOffice Data Protection
Endpoint DeviceData Protection
Cloud Data Protection
EnterpriseContent Mgmt.
Archiving &eDiscovery
DataProtection
Cloud Security
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Analytics & Data Management
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.22
HP Information Governance Framework
Explosion of data
New, structured and unstructured data
types to manage
Data everywhere
Mobile, virtual, cloud joins physical.
67% of users have three or more
computing platforms
Real-time access
Always-on applications and users.
Business continuity moves to forefront
Increased requirements
Escalating industry and government
regulations. Litigation increasingly
involving ESI
Tri
gg
ers
Improve value Mitigate risk Reduce cost
Dri
vers
HP Information Governance Outcomes
Business
Efficiency
Business
Insight &
Innovation
Risk &
Complianc
e
Legal
Obligation
IT
Efficiency
CREATE, SHARE, DELIVER EXPLORE, ANALYZE SECURE, PRESERVE HOLD, DISCOVER STORE, PROTECT
Triggers & Drivers
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.23
Images
HP Information Governance Framework
Big Data
Systems of Business
Systems of Engagement
Systems of Insight
HUMANDATA
BUSINESSSYSTEMS
MASCHINE ANDSENSOR DATA
SOCIALMEDIA
Systems of Control
Unified Information Governance
Audio
Social Media
Mobile
Machine and sensor data
Documents
Audio
TransactionalData
Unified Information Governance
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.24
Improve customer relationship
Extend life expectancy
Deliver better, smarter products
Ensure governance & compliance
Protect and save lives
How can we make Big Data matter?
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Use Cases
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.26
HP IDOL 10.x delivers significant KPI improvements
0%
25%
50%
75%
100%A
ero
spac
e -…
Air
craf
t…
Bio
scie
nce
Go
v't
-…
Go
v't
- D
ept…
Law
…
Law
…
Leg
al -
KLA
Leg
al -
…
Med
ia -
…
Med
ia -
El…
Med
ia -
EW
…
Mig
rati
on
to
…
eCo
mm
erce
…
Ser
vice
s -…
Ser
vice
s -…
Efficiency
Additionally, companies using HP IDOL 10 see revenue increases and cost reductions
GSK – up to 1000% SY – up to 600%
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.27
British Ministry of Defence: Control Point * Largest global project for the handling of information containedin Sharepoints
* 400,000 users, +1billion documents (25K+ sites)
* A single search tool across all SharePoints
* Complete integration of a Records Management solution with the application of military security rules
* Replacement of the integral SharePoint search engine with the IDOL search facility
Search now based on concept and experience
Greatly increased performance and evolution of the platform
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.28
Stanford Children’s Health
• Ranked #1 in Northern California by U.S. News &
World Report survey of Best Children’s Hospitals
• Six centers of excellence - brain & behavior, cancer,
heart, pregnancy & newborn, pulmonary and
transplant.
• Building the country’s most technologically advanced,
family-friendly and environmentally sustainable
hospital for children and pregnant moms, to open in
December 2016.
Challenges:
• Quality and clinical effectiveness research
on ~115K patients, ~390K encounters,
~3M documents
• Diverse data types (structured and
unstructured) across data silos involved
• Time constraints vs extensive search
scope
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.29
Social Media Analytics at speed of business
NASCAR’s digital command center
powered by HP Haven
• Live monitoring of audience’s social
media interactions
• Real-time data analysis to uncover
broadcast content enhancement
opportunities
• Take immediate actions to capture fast
breaking incidents (e.g. auto parts
from crash landed in audience stands)
to deliver rich viewing experience
Click here to view customer testimonial in YouTube
https://www.youtube.com/watch?v=2gltOlBGWFw
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.30
NASCAR Demonstration
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.31
Operational Efficiency / Records Management
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.32
State of Most OrganizationsGRC — state of the organization
Source: Open Compliance & Ethics Group
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.33
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.34
Current State – Dark Data is Everywhere
Time
Operational Data
Redundant / Obsolete
Trivial
Time
Data volume
Business relevance
CostRisk
Data
volu
me
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.35
Potential Architecture for enhanced Corporate Fraud management
Connector Framework
IM Voice
Understand Meaning
Classification
Govern
Records Management
DatabaseArchiving
Compliance Policy Authority
Front OfficeCompliance
Record
Files
Archive
ReviewManage Report
Unstructured
Application
Scan/Fax
Structured
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.36
UK Parliament - UK Democracy Live Service
Search Topic or word spoken on audio/video coverage
• Speech Recognition,
• Transcript generation and alignment,
• Indexing,
• Search
http://www.bbc.co.uk/democracylive/
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.37
HP Safe Cities Solution in action – Auckland Transport
• Deployment Environment -
• Ingest data from 2,000+ CCTV cameras in Auckland
• View network of road and environmental sensors
• Social media trending, broadcast monitoring, and real time web news
• Scene analysis and license plate recognition
This is a rolling (up to 3 year) roadmap and is subject to change without notice
Improving public safety by detecting high-risk activities and investigating threats
– Results:
- Improve safety for pedestrians, cyclists and motorists;
- Optimise traffic flows through the City of Auckland;
- Tackle inefficiencies by creating a single unified layer across all data silos;
- Gather statistical information for analysis and transport planning;
- Be predictive instead of reactive;
- Enforce traffic laws and reduce violations;
- Generate new revenue streams.
