SlideShare a Scribd company logo
SharePoint: A Catalyst for Information GovernanceEMC SourceOne for Microsoft SharePointDave Martin, Principal Product Marketing Manager, EMC
The SourceOne PlatformPRACTICAL, ACTIONABLE INFORMATION GOVERNANCEGain VisibilityManage RiskSimplify eDiscoveryCut Costs
InformationGovernanceWhat is “Information Governance”?ArchivingSearch & eDiscoveryComplianceSource: “The Rise of Information Governance: From Reactive e-Discovery to Proactive Information Management,” The 451 Group, August 2009
The Two Sides of Governance…PeopleContent
SharePoint: A catalyst by design62.2%Of organizations surveyedare using or planning to use SharePointIDC research shows that enterprises are increasing the size and scope of their collaboration environments, with SharePointemerging asa major driver of information growth.         May 2010More than half of organizations are running SharePoint todaySources: “Microsoft Office and SharePoint Traction: An Updated Look at Customer Adoption and Future Plans,” IDC, October 2009
What are we using SharePoint for?For Storing Content!AIIM Industry Watch: “SharePoint Strategies and Experiences,” July 2010
Organizational Pain PointsComplianceITInformationGovernanceLitigation ReadinessOperational efficiencies Content SecurityRetention & ControlOperationalEfficienciesPaperless RequirementseDiscoveryInformation GrowthRegulatoryComplianceReduced CostsEnd-user AccessRisk MitigationContent ControlEnd-userTransparencySingle Pointof Access Shorten back-upwindows
Thinking about Information Governance for SharePoint?What are your most immediate needs?
How much content are you planning to hold in SharePoint?
What type of content are you trying to capture?
What are your archival requirements?
What are your compliance requirements?
Are you going to break the “experience”?
Do you have other content outside of SharePoint?Thinking about Information Governance for SharePoint?What are your most immediate needs?Immediate operational challenges with active SharePoint content?Or …Site/content retirement andcompliancerequirements? Or …Enablinglitigation readinessOr …ALL OF THE ABOVE!!!
Lots of itMostly unstructuredMostly unmanagedCreated by organizationsBecoming more regulated NOTHING! What is going to stop information from growing Thinking about Information Governance for SharePoint?How much content are you planning to hold in SharePoint?35Zb95%Information85%85%▲Source: "The Digital Universe Decade,“ EMC-sponsored IDC White Paper, May 2010
Thinking about Information Governance for SharePoint?How much content are you planning to hold in SharePoint?5 Terabytes12 Terabytes21,000 Sites!!!40 Terabytes + 400 Million Documents
Putting Information Governance on the MapWhat type of content are you trying to capture?INFORMATIONInformation Governance
Thinking about Information Governance for SharePoint?What are your archival requirements?  ActiveSitesInactiveSites75%25%You need to ask yourself:What information is being stored in these sites and are they being managed long-term?InfoTrends Report: “Gathering MOSS?”; August 2009
Thinking about Information Governance for SharePoint?What are your compliance requirements?Sarbanes-Oxley Act (SOX)  ~ PCAOB  ~ SAS 94  ~ AICPA/CICA Privacy Framework  ~ AICPA Suitable Trust Services Criteria  ~ SEC Retention of Records, 17 CFR 210.2-06  ~ SEC Controls and Procedures, 17 CFR 240.15d-15  ~ SEC Reporting Transactions and Holdings, 17 CFR 240.16a-3  ~ Basel II  ~ BIS Sound Practices for the Management and Supervision of Operational Risk  ~ Gramm-Leach-Bliley Act (GLB)  ~ Standards for Safeguarding Customer Information, FTC 16 CFR 314  ~ Privacy of Consumer Financial Information Rule  ~ Safety and Soundness Standards, Appendix of 12 CFR 30  ~ FFIEC Information Security  ~ FFIEC Development Acquisition  ~ FFIEC Business Continuity Planning  ~ FFIEC Audit  ~ FFIEC Management  ~ FFIEC Operations  ~ NASD  ~ NYSE  ~ Recordkeeping rule for securities exchanges, SEC 17 CFR 240.17a-1  ~ Records to be made by exchange members, SEC 17 CFR 240.17a-3  ~ Records to be preserved by exchange members, SEC 17 CFR 240.17a-4  ~ Recordkeeping, SEC 17 CFR 240.17Ad-6  ~ Record retention, SEC 17 CFR 240.17Ad-7  ~ HIPAA (Health Insurance Portability and Accountability Act)  ~ HIPAA HCFA Internet Security Policy  ~ NIST Introductory Resource Guide for [HIPAA] (800-66)  ~ CMS Core Security Requirements (CSR)  ~ CMS Information Security Acceptable Risk Safeguards (ARS)  ~ CMS Information Security Certification & Accreditation (C&A)  ~ FDA Electronic Records; Electronic Signatures 21 CFR Part 11+D1  ~ Federal Energy Regulatory Commission (FERC)  ~ North American Electric Reliability Council (NERC)  ~ VISA CISP (Cardholder Information Security Program)  ~ Mastercard SDP (Site Data Protection) Program  ~ American Express DSS (Data Security Standard)  ~ PCI DSS (Payment Card Industry Data Security Standard)  ~ FTC ESIGN (Electronic Signatures in Global and National Commerce Act)  ~ Uniform Electronic Transactions Act (UETA)  ~ FISMA (Federal Information Security Management Act)  ~ FISCAM (Federal Information System Controls Audit Manual)  ~ FIPS Security Requirements for Cryptographic Modules 140-2  ~ FIPS Guideline for the Analysis of LAN Security 191  ~ FIPS Application Profile for GILS 192  ~ Clinger-Cohen Act (Information Technology Management Reform Act)  ~ National Strategy to Secure Cyberspace  ~ GAO Financial Audit Manual  ~ DOD ...Standard for Electronic Records Management Software...5015-2  ~ CISWG Report on the Best Practices Subgroup  ~ CISWG Information Security Program Elements  ~ NCUA Guidelines for Safeguarding Member Information 12 CFR 748  ~ IRS Revenue Procedure: Retention of books and records 97-22  ~ IRS Revenue Procedure: Record retention: automatic data processing… 98-25  ~ IRS Internal Revenue Code Section 501(c)(3)  ~ Federal Rules of Civil Procedure  ~ Uniform Rules of Civil Procedure  ~ ISO 15489-1 Information and Documentation: Records management: General  ~ ISO 15489-2 Information and Documentation: Records management: Guidelines  ~ DIRKS: A Strategic Approach to Managing Business Information  ~ Sedona Principles Addressing Electronic Document Production  ~ NIST ...Principles and Practices for Securing IT Systems 800-14  ~ NIST ...Developing Security Plans for Federal Information Systems 800-18  ~ NIST Security Self-Assessment Guide... 800-26  ~ NIST Risk Management Guide... 800-30  ~ NIST Contingency Planning Guide... 800-34  ~ NIST ...Patch and Vulnerability Management Program 800-40  ~ NIST Guidelines on Firewalls and Firewall Policy 800-41  ~ NIST Security Controls for Federal Information Systems 800-53  ~ NIST ...Mapping...Information and...Systems to Security Categories 800-60  ~ NIST Computer Security Incident Handling Guide 800-61  ~ NIST Security Considerations in...Information System Development 800-64  ~ ISO 73:2002 Risk management -- Vocabulary  ~ ISO 1335 Information technology – Guidelines for management of IT Security  ~ ISO 17799:2000 Code of Practice for Information Security Management  ~ ISO 27001:2005 ...Information Security Management Systems -- Requirements  ~ IT Information Library (ITIL) Planning to Implement Service Management  ~ IT Information Library (ITIL) ICT Infrastructure Management  ~ IT Information Library (ITIL) Service Delivery  ~ IT Information Library (ITIL) Service Support  ~ IT Information Library (ITIL) Application Management  ~ IT Information Library (ITIL) Security Management  ~ COSO Enterprise Risk Management (ERM) Framework  ~ CobiT 3rd Edition  ~ CobiT 4th Edition  ~ ISACA IS Standards, Guidelines, and Procedures for Auditing and Control...  ~ NFPA 1600 ...Disaster/Emergency Management and Business Continuity...  ~ Information Security Forum (ISF) Standard of Good Practice  ~ Information Security Forum (ISF) Security Audit of Networks  ~ A Risk Management Standard, jointly issued by AIRMIC, ALARM, and IRM  ~ Business Continuity Institute (BCI) Good Practice Guidelines  ~ IIA Global Technology Audit Guide - Information Technology Controls  ~ ISSA Generally Accepted Information Security Principles (GAISP)  ~ CERT Operationally Critical Threat, Asset & Vulnerability Evaluation (OCTAVE)  ~ Cable Communications Privacy Act Title 47 § 551  ~ Telemarketing Sales Rule (TSR) amendment 16 CFR 310.4(b)(3)(iv)  ~ CAN SPAM Act  ~ Children's Online Privacy Protection Act (COPPA) 16 CFR 312  ~ Children's Online Privacy Protection Act (COPPA) 16 CFR 312  ~ Driver's Privacy Protection Act (DPPA) 18 USC 2721  ~ Family Education Rights Privacy Act (FERPA) 20 USC 1232  ~ Privacy Act of 1974 5 USC 552a  ~ Telemarketing Sales Rule (TSR) 16 CFR 310  ~ Video Privacy Protection Act (VPPA) 18 USC 2710  ~ Specter-Leahy Personal Data Privacy and Security Act  ~ AR Personal Information Protection Act SB 1167  ~ AZ Amendment to Arizona Revised Statutes 13-2001 HB 2116  ~ CA Information Practice Act SB 1386  ~ CA General Security Standard for Businesses AB 1950  ~ CA Public Records Military Veteran Discharge Documents AB 1798  ~ CA OPP Recommended Practices on Notification of Security Breach  ~ CO Prohibition against Using Identity Information for Unlawful Purpose HB 1134  ~ CO Consumer Credit Solicitation Protection HB 1274  ~ CO Prohibiting Inclusion of Social Security Number HB 1311  ~ CT Requiring Consumer Credit Bureaus to Offer Security Freezes SB 650  ~ CT Concerning Nondisclosure of Private Tenant Information HB 5184  ~ DE Computer Security Breaches HB 116  ~ FL Personal Identification Information/Unlawful Use HB 481  ~ GA Consumer Reporting Agencies SB 230  ~ GA Public employees; Fraud, Waste, and Abuse HB 656  ~ HI Exempting disclosure of Social Security numbers HB 2674  ~ IL Personal Information Protection Act HB 1633  ~ IN Release of Social Security Number, Notice of Security Breach SB 503  ~ LA Database Security Breach Notification Law SB 205 Act 499  ~ ME To Protect Maine Citizens from Identity Theft LD 1671  ~ MN Data Warehouses; Notice Required for Certain Disclosures HF 2121  ~ MO HB 957  ~ MT To Implement Individual Privacy and to Prevent Identity Theft HB 732  ~ NJ Identity Theft Prevention Act A4001/S1914  ~ NY A4254, A3492 [no title]  ~ NV SB 347 [no title]  ~ NC Security Breach Notification Law (Identity Theft Protection Act) SB 1048  ~ ND Personal information protection act SB 2251  ~ OH Personal information -- contact if unauthorized access HB 104  ~ RI Security Breach Notification Law H 6191  ~ TN Security Breach Notification SB 2220  ~ TX Identity Theft Enforcement and Protection Act SB 122  ~ VT Relating to Identity Theft HB 327  ~ VA Identity theft; penalty; restitution; victim assistance HB 872  ~ WA Notice of a breach of the security SB 6043  ~ EU Directive on Privacy and Electronic Communications 2002/58/EC  ~ EU Directive on Data Protection 95/46/EC  ~ US Department of Commerce EU Safe Harbor Privacy Principles  ~ ...Consumer Interests in the Telecommunications Market Act No. 661  ~ Directive On Privacy And Electronic Communications 2002.58.EC  ~ OECD Technology Risk Checklist  ~ OECD Guidelines on...Privacy and Transborder Flows of Personal Data  ~ UN Guidelines for the Regulation of Computerized
Thinking about Information Governance for SharePoint?Are you going to break the “experience”?Thinking about Information Governance for SharePoint?Do you have other content outside of SharePoint that needs to be archived?What aren’t you using SharePoint for?How would you describe your use of SharePoint in the following areas:Old content that shouldn’t be in SharePoint anyway……But needs to be managed according to regulatory and corporate policies…51%…that you might just need to provide in the event you get sued57%72%AIIM Industry Watch: “SharePoint Strategies and Experiences,” July 2010
