We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byBrendon Cupps
Modified over 2 years ago
Files Matter … to Users and Administrators
Files Matter … IT Directors and Administrators
© Novell, Inc. All rights reserved. 3 Trending Now Data management shift from ugly stepchild to pillar of operations especially in financial organizations Majority of IT organizations are understaffed in the number of people they have on hand to manage data governance, while the number of sensitive documents and the requests to access that information appear to be increasing exponentially. Majority of IT organizations are overwhelmed when it comes to managing requests for access, depend too much on manual systems to manage the process, and dont really know who in the organization should have access to what type of information." A huge percentage of employees have access to information they dont need for their roles in the company, thus introducing unnecessary risks in terms of how that data can either be accidentally or purposely compromised
© Novell, Inc. All rights reserved. 4 Data Governance Data Loss Prevention Manage, monitor access Access based on role Enforce policies consistently Employee role changes Out of scope entitlements Evidence of compliance Data at rest Data in use Data identification File Management Find Govern Relocate
© Novell, Inc. All rights reserved. 5 Find – Novell ® File Reporter What does it do? Data Loss Prevention Data Governance NFR: Get a handle on What you have Data in Use Data at Rest What, who, and where Department, Line of Business Unstructured data: Novell, Microsoft, Linux Find, Identify and Track Description: Inventories file systems, delivers detailed storage intelligence so you can optimize your environment for efficiency, and compliance.
© Novell, Inc. All rights reserved. 6 Storage Resource Reports Summary Access Date Modified Date File Extension Duplicate Owner Storage Costs Novell File Reporter v2.0 Web Console: Cross Empire Storage Resource Reports Security Based Reports Notifications Novell ® File Reporter: Find, Identify, Track Data in Use, Data at Rest
© Novell, Inc. All rights reserved. 7 For a Given User, Group: Current access rights Inherited via Path or Volume Multiple storage resources Object Security Reports Novell ® File Reporter: Find, Identify, Track Data in Use, Data at Rest
© Novell, Inc. All rights reserved. 8 Novell ® File Reporter: Find, Identify, Track Data in Use, Data at Rest For a Given Path, Volume: List Trustees (User, Group, Container) Access rights Inherited from Path Security Reports
© Novell, Inc. All rights reserved. 9 Novell ® File Reporter: Find, Identify, Track Data in Use, Data at Rest Visual Improvements Enhanced Graphical Reports: Storage Resources Object Security Path Security
© Novell, Inc. All rights reserved. 10 Govern – Novell ® Storage Manger What does it do? NSM: Identity and Data Meet ZEN for your File systems Identity & Storage Relationship Novell or Microsoft Environments IdentityData Description: Automates the complete life cycle management of user and group file storage. Implement Access Governance over your existing unstructured data Event Driven Policy Data Governance Data Loss Prevention
© Novell, Inc. All rights reserved. 11 Ensure Data Governance Vault Files Automate transfers, moves, and renames Provision, manage and enforce file rights and ownership File grooming Role based access (users, groups) Employee role changes; address out of scope entitlements Manage quota Home Folder Profile Path Additional File Resources Remote Desktop Groups & Projects Application Paths, VDI Resources Policies provide consistent file access Remediate out of compliant file access
© Novell, Inc. All rights reserved. 12 Relocate – Novell ® Dynamic File Service What does it do? NDFS: Capability Tier or Archive data On-Prem, cloud Storage vendor agnostic Description: Software based file tiering and archiving. Policy controls file storage relocation. Working at the file system level to optimize file storage resources. Data at Rest Data Governance Data Loss Prevention Note: Novell Dynamic File Services is for Windows environments only. Similar functionality is included in OES as Dynamic Storage Technology (DST)
© Novell, Inc. All rights reserved. 13 DLP: Data at Rest Challenges Corporate Data Centers Servers and File Storage 80% unstructured data 60% CAGR Information rot problem – 41 % Active Frequent Access – 21% Active Non-Frequent Access – 18% Inactive Obsolete – 19% Dont Know: Dark Data How do you? – Identify – Restore – Remind What to move, hold, and discard?