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.38
Corporate Governance challenges
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.39
• Corporate Governance monitoring and enforcement
• Social media monitoring - internal & external where permitted
• Ability to freeze data across a complex IT legacy architecture
• Cross-media visibility and comprehension
• De-duplication, clustering and synthesis of mass data
• Necessity to respect national and international data privacy standards
• Fast and effective response to the Business eg. “De-risking strategies”
Internal challenges
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.40
External increasing regulatory powers: EMEARule / Regulation A/K/A Summary
Bribery Act 2011 BA UK Worldwide sanctions by UK Serious Fraud Office – including fines and jail for condoning senior management
Spanish Criminal Code anti-Bribery Law 13 March 2014
SBL Worldwide sanctions by Spanish courts now with jurisdiction outside Spain for allegations against a Spanish citizen / habitual Spanish resident, employee of Spanish firm
EU Competition Law ECL Anti-trust raid, investigation, sanctions with Spanish Police support for suspected anti-competitive behavior bay Spanish entities – with sanctions up to 10% of annual sales.
Market Abuse Directive updated April 2014 – effective June 2014
MAD Aligns MAD with Markets in Financial Instruments Directive includes market manipulation of spot commodity contracts, market abuse in Algorithmic & High Frequency Trading and Insider Information planning breach
European Markets Infrastructure Regulation
EMIR Governance of OTC derivatives for timely risk mitigation, reconciliation and reporting etc updated May 2014
Data Protection Regulation –approved 11 March 2014 by EU Parliament
DPR Update of the 1995 Regulation requiring higher standards of data privacy, the right to be forgotten as well as new corporate enforcement in the light of reasonably justified compliance breach – expected effective 2015
FCA Dealing Room Audio Records Management November 20122
DRAR Mandatory capture of all mobile device traffic effecting trades on UK dealing floors and retention for 3 years – so “Constructive Knowledge” of content
Basel III – introduction 2014-2018 BaselIII
Capital adequacy, stress testing and market liquidity risk priorities including additional capital buffers and increase in minimum leverage rate
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.41
• Regulators have heightened demands
• Regulations based on what something MEANS
• Complexity of information increasing
– Multichannel
– Audio
– Social Media
• Clear trend to regulate, investigate,
and govern interactions as opposed
to just documents
• The Regulators have the investigative tools needed
Compliance
EMIR, Dodd-Frank, MiFID, Bribery Act, FATCA, EU Anti-trust etc……..
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.42
EU Parliament & Council Draft 4th Directive on
money-laundering and terrorist financing: April
2015
(19) New technologies provide time-effective and cost-effective solutions to businesses and to customers and should therefore be taken into account when evaluating risk. The competent authorities and obliged entities should be proactive in combating new and innovative ways of money laundering.
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.43
Major trends transforming Information Governance
Content explosionTraditional processes break down in an era of content explosion and rich formats
1How can I exert control to meet compliance requirements AND make use of information to improve productivity and inform better decisions?
SharePointGoverning, capturing, managing while preserving collaboration
3 How do I manage for control, compliance and cost and leverage my investment at the same time?
Compliance pressuresNew regulation increasing cost and risk requiringmanaged retention, defensible disposition
2How do I comply with new regulations cost effectively and keep and maintain information in a secure repository as required?