The IdealProvideretention and control of archived business-relevant SharePoint contentHelp manage the growing number of outdated/orphaned SharePoint sites and contentShorten our backup windows and maintain performanceEnable centralized management & access for content from SharePoint
The Operational RequirementsTo scale to 100s of millions of documents customers need to distribute the data to several databases and sites – or “remove” / “move” dataEnsure scalabilityMaintain performanceMeet backup windows
Big savings through ExternalizationSharePoint End UserSQL ServerBLOB HandlerMetadataMetadataContentLeverage Microsoft’s preferred method for externalizationReduce load on SQLReduce costs via tiered storageMaintain end-user experienceEnsure performance & scalabilityObjectObject
The Information Governance RequirementsTo manage the 100s of sites and millions of documents that are orphaned or inactive customers must ensure policies are in place for governing the content once it has left SharePointMaintain retention & controlLitigation readinessContent accessibility
Supplemental ECMEmbrace and Extend Workloads with PartnersFoundational ECMPhysical Records ManagementScanning and CaptureTransactional Content ManagementBusiness Process ManagementArchiving and Library ServicesDocument Output ManagementRich Media ManagementWeb Content ManagementRecords ManagementDocument ManagementHuman Centric WorkflowSharePoint ECM
Information Intelligence for SharePointPhysical Records ManagementScanning and CaptureTransactional Content ManagementBusiness Process ManagementArchiving and Library Services
Information Intelligence for SharePointPhysical Records ManagementScanning and CaptureTransactional Content ManagementBusiness Process ManagementArchiving and Library ServicesInformation AccessInformation GovernanceIntelligent CaptureMaintain the SharePoint experience while connecting active content to active processes Enable instant access by moving physical documents into SharePointEnsure centralized compliance, archival & eDiscovery and maintain retention and control on inactive dataCustom Consulting RequirementsStorage
Information Intelligence for SharePointPhysical Records ManagementScanning and CaptureTransactional Content ManagementBusiness Process ManagementArchiving and Library ServicesEMC SourceOne for Microsoft SharePoint
EMC SourceOne for Microsoft SharePointArchiving and Library ServicesOperational EfficienciesInformation GovernanceEnd-User TransparencyFor Microsoft SharePointInformation GovernanceEnsure centralized compliance, archival & eDiscovery and maintain retention and control on inactive data
The Operational ValueTo scale to 100s of millions of documents customers need to distribute the data across several databases and sites – or  “move” the dataEnhanced scalabilityImproved performanceShorter backupFor Microsoft SharePoint
Externalization for Operational EfficienciesSharePoint End UserEMC EBS HandlerMetadataMetadataContentSQL ServerLeverage Microsoft’s preferred method for externalizationReduce load on SQLReduce costs via tiered storageMaintain end-user experienceEnsure performance & scalabilityObjectObject
The Information Governance ValueTo manage the 100s of sites and millions of documents that are orphaned or inactive customers must ensure policies are in place for governing the content once it has left SharePointMaintain retention & controlLitigation readinessContent accessibilityFor Microsoft SharePoint
Leverage the Power of SourceOneCentralized Information GovernanceSourceOne supports multiple content types for archival including Email & SharePointCentrally manage and administrate all archived content