© Novell, Inc. All rights reserved. 14 DLP: Managing Data at Rest Admin UI Create policies Define targets (pairs) Create schedules, reviews Usage reports Identify Data Age, size, type, ownership File Contents Custom filter Tier Files On-Prem User access: merged view No stubs Archive Files On-Prem, cloud Reviewers: access, restore, discard NAS, SAN, iSCSI Storage vendor agnostic , Twitter Event driven Web console review: hold, restore, discard, track Notify, Remind, Review
© Novell, Inc. All rights reserved. 15 Files Matter – Whats the Situation? Upgrading NetWare to OES Migration Identity management meets file systems Deal with high turnover Archive: Target what you need to keep and for how long Audit Failures: You dont know who has access, lack resources to enforce Assessment Time: What files are you hosting? Who has access, and where? Find Govern Relocate
© Novell, Inc. All rights reserved. 17 Identity Management Meets File Systems Problems: The customer is implementing an Identity Management Solution to automate provisioning and de-provisioning access to systems Wants to ensure the consistent provisioning and management of resources Wants to reduce costs in the provisioning of resources They want to extend that automation to the File system Solution: Novell ® Storage Manager – Connects file system to IDM processes (independent of IDM vendor) – Manages and enforces access based on Role for user and group/shared data – Consistently applies access policies – Reduces human errors – Remediates existing access controls
© Novell, Inc. All rights reserved. 18 Deal with High Turnover/Relocation Problems: The customer has high turnover in users (school, call-center, temp agency, etc) The customer needs to relocate data (role change, personnel transfers, vault on termination) The burden of managing all of these account changes is too high Looking to cut costs associated with administration Solution: Novell Storage Manager – Manage and enforce access – Automate organizational policies for managing user and group/shared storage – Consistently applies access policies – Overcomes network problems to get the job done – Works in the background, reducing staff overtime
© Novell, Inc. All rights reserved. 19 Audit Failures You dont know who has access and lack resources to enforce Problems: The customer deals with regulatory compliance (HIPAA, SOX, etc.) and, has too many people managing the file system. Regulatory compliance demands they: Remediate out of compliance file system access rights Manage and enforce consistent access to file systems Prove consistent application and enforcement of rights Solution: Novell Storage Manager – Remediates existing access controls – Manages and enforces role-based access to user and group/shared storage – Proves consistent application of access policies Novell File Reporter – Identifies: What, Who, and Where – Provides usage metrics and security reports: across the department and LOB – Works with unstructured data: Novell, Microsoft, Linux
© Novell, Inc. All rights reserved. 20 Upgrading NetWare to OES Problems: The customer has accumulated terabytes of data over the years and wants to minimize system upgrade costs. However, they dont know where to start, because they: Are concerned about years of accumulated, inconsistent access rights Face sensitive data location issues Feel that migrating obsolete or inappropriate data is a waste of time Solution: Novell File Reporter – Identifies: What, Who, and Where – Provides usage metrics and security reports: across the department and LOB – Works with unstructured data: Novell, Microsoft, Linux Novell Storage Manager – Enforce consistent access policies on OES – Restructures the data before/after the move – Vaults obsolete or inappropriate data for risk management reviews
© Novell, Inc. All rights reserved. 21 Assessment Time: What files are you hosting? Who has access to them, and where? Problems: The customer has too many files, adding to backup times and management cost. They want to understand: – What type of files they have – Who owns them – Where they are located – When was the last time they were accessed or modified – Are they critical to the success of the organization Solution: Novell File Reporter – Identifies: What, who, and where – Usage metrics – Security reports – Across the department, or LOB – Unstructured data: Novell, Microsoft, Linux
© Novell, Inc. All rights reserved. 22 Migrating to Windows Problems: The customer wants to migrate file system data to Windows; however, they: – Need to transfer access right assignments along with the data – Dont clearly understand the data or associated rights – Dont want a throw-away tool Solution: Novell File Reporter – Identifies: What, Who, and Where – Provides usage metrics and security reports: across a department and LOB – Works with unstructured data: Novell, Microsoft, Linux Novell Storage Manager – Performs data migration via Cross-Empire Data Migration subsystem – Converts Novell trustee assignments to Microsoft rights assignments – Provides consistent access rights and management via policies moving forward – Cheaper than competing throw-away tools
© Novell, Inc. All rights reserved. 23 Archive: Target what you need to keep and for how long Problems: Over time, the customer has accumulated too much data, and regulatory policies demand a data hold. In addition, the customer wants to simplify backups by: Stopping the backup everything approach Reducing the amount of data backed up daily Dramatically shortening time needed to backup data Solution: Novell Dynamic File Services – Works with Data at Rest: Automate tiering, archive and retention, notify – Identify, move, and track what you need to keep, and for how long – On-Prem, or to the Cloud – Windows Infrastructures Only Dynamic Storage Technology – Data at Rest: Automate tiering – Novell Infrastructures (OES) – Available Only with OES
This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. Novell, Inc. may make improvements in or changes to the software described in this document at any time. Copyright © 2012 Novell, Inc. All rights reserved. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States. All third-party trademarks are the property of their respective owners.
