SES File Analytics and Data Profiling Webinar - 28th July

SES File Analytics and Data Profiling Webinar - 28th July

SES – ControlPoint Webinar

Advanced File Analytics and Data Profiling

Time & Date: 11:00 am (BST), 28th July 2020

Hosted By: Martin White – Technical Lead & Mark Ryan – Director of Sales.

Bringing Structure to Unstructured Data

Our webinar is intended to give you an insight into SES data management solution, which help organisations to face today's data and informational challenges. The event has been created and designed in response to the feedback that we have received from our existing customers. The session will cover a variety of subjects that will not only be of great interest, but high value to those involved in Data Management, IT Security, Policy Management and even Human Resources. In particular,

  • Locating and Accessing PII data
  • Managing Data Subject Access Requests
  • Migrating To The Cloud
  • Cleaning Up Legacy Data
  • Automating Records Declaration
  • Looking to Easily Control Your Data and Storage Estate

 Attendees will also be given an opportunity of seeing a live demonstration of "ControlPoint" and how it dramatically simplifies the management of unstructured data and enables organisations to become more agile and data-aware. The webinar presentation will be followed by a Q&A session with subject matter experts available to answer any questions.

To register to our event please follow the below link or contact me direct. Places are limited.

https://www.eventbrite.co.uk/e/ses-controlpoint-webinar-advanced-file-analytics-and-data-profiling-tickets-108989598824?aff=MailerWebsite

ControlPoint - Brief Overview

On average, 45% of data on primary storage can be classified as either Redundant, Obsolete or Trivial (ROT). Proactively managing this data and reducing the level of ROT, as you can imagine, has a significant impact on the effective utilisation of the IT infrastructure but also reduces the data management challenges and burdens placed on organisations.

No alt text provided for this image


Redundant Data consists of duplicates such as unauthorised copies of documents, emails, records, or database information residing in file shares, SharePoint sites, mail systems, and databases.

Obsolete Data consists of information that is no longer in use, or is out of date. When determining whether data is obsolete, you can identify its creation date, last modified date, or access date and then assess this information in conjunction with an appropriate retention policy.

Trivial Data is determined by file type, where the file type has no content value, such as executables, system files, and thumbnails.

Dark Data is the data that organisations may not know they have. This currently unmanaged, often unknown electronic content resides in various repositories across the organisation and is mostly human-readable, unstructured, unindexed, inactive, and orphaned. Proliferation of dark data can result from bring your own device (BYOD) and Big Data trends that generate unstructured data types such as audio, video, and social media. Because so little is known about this dark data, it places your organisation at risk.

Background - Importance of managing Data and Information.

Data Subjects Access Requests (DSARs) have become more common, mainly due to data protection authorities raising the public's awareness of their rights regarding knowing what personal data an organisation has regarding them, how they obtained it, and in what ways it is used.

Generally, people are more robust in exercising their DSAR rights, although most companies are unaware of the operational and financial burden a single DSAR request can impose.

Employee DSARs fundamentally should be treated the same as any other DSAR request, however levels of the personal information held by an employer about an employee is often more comprehensive and widespread, stored within multiple systems, for example, information could include employment history, financial details, medical information, etc.

The Business Impact.

Companies that receive a DSAR request have 30 days (generally 20 working days) to respond and provide the requested information in an understandable and consumable manner. The time period can be extended provided all the parties involved are informed, and the reasons explained.

For many organisations, the most complex, time-consuming and difficult step in responding to a DSAR request is the process of locating and finding the relevant Personal Information. Typically, basic data inventory and analytic tools or processes are either manual or comprise of a series of "In-house" unsupported script. DSARs requests generally break these manual processes and tools, not only in people resources required to manually search hundreds of thousands of files/emails, but also in the accuracy and completeness required to fully comply with GDPR Article 15 of the regulations.

 ControlPoint – Solution Overview

  1. Connectivity to a wide range of repositories including SharePoint, Exchange and many others
  2. Analytics and machine learning driven solutions to find business concepts
  3. One solution to analyse and apply governance policies on content

Content Discovery & Classification

? Identify redundant, obsolete, trivial & dark data.

? Analyse, organise and apply policy

Policy-Based Migration

? Identify and quarantine ROT before migrating data.

? Understand data sensitivity and suitability for destination (repository or cloud).

? Apply policy to streamline migration.

Automated Records declaration

? Identify & declare records in business systems.

? Apply policy to manage-in-place or migrate

Ability to Find Data & Documents

? Never lose a document again.

? Continuously analyse repositories for new content.

? Secure links guide users to migrated and managed content.

? Identify and report on items of interest.

? Content visualisations.

No alt text provided for this image

PII Discovery and Identification

Data files that contain sensitivity PII information can be widely stored across multiple storage devices. The location of these data files potentially represents a massive potential risk to the organisation.

ControlPoint’s advanced analytics capabilities has the ability to identify, locate and classify data files based upon their metadata and more importantly their contents. The policy engine enables organisations to ensure that these identified data files are automatically relocated to a more secure location or migrated to where they should be stored or removed from the system if no longer required.

For example, could your organisation respond to a Data Subject Access Request within the allotted 30 days?



要查看或添加评论,请登录

社区洞察

其他会员也浏览了