Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Network Systems Sales LLC
Selecting the Right Network Access Protection (NAP) Architecture Infrastructure Planning and Design Published: June 2008 Updated: November 2011.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
 Management has become a multi-faceted complex task involving:  Storage Management  Content Management  Document Management  Quota Management.
Centres of excellence and first choice for healthcare providers Digital Archival Program Neville Pinto Team Leader - Server & Storage Services.
Compliance, eDiscovery, Continuity and Migration made easy with SaaS Archiving Warren Roy, President & CEO, Global Relay.
OAISYS Public Safety Solutions Safeguarding Mission-Critical Communications.
ECM RFP 101 Presented by: Carol Mitchell C.M. Mitchell Consulting.
A Better Option for IT’s Data Management Challenge By Shaun Smale Solutions Consultant, BridgeHead Software.
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
Barracuda Backup Service Data Backup and Disaster Recovery.
© 2008 Kroll Ontrack Inc.| Ontrack PowerControls 5.1 The ultimate “power tool” for SharePoint administrators.
…your guide through terrain
MailMeter Over 2,000 installations worldwide Meet FRCP requirements SOX, GLBA, HIPAA, SEC, FINRA, BASEL II, FOI, etc. Avoid fines for failure to produce.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Agenda Symantec Enterprise Vault 1 Today’s Management Challenges 1 Why Management? 2 The Solution: Symantec Enterprise Vault 3 Benefits & Closing.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
1 From Filing Cabinet to Desktop and Network: Records Management in N.C. State Government Ed Southern Government Records Branch N.C. Office of Archives.
Why Compliance Legal and Regulatory requirements Organizational governance requests Internal and external threats Today’s Challenges Duplicate solutions.
1 Integrating ISA Server and Exchange Server. 2 How works.
© 2009 Kroll Ontrack Inc.| Ontrack PowerControls 6.0 for SharePoint™ A Better Way to Search and Restore.
AIIM Presentation Selecting and Implementing A Records Management System June 5, 2008.
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
management “A Gen-i Perspective” Paul McTaggart - ECM Practice Manager.
COEN 252 Computer Forensics
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
Creating an Effective Policy Central Missouri Chapter Jesse Wilkins April 16, 2009.
1 Solving the records management problem A cloud-computing approach to archiving Amanda Kleha Product Marketing, Google May 20, 2008.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
Archiving Where did I put that mail?. Business criticity Importance to manage : –Authenticity –Integrity –Perennity –Compliance High TCO of mail.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Module 9 Configuring Messaging Policy and Compliance.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Barracuda Message Archiver. Integrated hardware and software Archiving and policy management Search and retrieval Internal storage and support for external.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Module 9 Configuring Messaging Policy and Compliance.
Archiving and Record Retention Service Cammy Webster Assistant Director - CSD DIS Jan 23, 2007.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Surviving eDiscovery: Technology Firm Perspective  Robert A. Cruz Sr. Director, eDiscovery Solutions, Proofpoint, Inc.
E-records and the law John D. Gregory Policy Division Ministry of the Attorney General May 14, 2007.
2.0 Blockchain Storage & Discovery. GROOVIX Introduction GROOVIX Compliant Cloud Service is a secure, data management and eDiscovery solution, designed.
Module 7 Planning and Deploying Messaging Compliance.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Archiving for E-Discovery and Retention Management Theodore S. Barassi, Esq. Group Product Manager E-Discovery and Information Risk.
Implementing Microsoft Exchange Online with Microsoft Office 365
Enterprise Archiving, Retention and Discovery System Jim Albert Deputy Director Department of Information Services April 19 th 2007.
Microsoft and Symantec
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Cloud Archive By: Kimberly Nolan. What it is?  The goal of a cloud archiving service is to provide a data storage (ex. Google drive and SkyDrive) as.
INTRODUCTION  netCORE offers 360 degree digital communication solutions Messaging and Mobility  Pioneers in Linux based mailing solution and catering.
Place image here INFORMATION MANAGEMENT Cloud Computing and Enterprise Information Management March 2010 Jim Cuff VP Strategy, Iron Mountain Digital.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Prepare, Migrate, and Operate with Barracuda. Who is Barracuda Networks? NYSE: CUDA Founded in 2003, IPO 2013 Headquartered in Silicon Valley, offices.
1 One-stop shopping for time series data David Williams (London), Thomas Araujo (Houston) & Stuart Reed (London)
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Working at a Small-to-Medium Business or ISP – Chapter 8
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
PLANNING A SECURE BASELINE INSTALLATION
Comodo Dome Data Protection
06 | SQL Server and the Cloud
Presentation transcript:

Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009

MANAGEMENT TECHNOLOGIES 2

Messaging system Not built to store massive amounts of messages –And attachments –And manage as records Difficult to search across inboxes –Discovery, auditing 3

Print & file Common approach Challenges: –Loss of metadata –Attachments –Typical threaded message –Volume to print and to file –Authenticity (phishing) 4

Backup tapes Archival vs. backup Backups store data, not files or messages Multiple copies of data Readability of older tapes –Format, media, hardware 5

management applications Move messages out of the messaging application May provide simple retention management –But NOT records management solutions Many different capabilities available 6

archiving Copy or remove messages from messaging application store to other storage Enforce rules for archiving based on age, size, user, or mailbox quotas Enable centralized message capture and management 7

compliance Provide compliance functionality for specific requirements –HIPAA, S-OX, etc. Message monitoring and notification Message auditing Incident and case management 8

discovery Provide litigation hold for messaging system Message search, review, and production Evidence preservation Annotation and redaction Case management 9

Encryption and digital signatures Encryption solutions encrypt messages from - and sometimes within - the organization Digital signature solutions used to sign messages from the organization Generally managed centrally 10

security Designed to protect the organization from external threats May provide attachment blocking and filtering May protect against directory harvest attacks May provide spam blocking 11

Personal archive management Search the network to find.pst files Extract messages and moves them into the archive May also leave.pst files in place but note location and index their contents Often provide single-instance storage and de-duplication Enforce policies for.pst files 12

Policy management Provide enforcement of policies and procedures –Ethical walls –Content filtering –Attachment filtering May also provide audit trails for actions taken 13

ECRM solutions Most systems support management May run at server or client Many support single-instance storage May allow declaration, management of messages as records Varying support for attachment management, metadata management 14

MANAGEMENT IMPLEMENTATION MODELS 15

Implementation models The solutions listed earlier use a number of different implementation models –Appliance –Application server –Hosted –Client/plug-in Some providers offer several implementation models 16

Appliance-based solutions The solution is pre-installed on a server Connected to the network and the messaging application Fairly common approach for security and archiving Database considerations 17

Appliance considerations Benefits: No need for separate hardware Minimal need to configure system Drawbacks: May not be robust enough Hardware may not be upgradable May only work with certain platforms 18

Application server The solution is installed on a server on the network and connected to the messaging application Most common approach today May require RDBMS Solution may need to be installed on the messaging application server –BAD! 19

Application server considerations Benefits: Hardware can be upgraded to meet solution requirements Wide choice of hardware to choose from Drawbacks: Requires dedicated hardware and configuration May only work on certain platforms 20

Hosted solutions Solution is provisioned by a third party Highly available and scalable Subscription-based pricing 21

Hosted solution benefits The organization can purchase only as much as is needed Someone else has responsibility for backup, configuration, security Generally platform-independent May reduce internal network traffic 22

Hosted solution drawbacks Cultural considerations Reliability issues Vendor stability Discovery issues Migration considerations 23

Client/plug-in Solution is installed on users’ machines, either as stand-alone application or plug-in Most solutions can be deployed using scripts or policy objects; some must be installed manually Client applications run separately; plug-ins are integrated into the client 24

Client benefits and drawbacks Benefits: Only deploy to users who require it Drawbacks: Decentralized deployment and usage can be difficult to manage May require specific configurations, clients, security settings, etc. Leaves it under control of the user 25

SELECTING THE RIGHT SOLUTION FOR YOU 26

Who is involved in the selection? IT –Own the existing messaging application –Installation and configuration of system –Support for system Records management –Understand recordkeeping and compliance requirements Legal –Understand litigation support requirements 27

Determine the goal of the solution(s) What are the problems to be addressed? –Operational efficiency (user-focused) –Storage/management costs –Security/compliance Prioritize among the issues to be addressed and proposed solutions 28

Gather requirements Gather, identify, and validate requirements Business requirements –The problem(s) to be addressed Functional requirements –What type of functionality will solve the problem(s)? Technical requirements 29

Research Research the available solutions –Vendor resources –Trade publications –Conferences –Associations –Consultants and analyst firms –Standards and guidelines 30

The short list Determine the vendors to consider Narrow the list based on the messaging applications and platforms supported, key functionality, and deployment models Invite remaining vendors to provide demonstrations, references, and pilots 31

Select the solution Cost should be a factor but not the most important criteria –Pricing is not the same as cost Select the solution that most closely matches organization’s requirements Select a vendor you can work with and that is committed to the relationship 32

Summary management technologies can assist in managing better –But they are not records management solutions Requirements are a key part of the discussion Solution should be selected by IT, RM, legal 33

Questions? 34