Policy ACTIVE DATA Storage STALE DATA Storage User
Compliance Technology Solutions NASACT Presentation Material Robert Garagiola – AERS National Technology Practice January 31 st, 2007.
Managing IT Budgets in Uncertain Economic Times: IT Optimization.
1 Unified Communications and Collaboration Campaign MM TI-BDM Deck User Guidance Purpose of this deck: –Show how Microsoft ® Unified Communications and.
SharePoint Governance Questions January 2014 ©2014 SUSAN HANLEY LLC.
1 Services. 2 Agenda Overview –Managing the Transitions of The Networked Learning Environment Blackboard Consulting –Who We Are and What We Do Blackboard.
Results of AIWFC KM Assessment Conducted by Dr. Jill Powell 15 Aug 2012.
National Safety Compliance, Inc. …because safety is never an accident… Presentation works best if displayed on a computer with an active internet connection.
Tag line, tag line Operations Manager 4.0 Customer Strategic Presentation March 2010.
IBM Software Group Tivoli Software from IBM Storage Resource Management Webcast Tele-Rep Training Manual Prepared by: Wunderman Customer Dialogue Group.
Intelligent Risk Management & Compliance Cost Reduction Creating a sustainable risk and compliance organization while reducing inefficiency and improving.
1 A Cloud Reference Framework … for discussion only … Please send comments and suggestions to Bhumip Khasnabish Friday,
Copyright © 2005 SOA Software, Inc. All Rights Reserved. Specifications Subject to Change Without Notice. Overcoming the SOA Network Fallacy Roberto Medrano.
IT Security Auditing. Topics Defining IT Audit Risk Analysis Internal Controls Steps of an IT Audit Preparing to be Audited Auditing IT Applications Who.
MDM Strategies for the Global 10,000 Atul Patel Director MDM SAP Asia Pacific & Japan
Windows 2008 Active Directory Configuration – Week 4 of 6 Microsoft Test: Mark McCoy MCSE, CNE, CISSP.
Copyright 2011 John Wiley & Sons, Inc Business Data Communications and Networking 11th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
March Technical Documentation License Agreement (Standard) READ THIS! This is a legal agreement between Microsoft Corporation (“Microsoft”) and.
1 Implementation of Application Portfolio Management Overview July 2006.
1 ITIL in the Real World: Leveraging ITIL Best Practices for Service Improvement at NYU Presented by Ben Maddox, NYU Information Technology Services
EControl 2.x for Mixed Networks Web-based, ZERO-Rights User Account Management, Identity Administration and User Provisioning and EMU for eDirectory and.
IBM Software Group Tivoli Software from IBM Storage Data Protection Solution Seminar Tele-Rep Training Manual Internal Document Prepared by: Wunderman.
Implementing Business Driven Information Management Practices From Policy to Metadata.
John Clark COO, PCI Security and Compliance CCIA Fall Meeting – 7 th October 2011.
2 Welcome To Defect Management Training Objective: The objective of this course is to learn about standards that emphasize a best practice approach for.
Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 14-1 MANAGING INFORMATION TECHNOLOGY 7 th EDITION CHAPTER 14 INFORMATION SECURITY.
® IBM Software Group © 2008 IBM Corporation A new feature providing mainframe development flexibility David Myers Rational Developer for System z Product.
Business Value of IT Outsourcing Gopal Kuchibhotla 8 th February 2006.
© 2016 SlidePlayer.com Inc. All rights reserved.