Data Sources and ScopesSelect required data sourceChoose any combination of scopes, such as: An entire farmA specific site within a farmhttp://moss2007Automatically include new scopes added in the futureOr exclude child scopes as required
Content Types for ArchivalChoose specific content types, from Libraries to List items, folders and customWhen parent types are selected, child types are automatically also includedChild types can be explicitly excludedTypes can be imported to retrieve metadata column information
Content for archival can be defined by:Date
VersionContent for archival can be filtered by:Attachment type
File SizeContent Selection & Filtering
Select specific business folders for content destinationContent inherits retention policy based on folderSelect processing option:Copy
Copy & DeleteArchive Action
Outline specific schedule for individual archive activitiesDefine how often the process recurs and when the activity endsArchive Schedule
Consistent SharePoint user experience Advanced search of “archived” contentGet search results from multiple locations:SourceOne archive SharePoint farmLeverage search to find list items (e.g., contacts, documents, tasks, Wikis, meetings, etc.)SharePoint Search Portal
Migrating to SharePoint 2010:A story of good housekeepingEMC SourceOne + Microsoft SharePoint 2010
Understand what you have using File IntelligenceWhat type of content do you have?When was the last time it was accessed?
Create 3 Simple Buckets…ActiveInactiveDelete…Maintain Good Information Governance

More Related Content

PDF
Technology Trends: Value Office
PPTX
Webianr: GDPR: How to build a data protection framework
PDF
SureSkills GDPR - Discover the Smart Solution
PDF
Convince your board - Ten steps to GDPR compliance
PDF
GDPR changes affect direct marketing
PPTX
Payroll Data & GDPR: What you need to know?
PDF
Developer view on new EU privacy legislation (GDPR)
PPTX
The GDPR and its requirements for implementing data protection impact assessm...
Technology Trends: Value Office
Webianr: GDPR: How to build a data protection framework
SureSkills GDPR - Discover the Smart Solution
Convince your board - Ten steps to GDPR compliance
GDPR changes affect direct marketing
Payroll Data & GDPR: What you need to know?
Developer view on new EU privacy legislation (GDPR)
The GDPR and its requirements for implementing data protection impact assessm...

What's hot (18)

PDF
GDPR & SAP: practical data governance & management activities
PDF
GDPR and ISO27001 mapping EL
PDF
GDPR: Requirements for Cloud Providers
PPTX
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
PPTX
GDPR Presentation slides
PDF
The Essential Guide to GDPR
PDF
Getting Started with GDPR Compliance
PDF
11 European Privacy Regulations That Could Cost You €1 Million in Fines
PDF
Data- and database security & GDPR: end-to-end offer
PPT
Building a register of data processing
PDF
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
PPTX
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
PDF
20170323 are you ready the new gdpr is here
PDF
GDPR and Irish SMEs May 2017
PPTX
Data Privacy: What you need to know about privacy, from compliance to ethics
PDF
Gdpr overview ciso platform presentation
PPTX
EU GDPR - 12 Steps To Compliance
PDF
Data Breaches and the EU GDPR
GDPR & SAP: practical data governance & management activities
GDPR and ISO27001 mapping EL
GDPR: Requirements for Cloud Providers
Ardoq in Edinburgh - Events - Building Resilience in a Post-GDPR World (14-au...
GDPR Presentation slides
The Essential Guide to GDPR
Getting Started with GDPR Compliance
11 European Privacy Regulations That Could Cost You €1 Million in Fines
Data- and database security & GDPR: end-to-end offer
Building a register of data processing
GDPR: Is Your Organization Ready for the General Data Protection Regulation?