ChallengeIndustry trends
Structured Content as a RecordRows and columns as records4
How can my repository capture and manage structured content in support of application retirement and records requirements?
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.44
Building blocks of a sound defensive systemPolicy driven management of all enterprise data
Establish clear control for creating, accessing, retaining and disposing of information
Meet compliance, regulatory and organizational requirements
Manage for cost
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.45
Technical building blocks appropriate to defence
Connectivity – can you even technically access what data exists across a complex IT architecture?
Records Management – what timely visibility do you have of historic and real-time data?
Data complexity – how do you deal with volumes, languages and audio / visual / alphanumeric data?
Understanding – how do you rapidly identify the key issues from mass data?
Policy standards – how can these be practically enforced?
Forensics – who’s talking to who / message chains / “triangulation” / Clustering results for Early Case Assessment
Corporate Fraud monitoring
What technical components are required for effective surveillance?:
• Social Media Data Handling (Facebook, LinkedIn & Twitter)
• Message Sampling
• Pre-review
• User Administration
• Workflows (Route and edit communications)
• Notifications Administration (Scheduled reporting)
• Case Administration (Create customised cases)
• Custom Reporting
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.47
Defensibility: Supervision & Litigation
preparedness
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.48
Limitations of the Human Firewall!
Supervision – Traditional approachBusiness Need:
• Ensure supervision and oversight of electronic communications
Traditional Shortcomings:
• Inability to process and monitor large volumes of communications
• Lack of access to all data content and sources for investigation
• Unacceptable amount of false positives
Business Impact:
• Non-compliance with oversight requirements
• Higher costs to review communications
Social Media Video Audio
Transactional Data Documents
Email Texts Mobile
IT/OTImagesSearch Engine
Supervision – with Digital Safe and Consolidated Archive
Business Need:
• Ensure supervision and oversight of electronic communications
Advantages:
• Ability to process the messaging volumes of the largest companies
• Access to virtually data types and sources
• Deployed and supported by industry experts
• Used by top compliance departments
• Combined supervision and surveillance
• Proof of communication supervision
• Business and regulatory reporting / retention
Business Benefits:
• Meet all oversight requirements
• Increase data scalability
• Reduce risk
IM Voice
Email Social Media
Supervision
Scanned messages captured by policy and sent to the database for review
SurveillanceArchived messages indexed and available for investigations
HP Supervisor
Empowering Compliance
Audit and Reporting Platform
Self-service
Automated provisioning
Full ‘tech-free’ administration
Sampling
Any message type at any percentage and
direction
Risk-based intelligence by group/division
Supervision
Over 80 configurable filters
Reduce irrelevant noise by 40+%
Surveillance
Intelligent searching of all archived
messages
‘eDiscovery’ for compliance officers
Subject matter expertise
Custom designed systems
Custom-built risk filters
Supervisor - Use CasesKey Drivers for solution Key Benefits of solution
Accessing Archived Content • Instant access to content in time-sensitive situations
Performing Risk-Based Sampling • Granularity provides relevant data
Scan Communications for Risk • Policy-based searching provides targeted results
Perform Ad Hoc Search Investigations • Instant investigatory search access across configurable data storage range
Utilize Customized Reporting For Proof of Review and Productivity
• Customizable and relevant reporting provides accurateand concrete data needed for regulators and management
Met Police monitors social media to enhance intelligence and security• Objective• Better understand and use social media during London
Olympics to improve police operations
• Determine new community influencers and gather early insight into relevant issues
• Create more effective community engagement and derive accurate analysis of social media sentiment
• Solution• Process 2.3M+ tweets/day (3.3M during Opening
Ceremony)• Ingest feeds from 22 sources, with an emphasis on
international, national and local news feeds and local blogs
