SlideShare a Scribd company logo
Manage Unstructured Data Growth 
with Symantec Data Insight 
The Challenge 
The amount of capacity shipped to 
support file-based storage is expected 
to grow at a compound annual growth 
rate of 60.1% from 2008 through 20131. 
The avalanche of incoming file data 
overwhelms an organization’s ability 
to manage and protect the data given 
existing processes, which are often 
manual and lack critical information. 
Organizations, in particular, face 
challenges in establishing what data 
exists, who owns the data, and how 
the data is being used. 
These challenges lead to a gap 
between information technology (IT) 
and the business. IT is often tasked 
with data governance objectives to 
reduce risk, reduce cost, improve effi-ciency, 
and achieve compliance, but it 
lacks the business context around the 
data. The business owners understand 
the value of the data but need to be 
empowered with the right information 
to make data governance decisions. 
The Solution 
Symantec and NetApp have jointly 
developed Symantec Data Insight 
to help organizations improve data 
governance. Data Insight integrates 
with NetApp® FAS to discover and 
collect activity and permissions infor-mation. 
It provides a web-based 
interface to monitor and report on 
users’ access to data. Data Insight is 
also integrated into Symantec Data 
Loss Prevention suite, enabling 
organizations to discover, monitor, and 
protect their confidential information 
residing in CIFS and NFS file shares 
on NetApp storage systems. 
Data ownership identification 
Data Insight helps organizations solve 
the problem of identifying data owners 
leveraging usage patterns and heuristics. 
Data Insight automates the discovery 
and management of custodians for 
unstructured data, enabling IT to 
empower the business owners to 
deliver on the organization’s data 
governance objectives spanning risk, 
compliance, and efficiency. 
Data protection and compliance 
Data Insight provides an intuitive 
web-based interface and reporting for 
security investigations and audits into 
who is accessing data, how often, and 
what else they have seen. Proactive 
monitoring capabilities can detect 
suspicious or irregular access of 
sensitive data and send alerts. 
The solution readily finds shares or 
folders that are exposed due to overly 
permissive access. With this information, 
organizations can prioritize risk-reduction 
efforts such as the discovery of sensitive 
data or review effective permissions 
to align access to business need. 
Data Insight is uniquely integrated with 
Symantec Data Loss Prevention. From 
a single interface, quickly discover 
confidential data, identify data owners, 
and engage them with a detailed 
HIGHLIGHTS 
• Data ownership automation to 
improve data governance 
• Detailed access history and alerts 
on irregular activity 
• Visibility into effective permissions 
and exposed data 
• Data lifecycle management and 
chargeback reports 
• Integration with Symantec™ 
Data Loss Prevention to discover, 
monitor, and protect sensitive data 
1 IDC, 2009
Symantec Data Insight Symantec Data Loss Prevention 
Management 
Console 
Index 
Collectors 
Scans/FPolicy® 
NetApp Storage Systems 
DIAGRAM 1: DATA INSIGHT VIEW—TOP USERS OF DATA DIAGRAM 2: DATA INSIGHT ARCHITECTURE 
understanding of access permissions 
and access history to enable an effective 
data protection process. 
The integrated solution also helps 
achieve compliance for regulations 
covering personally identifiable infor-mation 
(PII) such as PCI and HIPAA. It 
ships with out-of-the-box policies that 
discover data covered by regulatory 
compliance. The data ownership and 
permissions reporting capabilities aid 
organizations in automating a large-scale 
process for custodians to review 
access to their data: a requirement for 
regulatory compliance. 
Data management 
Data Insight quickly locates inactive or 
orphaned data. Along with the ability 
to identify data owners, this capability 
enables effective data lifecycle manage-ment. 
The solution also helps classify 
data based on owners and groups or 
roles, which is often required to adhere 
to data retention guidelines. 
Data Insight maps data owners to 
departments or business units for 
business-level consumption or charge-back 
reporting to promote storage 
efficiency. 
The solution’s visualization and reporting 
of usage analytics, such as how quickly 
data is growing, how old the data is, 
what data is frequently being used, and 
who is accessing the data, are vital for 
large-scale data management operations, 
such as migration, tiering, and capacity 
planning. 
APIs 
CIFS/NFS 
Management 
Platform 
How the solution works 
Symantec Data Insight connects to 
NetApp storage systems using NetApp 
Data ONTAP® interfaces for ease of 
configuration and management. The 
solution performs nonintrusive collection 
of activity events using NetApp FPolicy. 
It also collects permissions and meta-data 
using efficient incremental scan 
techniques. Smaller installations require 
minimal hardware and setup time. For 
larger installations, the solution can 
scale out while economizing the hard-ware 
required. Clustered Data ONTAP 
8.2+ is supported from Symantec Data 
Insight 4.5+, and Data ONTAP 7.3+ 
(7-Mode) is supported for all Symantec 
Data Insight versions. 
ABOUT SYMANTEC 
Symantec helps organizations secure and manage their 
information-driven world. Our software and services protect 
against more risks at more points, more completely and 
efficiently, enabling confidence wherever information is 
used or stored. Learn more at www.symantec.com. 
ABOUT NETAPP 
NetApp creates innovative storage and data management 
solutions that deliver outstanding cost efficiency and accelerate 
business breakthroughs. Discover our passion for helping 
companies around the world go further, faster at 
www.netapp.com. 
© 2014 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc. Specifications are subject to change without notice. NetApp, the NetApp logo, 
Go further, faster, Data ONTAP, and FPolicy are trademarks or registered trademarks of NetApp, Inc. in the United States and/or other countries. Symantec is a trademark of Symantec Corporation. All other brands or 
products are trademarks or registered trademarks of their respective holders and should be treated as such. DS-3328-0714