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
20170323 are you ready the new gdpr is here
GDPR and Irish SMEs May 2017
Data Privacy: What you need to know about privacy, from compliance to ethics
Gdpr overview ciso platform presentation
EU GDPR - 12 Steps To Compliance
Data Breaches and the EU GDPR
Ad

Viewers also liked (7)

PPT
Apps Preso
PDF
SourceOne_CamlockCouplings
PDF
PPTX
V center application discovery manager customer facing technical presentation
PDF
Information Analytics: Know What Is In Your E-files To Save Millions and Mana...
PDF
Dr. Bob Hayes Big Data and the Total Customer Experience
PDF
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Apps Preso
SourceOne_CamlockCouplings
V center application discovery manager customer facing technical presentation
Information Analytics: Know What Is In Your E-files To Save Millions and Mana...
Dr. Bob Hayes Big Data and the Total Customer Experience
Gamification: Leveraging Game Strategies & Big Data to Drive Business with Dr...
Ad

Similar to EMC SourceOne for SharePoint (20)

PPTX
IQPC eDiscovery Goverment - Washington D.C.
PPTX
Assessing the Risk of Identity and Access
PDF
CIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
PDF
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
PPT
M014 Confluence Presentation 08 15 06
PPTX
Information Security Management System ISO/IEC 27001:2005
PPT
Data Risks In A Digital Age
PPT
Security Lifecycle Management
PDF
15466 mba technology_white_paper
PDF
15466 mba technology_white_paper
PPT
Info Security & PCI(original)
PPTX
2011 hildebrandt institute cio forum data privacy and security presentation...
PDF
The Effective eDocument Retention Program - Policies, Processes and Solutions
PDF
Data Integrity Protection
PPT
S nandakumar
PPT
S nandakumar_banglore
PPTX
Data Management - NA CACS 2009
PPT
Securing your esi_piedmont
PPT
MA Privacy Law
PPT
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...
IQPC eDiscovery Goverment - Washington D.C.
Assessing the Risk of Identity and Access
CIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
M014 Confluence Presentation 08 15 06
Information Security Management System ISO/IEC 27001:2005
Data Risks In A Digital Age
Security Lifecycle Management
15466 mba technology_white_paper
15466 mba technology_white_paper
Info Security & PCI(original)
2011 hildebrandt institute cio forum data privacy and security presentation...
The Effective eDocument Retention Program - Policies, Processes and Solutions
Data Integrity Protection
S nandakumar
S nandakumar_banglore
Data Management - NA CACS 2009
Securing your esi_piedmont
MA Privacy Law
Rina Hunter & Craig MacDonald - #InfoGov17 - Rethinking Information Governanc...

More from J. David Morris (20)

PDF
Wayne Eckerson: Secrets of Analytical Leaders webinar
PPTX
Laura Madsen Healthcare Webinar - Big Answers
PDF
Cetas Analytics as a Service for Predictive Analytics
PPTX
KMWorld Presentation
PDF
eDiscovery Infographic
PPTX
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
PPTX
The Catch 22 of Cross Border eDiscovery
PPTX
Overcoming In-house Politics to Implement eDiscovery
PPTX
Esoteric ESI eDiscovery webinar
PPT
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
PPTX
It takes a village - LegalTech NY 2011
PPTX
eDiscovery and Records Oh...My!
PPTX
LegalTech Cross Border Disputes
PPTX
Pardon the eDiscovery
PPT
eDiscovery Turf Wars at LegalTech 2011
PPT
Mc Carterand English 06152010 F
PPT
US eDiscovery v UK eDisclosure
PPTX
Webinar Win In Court V3
PPT
NYLJ Social Media Webinar J. Shook
PPT
Shonka Webinar V3
Wayne Eckerson: Secrets of Analytical Leaders webinar
Laura Madsen Healthcare Webinar - Big Answers
Cetas Analytics as a Service for Predictive Analytics
KMWorld Presentation
eDiscovery Infographic
Jason Baron, Esq. and James Shook, Esq. - An Inevitable Reality: Machine-base...