• Track community news updates
• Results• Identified a connection between two
intelligence targets that had not been known previously
• Ensured proportionate and appropriate operational response to highly-sensitive community events
• Identified several, unknown, potential witnesses to a fatal stabbing
• Forwarded-on local tweets concerning community incidents, and responded to erroneous tweets
• Helped build a glossary terms to be used to cross-search data
Sparky GuardianAs kids and social media become
increasingly inseparable, parents have a
daunting task of mitigating the risk of
cyberbullying in the face of massive data
volumes. Early detection of damaging
behaviors is critical. Sparky uses sentiment
analysis and conceptual search powered
by HP IDOL OnDemand to identify
aggression, violence or harassment
happening in kids' social networks. So,
parents can help nurture a positive climate
for kids to enjoy and flourish in social
media
Mapped security
• Fully integrated Kerberos authentication together with Secure Socket Layer (SSL) encryption across all transactions
• Compliance with all major Security Standards, including US DoD5015.2, UK TNA2002, Australia’s VERS, ISO 15489
• Full-range of customizable security functionality:
• Discretionary access control (ACL based)
• Mandatory access control (Based on metadata)
• Kerberized access to IDOL
• SSO authentication using Windows Active Directory
Single supplier to US
Department of Homeland
Security
Department of Homeland Security - Requires
extremely precise handling of foreign languages,
including Chinese and Arabic
Open V – China’s largest online video website
Stop Terrorists Identify patterns in vast
amounts of data to
anticipate terrorist
activities
Case Study: German Bank LIBOR fixing
• Challenge: In 6 months be able to answer BAFIN questions arising from a LIBOR fixing investigation
• Requirements:
• Data Volume: 1.18 TB – some 20 million in E-mail and Bloomberg chat format
• Custodians to examine: 27-30
• Licences for bank legal: 20
• Location: UK, Germany, USA
• Solution: Software as a Service = HP Autonomy hosted delivery = HP eDiscovery
• Electronic Data Discovery – ingestion & culling
• Early Case Assessment: Analysis, MBC Coding, classification – Weeks 6-12
• Document Review: Weeks 7-23
• Document production for Regulators: Weeks 10-24
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.59
Forensic Solution deliverables
Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.60
Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.61 Copyright © 2013 HP Autonomy. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.
Corporate Fraud forensic challenges
• Timeframes are often very tight
• Must locate, access and manage all enterprise data, often across silos
• Review and automated analysis of forensically-captured digital-device data.
• Unique Rich and Social Media Processing, including Audio
• Potential issue of multi-party and multilingual cases
• Must avoid risk and costs associated with handing off client data between systems
• Evidential supporting information
Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.62 Copyright © 2013 HP Autonomy. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.
Unique capabilities:
- One platform
- Process 1000 data formats across silos, including audio
- 100+ languages
- Applying Legal Hold effectively
- Avoiding tipping off
- Document meaning and conceptual query
- Clustering, Link Maps, Message tracer
- Auto-Categorization, bulk coding
- Coding (quality check) and speed tagging
Corporate Fraud usage of eDiscovery platforms
Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.63
The legal hold challenge
All companies must comply
• Common law and civil procedures
• FRCP, CPR
Increasing risk and costs
• Identify, preserve, collect, monitor, track
• Tougher sanctions for failure to comply
Few are prepared
• Most still use manual methods and spreadsheets…
• Vast amounts of data including email, PSTs, audio, social media and video files
“The courts have a right to expect that litigants and counsel will take the necessary steps to ensure that relevant records are preserved when litigation is reasonably anticipated…”
Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.64
Autonomy Legal Hold: notification, preservation and collection
Manages the complete legal hold lifecycle
• Notifications and Interviews through to preservation, collection, release and disposition
• Systemized, repeatable and auditable process
• The first and only solution to preserve and collect from laptops offline.