More Related Content

PDF
Data Privacy Readiness Test
PDF
intelligent-data-lake_executive-brief
PDF
Getting Ahead Of The Game: Proactive Data Governance
PDF
The value of big data analytics
PDF
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
PDF
Unit 5 v2
PDF
Evtm 281 07_bi2015_infographic_r2h
PPT
Case Study For Data Governance Portal
Data Privacy Readiness Test
intelligent-data-lake_executive-brief
Getting Ahead Of The Game: Proactive Data Governance
The value of big data analytics
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Unit 5 v2
Evtm 281 07_bi2015_infographic_r2h
Case Study For Data Governance Portal

What's hot (20)

PDF
Data-Centric Security for the Extended Enterprise
PDF
Data protection services lifecycle approach to critical information protection
PPTX
Information Governance Maturity for Financial Services
PDF
Recommind-AXC-Data-Management-Intelligent-Information-Governance-DS
PDF
Wp security-data-safe
PDF
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
PPTX
Big Data Expo 2015 - Trillium software Big Data and the Data Quality
PDF
Threat Ready Data: Protect Data from the Inside and the Outside
PDF
Symantec Data Insight for Storage
PPTX
CIO WaterCooler Focus: GDPR Jasmit Sagoo
PDF
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
PDF
GDPR Data Discovery and Management Brochure
PDF
The Merger is Happening, Now What Do We Do?
PDF
Addressing Gaps in Your Cyber Security
PDF
Ai data quality
PPTX
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
PDF
Requirements for Implementing Data-Centric ABAC
PDF
C7 defending the cloud with monitoring and auditing
PDF
California Consumer Privacy Act (CCPA)
PDF
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Data-Centric Security for the Extended Enterprise
Data protection services lifecycle approach to critical information protection
Information Governance Maturity for Financial Services
Recommind-AXC-Data-Management-Intelligent-Information-Governance-DS
Wp security-data-safe
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Big Data Expo 2015 - Trillium software Big Data and the Data Quality
Threat Ready Data: Protect Data from the Inside and the Outside
Symantec Data Insight for Storage
CIO WaterCooler Focus: GDPR Jasmit Sagoo
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
GDPR Data Discovery and Management Brochure
The Merger is Happening, Now What Do We Do?
Addressing Gaps in Your Cyber Security
Ai data quality
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Requirements for Implementing Data-Centric ABAC
C7 defending the cloud with monitoring and auditing
California Consumer Privacy Act (CCPA)
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Ad

Similar to Data Sheet - Manage unstructured data growth with Symantec Data Insight (20)