The Catch 22 of Cross Border eDiscovery
Overcoming In-house Politics to Implement eDiscovery
Esoteric ESI eDiscovery webinar
IQPC NY Financial Conference on eDiscovery: Legal Speaks Greek and IT Speaks ...
It takes a village - LegalTech NY 2011
eDiscovery and Records Oh...My!
LegalTech Cross Border Disputes
Pardon the eDiscovery
eDiscovery Turf Wars at LegalTech 2011
Mc Carterand English 06152010 F
US eDiscovery v UK eDisclosure
Webinar Win In Court V3
NYLJ Social Media Webinar J. Shook
Shonka Webinar V3

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Empathic Computing: Creating Shared Understanding
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
cuic standard and advanced reporting.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
MYSQL Presentation for SQL database connectivity
Electronic commerce courselecture one. Pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Empathic Computing: Creating Shared Understanding
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Review of recent advances in non-invasive hemoglobin estimation
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Monthly Chronicles - July 2025
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
cuic standard and advanced reporting.pdf
Machine learning based COVID-19 study performance prediction
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Chapter 3 Spatial Domain Image Processing.pdf
A Presentation on Artificial Intelligence
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Encapsulation_ Review paper, used for researhc scholars
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Diabetes mellitus diagnosis method based random forest with bat algorithm
The AUB Centre for AI in Media Proposal.docx
MYSQL Presentation for SQL database connectivity

EMC SourceOne for SharePoint

  • 1. SharePoint: A Catalyst for Information GovernanceEMC SourceOne for Microsoft SharePointDave Martin, Principal Product Marketing Manager, EMC
  • 2. The SourceOne PlatformPRACTICAL, ACTIONABLE INFORMATION GOVERNANCEGain VisibilityManage RiskSimplify eDiscoveryCut Costs
  • 3. InformationGovernanceWhat is “Information Governance”?ArchivingSearch & eDiscoveryComplianceSource: “The Rise of Information Governance: From Reactive e-Discovery to Proactive Information Management,” The 451 Group, August 2009
  • 4. The Two Sides of Governance…PeopleContent
  • 5. SharePoint: A catalyst by design62.2%Of organizations surveyedare using or planning to use SharePointIDC research shows that enterprises are increasing the size and scope of their collaboration environments, with SharePointemerging asa major driver of information growth. May 2010More than half of organizations are running SharePoint todaySources: “Microsoft Office and SharePoint Traction: An Updated Look at Customer Adoption and Future Plans,” IDC, October 2009
  • 6. What are we using SharePoint for?For Storing Content!AIIM Industry Watch: “SharePoint Strategies and Experiences,” July 2010
  • 7. Organizational Pain PointsComplianceITInformationGovernanceLitigation ReadinessOperational efficiencies Content SecurityRetention & ControlOperationalEfficienciesPaperless RequirementseDiscoveryInformation GrowthRegulatoryComplianceReduced CostsEnd-user AccessRisk MitigationContent ControlEnd-userTransparencySingle Pointof Access Shorten back-upwindows
  • 8. Thinking about Information Governance for SharePoint?What are your most immediate needs?
  • 9. How much content are you planning to hold in SharePoint?
  • 10. What type of content are you trying to capture?
  • 11. What are your archival requirements?
  • 12. What are your compliance requirements?
  • 13. Are you going to break the “experience”?
  • 14. Do you have other content outside of SharePoint?Thinking about Information Governance for SharePoint?What are your most immediate needs?Immediate operational challenges with active SharePoint content?Or …Site/content retirement andcompliancerequirements? Or …Enablinglitigation readinessOr …ALL OF THE ABOVE!!!
