Trusted Edge - Information Governance
description
Transcript of Trusted Edge - Information Governance
Policy-driven control of unstructured desktop information
Information Classification Engine
(ICE)
© 2009 FileTek, Inc. All rights reserved.
FileTek, Inc. is a premier provider of large-scale data management and information governance solutions, enabling organizations, worldwideand across multiple industry segments,to efficiently manage, rapidly access,and effectively govern their ever-growing volume of enterprise data.
Global 2000 customers include the Met Office, The National Archives of the UK, Citigroup, Union Bank of California, Edward Jones and AT&T.
About FileTek
Slide 2© 2009 FileTek, Inc. All rights reserved.
Content proliferation everywhere – on workstations, laptops, and file shares
Difficulty defining and implementing effective records management policies and retention schedules
Escalating cost of data ownership – storage, eDiscovery, and compliance management
User reluctance to adopt records management tools and participate in the process
Managing Content is Like Herding Cats
Slide 3© 2009 FileTek, Inc. All rights reserved.
Content at the "Edge" –The Final Frontier
Slide 4© 2009 FileTek, Inc. All rights reserved.
The last mile for records management
Exponential growth of unstructured content
Problem area for litigation preparedness
Are you prepared?"No one wants to be the next Morgan Stanley." George Socha, Jr.
Legal hold notice alone is not reasonable.NTL, Inc. SEC Lit. (SDNY 2007)“There is a
perfect storm brewing in the sea of discovery. “National Law Journal 9/4/08
Slide 5© 2009 FileTek, Inc. All rights reserved.
Provides Information GovernanceWhere Organizations are Most Vulnerable –
at the Network’s “Edge”
Trusted Edge®
Information Classification Engine
Slide 6© 2009 FileTek, Inc. All rights reserved.
ComplianceRetention
Disposition
Proactive eDiscovery
Trusted Edge Compliance
Slide 7© 2009 FileTek, Inc. All rights reserved.
Initiates compliance support at record creation, including record declaration and classification
Files records automatically in the repository of record
Extends full compliancesupport to offline users
Assigns retention categories automatically
Maps retention assignments to existing policy schema
Trusted Edge Retention
Slide 8© 2009 FileTek, Inc. All rights reserved.
3-years
1-year
6-mos
Enforces disposition to convenience copies on desktops, laptop, file shares, and secondary repositories
Meets DOD 5015 standards Mitigates “smoking gun” risk Automatically suspends disposition
during a litigation hold
Slide 9© 2009 FileTek, Inc. All rights reserved.
Trusted Edge Deletion
Proactively culls irrelevant content Applies Litigation Hold to the “Edge” Provides asset ID tagging,
comprehensive metadata, and reporting
Supports a forensically sound presentation
Trusted Edge Proactive eDiscovery
Slide 10© 2009 FileTek, Inc. All rights reserved.
Electronic Discovery Reference Model Background & Technology Perspectives
Internal
•IT audience
Inside firewall
•Compliance focus
•Internal software
External
•Legal audience
Outside firewall
•Production focus
•External software
Gap in the Model:
Trusted Edge helps organizations with:Information Management, Identification,
Preservation, and Collection.
Slide 11© 2009 FileTek, Inc. All rights reserved.
Legal Driven ToolsIT Driven Tools
Preserves investments in the existing infrastructure Does not impact end-user processes Creates a central “repository of record”
Problem: Islands of Information
Slide 12© 2009 FileTek, Inc. All rights reserved.
Repository X
Repository Y
Repository Z
Federated Storage
Accounting
Sales &Marketing
Human Resources
Where are the convenience copies?
Who owns them?
How can they be locked down or deleted according to policy?
IT Department
???? ??
?
Functional Diagram
Slide 13© 2009 FileTek, Inc. All rights reserved.
Trusted Edge Admin Server and Database (MS SQL Server or Oracle 9)
ECM RepositoryMS SharePointOpen Text LivelinkSymantec Enterprise Vault™IBM Content/Records ManagerWebDAV and file shares
Documents, Files, Emails
2
Metadata and Asset ID3
Workstations, LaptopsFile Shares
1Policies
EmailDocumentsFiles
4Identify Custodian and
Execute Legal Hold
Disposition
Trusted Edge Delivers ROIto the Enterprise
Dramatically reduces risk and eDiscovery costs
Increases productivity and automates the RM process
Improves efficiency and reduces storage costs
Proactively culls non-relevant information
Slide 14© 2009 FileTek, Inc. All rights reserved.
Compliance and Litigation
Support
Enterprise Content
Management
Intelligent Archiving
IntelligentStorage
1. Often, many critical files were never archived to the ECM repository.
2. At the same time, too many irrelevant files were archived.
3. Files created by mobile laptop users working offline were never uploaded.
4. Management felt ill-prepared for litigation and eDiscovery.
1. FinServ archived all critical files to their proper place in the ECM repository.
2. By classifying records at creation, FinServ proactively culled non-relevant data, thereby reducing storage and eDiscovery costs.
3. Trusted Edge captured files created by offline mobile users and automatically uploaded them on reconnect.
4. FinServ mitigated litigation risk and enhanced eDiscovery preparedness.
Success Story:Financial Services Co.
Slide 15© 2009 FileTek, Inc. All rights reserved.
1. Often, many critical files were never archived to the ECM repository.
2. At the same time, too many irrelevant files were archived.
3. Files created by mobile laptop users working offline were never uploaded.
4. Management felt ill-prepared for litigation and eDiscovery.
1. FinServ archived all critical files to their proper place in the ECM repository.
2. By classifying records at creation, FinServ proactively culled non-relevant data, thereby reducing storage and eDiscovery costs.
3. Trusted Edge captured files created by offline mobile users and automatically uploaded them on reconnect.
4. FinServ mitigated litigation risk and enhanced eDiscovery preparedness.
Problems Trusted Edge ICE Solution
Trusted Edge Benefits
Slide 16© 2009 FileTek, Inc. All rights reserved.
Extends centralized, policy-driven document control and legal hold management to all enterprise desktops, laptops, and workstations, whether network-connected or offline
Supports a federated storage architecture Empowers organizations to fulfill their legal obligation to
preserve critical content Proactively classifies, tags, and defines email and document
retention at creation Provides a holistic approach to compliance, retention,
disposition, and legal hold Delivers a cost-correct ROI with a proactive, best practices
approach to eDiscovery