PDF
Powerhouse_ Architecting an Enterprise Data Lake for Scalability and Performa...
PDF
Why Big Data Automation is Important for Your Business.pdf
PDF
Why Big Data Automation is Important for Your Business.pdf
PDF
Veritas-Information-Governance-Solution-Brochure-EN
DOCX
IT for Management On-Demand Strategies for Performance, Growth,.docx
PDF
A Study on Big Data Privacy Protection Models using Data Masking Methods
PPTX
Group 2 Handling and Processing of big data (1).pptx
PDF
Data Observability- The Next Frontier of Data Engineering Pdf.pdf
PDF
eCommerce Product Data Governance: Why Does It Matter?
PDF
QKS Group’s Cutting-Edge Offerings: Leading the Future of Data Management Sol...
PDF
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
PDF
Sgcp14dunlea
PDF
7 Features to Spot the Best Data Discovery Tools.pdf
PDF
Veritas corporate brochure emea
DOCX
Big data security
DOCX
Big data security
PDF
What Is Data Orchestration.pdf
PDF
The Purpose of Data Management Service
PDF
eBook: 5 Steps to Secure Cloud Data Governance
PPTX
Security issues in big data
Powerhouse_ Architecting an Enterprise Data Lake for Scalability and Performa...
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdf
Veritas-Information-Governance-Solution-Brochure-EN
IT for Management On-Demand Strategies for Performance, Growth,.docx
A Study on Big Data Privacy Protection Models using Data Masking Methods
Group 2 Handling and Processing of big data (1).pptx
Data Observability- The Next Frontier of Data Engineering Pdf.pdf
eCommerce Product Data Governance: Why Does It Matter?
QKS Group’s Cutting-Edge Offerings: Leading the Future of Data Management Sol...
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Sgcp14dunlea
7 Features to Spot the Best Data Discovery Tools.pdf
Veritas corporate brochure emea
Big data security
Big data security
What Is Data Orchestration.pdf
The Purpose of Data Management Service
eBook: 5 Steps to Secure Cloud Data Governance
Security issues in big data
Ad

More from Symantec (20)

PDF
Symantec Enterprise Security Products are now part of Broadcom
PDF
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
PDF
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
PDF
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
PDF
Symantec Webinar | National Cyber Security Awareness Month - Own IT
PDF
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
PDF
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
PDF
Symantec Mobile Security Webinar
PDF
Symantec Webinar Cloud Security Threat Report
PDF
Symantec Cloud Security Threat Report
PDF
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
PDF
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
PDF
Symantec Webinar | Tips for Successful CASB Projects
PDF
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
PDF
Symantec Webinar: GDPR 1 Year On
PDF
Symantec ISTR 24 Webcast 2019
PDF
Symantec Best Practices for Cloud Security: Insights from the Front Lines
PDF
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
PDF
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
PDF
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Enterprise Security Products are now part of Broadcom
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Mobile Security Webinar
Symantec Webinar Cloud Security Threat Report
Symantec Cloud Security Threat Report
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: GDPR 1 Year On
Symantec ISTR 24 Webcast 2019
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear

Recently uploaded (20)

PDF
Modernizing your data center with Dell and AMD
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Machine learning based COVID-19 study performance prediction
PDF
Empathic Computing: Creating Shared Understanding
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation theory and applications.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Modernizing your data center with Dell and AMD
20250228 LYD VKU AI Blended-Learning.pptx
Unlocking AI with Model Context Protocol (MCP)
Machine learning based COVID-19 study performance prediction
Empathic Computing: Creating Shared Understanding
Per capita expenditure prediction using model stacking based on satellite ima...
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation theory and applications.pdf
MYSQL Presentation for SQL database connectivity
Network Security Unit 5.pdf for BCA BBA.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
A Presentation on Artificial Intelligence
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Dropbox Q2 2025 Financial Results & Investor Presentation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Data Sheet - Manage unstructured data growth with Symantec Data Insight