• The only policy-based preservation and collection for legal holds across enterprise data sources
• Preserve-in-place
• Disposition and relief notification
– Release holds upon termination of matter
– Resume normal document retention/destruction policy
Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.65
Dramatically accelerate the most-costly component of eDiscovery
Document review
Increase efficiency by understanding meaningUtilize IDOL’s conceptual technologies to efficiently understand document meaning regardless of type or language
Accelerate review with predictive technologyLeverage advanced analytics that improve review speed, the # of documents to review and increase accuracy
Match the right workflow to each unique matterAvoid being forced into one single workflow for every legal matter with a wide range of Technology-Assisted Review alternatives
Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.66
Technology-assisted review
Technology-assisted review• Automatically generate Work Product Analytics to
accelerate document culling and review
• Accomplish what was once impossible: reviews that are both less expensive and more accurate
Advanced analytics• Establish a defensible, auditable search process
• Quickly develop case strategy and rapidly cull documents for review
• Better preparation and strategy for “Meet and Confer”
Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.67
JPMCJPMC needed to comply with government requirements and manage structured and unstructured data in the systems of acquired financial institutions
Chose Autonomy’s end-to-end platform for our secure long-term archive environment that supports legal hold and sophisticated eDiscovery operations
ChallengeSecure, index, analyze, collect, archive, and hold all data types that could be relevant to regulators and litigants
• Locate and collect data from 71,000 work stations and file servers and 2,500 backup tapes• Effectively pre-cull and deduplicate 500TB of data• Complete the initial processing of 10,000 priority workstations within 30 days• Process over 2.8TB every 24 hours for 180 days by December 31, 2009
ROIBuilt a defensible, end-to-end solution including Digital Safe, Autonomy Legal Hold, ECA, and Introspect
• Experienced over 50% savings over historical costs with automated analytical tools
Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.68
Matheson Ormsby PrenticeInternational and financial legal firm based in Ireland
* CHALLENGE: During litigation surrounding the Bernie Madoff investment scandal, MOP found that their legacy eDiscovery suite could not handle the scale of information required for the case
SOLUTION: Implemented HP Autonomy eDiscovery solution in place – one of the first law firms to do so – without the need to migrate their existing data stores
* Implemented Autonomy Early Case Assessment
* Installed Autonomy WorkSite (document management)
EXECUTION: MOP chose to run a proof of concept, comparing manual review against review using Autonomy’s software, for 2,000 faxes.
• Manual review took 2 weeks
• Autonomy’s solution took 2 hours
Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.69
Challenge: Although losing €4.2bn in trading – was Jerome Kerviel acting alone? He produced email traffic to imply that he was part of a team within the Bank’s Trading Floor.
Issue
How to prove whether such a team existed or whether Kerviel was inventing the email traffic?
Sanction:
Client and investor reputational credibility & extended time before resolution
Regulatory sanctions as to effective corporate governance
Technical issues:
Volume data in unstructured email format
Date in varieties of format – audio, visual and alphanumeric
Multiple external sources also to be accessed
All to be analysed at speed
Solution – provided to the Bank in New York:
Management in Place connectivity to diverse sources – proving he sent the emails to himself – so alone.
Collation, indexing, communications web. De-duplication and cluster via E Discovery solution
Apply Meaning Based Computing engine for Early Case Assessment
Societe Generale – Rogue Trader
Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.70
Challenge: Prove to the Obama administration that their testimony as to state of knowledge about the rig construction and operation was correct
Sanction: US$26 billion collateral at stake if they could not rapidly verify their evidence in 3 months
Technical issues:
Volume data going back 5 years
Date in varieties of format – Audio, Visual & Alphanumeric
Potential multiple language complexity
Diverse IT architecture within BP
Multiple external sources to be accessed
All to be analysed and cross-checked at speed
Solution:
Management in Place connectivity to diverse sources
Collation, Indexing, communications web, de-duplication and cluster
Apply Meaning Based Computing engine for Early Case Assessment
Worksite Document Management for workflow
BP – Gulf of Mexico
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.71
Forensic Solution deliverables
Demonstration
Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.72
Autonomy eDiscovery Solutions:
• Introspect
• Electronic Documents Discovery
• Early Case Assessment
• Legal Document Management
• Records Management
• Business Process Management
Regulator capabilities: The Serious Fraud Office
Autonomy from cradle to court, encompassing the complete EDRM lifecycle for the SFO
30 TB of seized ESI, collate, process, sift, cull and legally review
3 Months – a full deployment
1,000 different file formats from over 400 different repositories
“ The most immediate result of implementing Autonomy technology has been to reduce the time taken to get information from a hard drive from two to three weeks to three hours.”
Josh Ellis, CIO, Serious Fraud Office
Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.73
Conclusions• Human firewall is finite – technical support is
highly advisable
• The Regulators know technology is available –so sheer volume of data or cost of investment decreasingly acceptable
• Sound anti-corruption policy requires access to universal corporate records
• Data interrogation has to be automated
• Surveillance and monitoring by engines are possible
• In-house swift Compliance forensics can be justified as to cost, financial and reputational
• If you don’t engage, then tooled-up Regulators can
Copyright © 2012 Autonomy Inc., an HP Company. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.74
Q&AContact UsDavid Kemp
EMEA Business Development Manager
Hewlett-Packard Ltd
+44 (0) 7867 558 680