Top Banner
cy-driven control of unstructured desktop information Information Classification Engine (ICE) © 2009 FileTek, Inc. All rights reserved.
16

Trusted Edge - Information Governance

Dec 05, 2014

Download

Business

jfxm3671

This presentation offers a glimpse into how Trusted Edge can Classify Email and Documents at the point of Creation and mitigate risk.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Trusted Edge - Information Governance

Policy-driven control of unstructured desktop information

Information Classification Engine

(ICE)

© 2009 FileTek, Inc. All rights reserved.

Page 2: Trusted Edge - Information Governance

FileTek, Inc. is a premier provider of large-scale data management and information governance solutions, enabling organizations, worldwideand across multiple industry segments,to efficiently manage, rapidly access,and effectively govern their ever-growing volume of enterprise data.

Global 2000 customers include the Met Office, The National Archives of the UK, Citigroup, Union Bank of California, Edward Jones and AT&T.

About FileTek

Slide 2© 2009 FileTek, Inc. All rights reserved.

Page 3: Trusted Edge - Information Governance

Content proliferation everywhere – on workstations, laptops, and file shares

Difficulty defining and implementing effective records management policies and retention schedules

Escalating cost of data ownership – storage, eDiscovery, and compliance management

User reluctance to adopt records management tools and participate in the process

Managing Content is Like Herding Cats

Slide 3© 2009 FileTek, Inc. All rights reserved.

Page 4: Trusted Edge - Information Governance

Content at the "Edge" –The Final Frontier

Slide 4© 2009 FileTek, Inc. All rights reserved.

The last mile for records management

Exponential growth of unstructured content

Problem area for litigation preparedness

Page 5: Trusted Edge - Information Governance

Are you prepared?"No one wants to be the next Morgan Stanley." George Socha, Jr.

Legal hold notice alone is not reasonable.NTL, Inc. SEC Lit. (SDNY 2007)“There is a

perfect storm brewing in the sea of discovery. “National Law Journal 9/4/08

Slide 5© 2009 FileTek, Inc. All rights reserved.

Page 6: Trusted Edge - Information Governance

Provides Information GovernanceWhere Organizations are Most Vulnerable –

at the Network’s “Edge”

Trusted Edge®

Information Classification Engine

Slide 6© 2009 FileTek, Inc. All rights reserved.

ComplianceRetention

Disposition

Proactive eDiscovery

Page 7: Trusted Edge - Information Governance

Trusted Edge Compliance

Slide 7© 2009 FileTek, Inc. All rights reserved.

Initiates compliance support at record creation, including record declaration and classification

Files records automatically in the repository of record

Extends full compliancesupport to offline users

Page 8: Trusted Edge - Information Governance

Assigns retention categories automatically

Maps retention assignments to existing policy schema

Trusted Edge Retention

Slide 8© 2009 FileTek, Inc. All rights reserved.

3-years

1-year

6-mos

Page 9: Trusted Edge - Information Governance

Enforces disposition to convenience copies on desktops, laptop, file shares, and secondary repositories

Meets DOD 5015 standards Mitigates “smoking gun” risk Automatically suspends disposition

during a litigation hold

Slide 9© 2009 FileTek, Inc. All rights reserved.

Trusted Edge Deletion

Page 10: Trusted Edge - Information Governance

Proactively culls irrelevant content Applies Litigation Hold to the “Edge” Provides asset ID tagging,

comprehensive metadata, and reporting

Supports a forensically sound presentation

Trusted Edge Proactive eDiscovery

Slide 10© 2009 FileTek, Inc. All rights reserved.

Page 11: Trusted Edge - Information Governance

Electronic Discovery Reference Model Background & Technology Perspectives

Internal

•IT audience

Inside firewall

•Compliance focus

•Internal software

External

•Legal audience

Outside firewall

•Production focus

•External software

Gap in the Model:

Trusted Edge helps organizations with:Information Management, Identification,

Preservation, and Collection.

Slide 11© 2009 FileTek, Inc. All rights reserved.

Legal Driven ToolsIT Driven Tools

Page 12: Trusted Edge - Information Governance

Preserves investments in the existing infrastructure Does not impact end-user processes Creates a central “repository of record”

Problem: Islands of Information

Slide 12© 2009 FileTek, Inc. All rights reserved.

Repository X

Repository Y

Repository Z

Federated Storage

Accounting

Sales &Marketing

Human Resources

Where are the convenience copies?

Who owns them?

How can they be locked down or deleted according to policy?

IT Department

???? ??

?

Page 13: Trusted Edge - Information Governance

Functional Diagram

Slide 13© 2009 FileTek, Inc. All rights reserved.

Trusted Edge Admin Server and Database (MS SQL Server or Oracle 9)

ECM RepositoryMS SharePointOpen Text LivelinkSymantec Enterprise Vault™IBM Content/Records ManagerWebDAV and file shares

Documents, Files, Emails

2

Metadata and Asset ID3

Workstations, LaptopsFile Shares

1Policies

EmailDocumentsFiles

4Identify Custodian and

Execute Legal Hold

Disposition

Page 14: Trusted Edge - Information Governance

Trusted Edge Delivers ROIto the Enterprise

Dramatically reduces risk and eDiscovery costs

Increases productivity and automates the RM process

Improves efficiency and reduces storage costs

Proactively culls non-relevant information

Slide 14© 2009 FileTek, Inc. All rights reserved.

Compliance and Litigation

Support

Enterprise Content

Management

Intelligent Archiving

IntelligentStorage

Page 15: Trusted Edge - Information Governance

1. Often, many critical files were never archived to the ECM repository.

2. At the same time, too many irrelevant files were archived.

3. Files created by mobile laptop users working offline were never uploaded.

4. Management felt ill-prepared for litigation and eDiscovery.

1. FinServ archived all critical files to their proper place in the ECM repository.

2. By classifying records at creation, FinServ proactively culled non-relevant data, thereby reducing storage and eDiscovery costs.

3. Trusted Edge captured files created by offline mobile users and automatically uploaded them on reconnect.

4. FinServ mitigated litigation risk and enhanced eDiscovery preparedness.

Success Story:Financial Services Co.

Slide 15© 2009 FileTek, Inc. All rights reserved.

1. Often, many critical files were never archived to the ECM repository.

2. At the same time, too many irrelevant files were archived.

3. Files created by mobile laptop users working offline were never uploaded.

4. Management felt ill-prepared for litigation and eDiscovery.

1. FinServ archived all critical files to their proper place in the ECM repository.

2. By classifying records at creation, FinServ proactively culled non-relevant data, thereby reducing storage and eDiscovery costs.

3. Trusted Edge captured files created by offline mobile users and automatically uploaded them on reconnect.

4. FinServ mitigated litigation risk and enhanced eDiscovery preparedness.

Problems Trusted Edge ICE Solution

Page 16: Trusted Edge - Information Governance

Trusted Edge Benefits

Slide 16© 2009 FileTek, Inc. All rights reserved.

Extends centralized, policy-driven document control and legal hold management to all enterprise desktops, laptops, and workstations, whether network-connected or offline

Supports a federated storage architecture Empowers organizations to fulfill their legal obligation to

preserve critical content Proactively classifies, tags, and defines email and document

retention at creation Provides a holistic approach to compliance, retention,

disposition, and legal hold Delivers a cost-correct ROI with a proactive, best practices

approach to eDiscovery