  • 1. Manage Unstructured Data Growth with Symantec Data Insight The Challenge The amount of capacity shipped to support file-based storage is expected to grow at a compound annual growth rate of 60.1% from 2008 through 20131. The avalanche of incoming file data overwhelms an organization’s ability to manage and protect the data given existing processes, which are often manual and lack critical information. Organizations, in particular, face challenges in establishing what data exists, who owns the data, and how the data is being used. These challenges lead to a gap between information technology (IT) and the business. IT is often tasked with data governance objectives to reduce risk, reduce cost, improve effi-ciency, and achieve compliance, but it lacks the business context around the data. The business owners understand the value of the data but need to be empowered with the right information to make data governance decisions. The Solution Symantec and NetApp have jointly developed Symantec Data Insight to help organizations improve data governance. Data Insight integrates with NetApp® FAS to discover and collect activity and permissions infor-mation. It provides a web-based interface to monitor and report on users’ access to data. Data Insight is also integrated into Symantec Data Loss Prevention suite, enabling organizations to discover, monitor, and protect their confidential information residing in CIFS and NFS file shares on NetApp storage systems. Data ownership identification Data Insight helps organizations solve the problem of identifying data owners leveraging usage patterns and heuristics. Data Insight automates the discovery and management of custodians for unstructured data, enabling IT to empower the business owners to deliver on the organization’s data governance objectives spanning risk, compliance, and efficiency. Data protection and compliance Data Insight provides an intuitive web-based interface and reporting for security investigations and audits into who is accessing data, how often, and what else they have seen. Proactive monitoring capabilities can detect suspicious or irregular access of sensitive data and send alerts. The solution readily finds shares or folders that are exposed due to overly permissive access. With this information, organizations can prioritize risk-reduction efforts such as the discovery of sensitive data or review effective permissions to align access to business need. Data Insight is uniquely integrated with Symantec Data Loss Prevention. From a single interface, quickly discover confidential data, identify data owners, and engage them with a detailed HIGHLIGHTS • Data ownership automation to improve data governance • Detailed access history and alerts on irregular activity • Visibility into effective permissions and exposed data • Data lifecycle management and chargeback reports • Integration with Symantec™ Data Loss Prevention to discover, monitor, and protect sensitive data 1 IDC, 2009
  • 2. Symantec Data Insight Symantec Data Loss Prevention Management Console Index Collectors Scans/FPolicy® NetApp Storage Systems DIAGRAM 1: DATA INSIGHT VIEW—TOP USERS OF DATA DIAGRAM 2: DATA INSIGHT ARCHITECTURE understanding of access permissions and access history to enable an effective data protection process. The integrated solution also helps achieve compliance for regulations covering personally identifiable infor-mation (PII) such as PCI and HIPAA. It ships with out-of-the-box policies that discover data covered by regulatory compliance. The data ownership and permissions reporting capabilities aid organizations in automating a large-scale process for custodians to review access to their data: a requirement for regulatory compliance. Data management Data Insight quickly locates inactive or orphaned data. Along with the ability to identify data owners, this capability enables effective data lifecycle manage-ment. The solution also helps classify data based on owners and groups or roles, which is often required to adhere to data retention guidelines. Data Insight maps data owners to departments or business units for business-level consumption or charge-back reporting to promote storage efficiency. The solution’s visualization and reporting of usage analytics, such as how quickly data is growing, how old the data is, what data is frequently being used, and who is accessing the data, are vital for large-scale data management operations, such as migration, tiering, and capacity planning. APIs CIFS/NFS Management Platform How the solution works Symantec Data Insight connects to NetApp storage systems using NetApp Data ONTAP® interfaces for ease of configuration and management. The solution performs nonintrusive collection of activity events using NetApp FPolicy. It also collects permissions and meta-data using efficient incremental scan techniques. Smaller installations require minimal hardware and setup time. For larger installations, the solution can scale out while economizing the hard-ware required. Clustered Data ONTAP 8.2+ is supported from Symantec Data Insight 4.5+, and Data ONTAP 7.3+ (7-Mode) is supported for all Symantec Data Insight versions. ABOUT SYMANTEC Symantec helps organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Learn more at www.symantec.com. ABOUT NETAPP NetApp creates innovative storage and data management solutions that deliver outstanding cost efficiency and accelerate business breakthroughs. Discover our passion for helping companies around the world go further, faster at www.netapp.com. © 2014 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc. Specifications are subject to change without notice. NetApp, the NetApp logo, Go further, faster, Data ONTAP, and FPolicy are trademarks or registered trademarks of NetApp, Inc. in the United States and/or other countries. Symantec is a trademark of Symantec Corporation. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such. DS-3328-0714