  • 15. Lots of itMostly unstructuredMostly unmanagedCreated by organizationsBecoming more regulated NOTHING! What is going to stop information from growing Thinking about Information Governance for SharePoint?How much content are you planning to hold in SharePoint?35Zb95%Information85%85%▲Source: "The Digital Universe Decade,“ EMC-sponsored IDC White Paper, May 2010
  • 16. Thinking about Information Governance for SharePoint?How much content are you planning to hold in SharePoint?5 Terabytes12 Terabytes21,000 Sites!!!40 Terabytes + 400 Million Documents
  • 17. Putting Information Governance on the MapWhat type of content are you trying to capture?INFORMATIONInformation Governance
  • 18. Thinking about Information Governance for SharePoint?What are your archival requirements? ActiveSitesInactiveSites75%25%You need to ask yourself:What information is being stored in these sites and are they being managed long-term?InfoTrends Report: “Gathering MOSS?”; August 2009
  • 19. Thinking about Information Governance for SharePoint?What are your compliance requirements?Sarbanes-Oxley Act (SOX) ~ PCAOB ~ SAS 94 ~ AICPA/CICA Privacy Framework ~ AICPA Suitable Trust Services Criteria ~ SEC Retention of Records, 17 CFR 210.2-06 ~ SEC Controls and Procedures, 17 CFR 240.15d-15 ~ SEC Reporting Transactions and Holdings, 17 CFR 240.16a-3 ~ Basel II ~ BIS Sound Practices for the Management and Supervision of Operational Risk ~ Gramm-Leach-Bliley Act (GLB) ~ Standards for Safeguarding Customer Information, FTC 16 CFR 314 ~ Privacy of Consumer Financial Information Rule ~ Safety and Soundness Standards, Appendix of 12 CFR 30 ~ FFIEC Information Security ~ FFIEC Development Acquisition ~ FFIEC Business Continuity Planning ~ FFIEC Audit ~ FFIEC Management ~ FFIEC Operations ~ NASD ~ NYSE ~ Recordkeeping rule for securities exchanges, SEC 17 CFR 240.17a-1 ~ Records to be made by exchange members, SEC 17 CFR 240.17a-3 ~ Records to be preserved by exchange members, SEC 17 CFR 240.17a-4 ~ Recordkeeping, SEC 17 CFR 240.17Ad-6 ~ Record retention, SEC 17 CFR 240.17Ad-7 ~ HIPAA (Health Insurance Portability and Accountability Act) ~ HIPAA HCFA Internet Security Policy ~ NIST Introductory Resource Guide for [HIPAA] (800-66) ~ CMS Core Security Requirements (CSR) ~ CMS Information Security Acceptable Risk Safeguards (ARS) ~ CMS Information Security Certification & Accreditation (C&A) ~ FDA Electronic Records; Electronic Signatures 21 CFR Part 11+D1 ~ Federal Energy Regulatory Commission (FERC) ~ North American Electric Reliability Council (NERC) ~ VISA CISP (Cardholder Information Security Program) ~ Mastercard SDP (Site Data Protection) Program ~ American Express DSS (Data Security Standard) ~ PCI DSS (Payment Card Industry Data Security Standard) ~ FTC ESIGN (Electronic Signatures in Global and National Commerce Act) ~ Uniform Electronic Transactions Act (UETA) ~ FISMA (Federal Information Security Management Act) ~ FISCAM (Federal Information System Controls Audit Manual) ~ FIPS Security Requirements for Cryptographic Modules 140-2 ~ FIPS Guideline for the Analysis of LAN Security 191 ~ FIPS Application Profile for GILS 192 ~ Clinger-Cohen Act (Information Technology Management Reform Act) ~ National Strategy to Secure Cyberspace ~ GAO Financial Audit Manual ~ DOD ...Standard for Electronic Records Management Software...5015-2 ~ CISWG Report on the Best Practices Subgroup ~ CISWG Information Security Program Elements ~ NCUA Guidelines for Safeguarding Member Information 12 CFR 748 ~ IRS Revenue Procedure: Retention of books and records 97-22 ~ IRS Revenue Procedure: Record retention: automatic data processing… 98-25 ~ IRS Internal Revenue Code Section 501(c)(3) ~ Federal Rules of Civil Procedure ~ Uniform Rules of Civil Procedure ~ ISO 15489-1 Information and Documentation: Records management: General ~ ISO 15489-2 Information and Documentation: Records management: Guidelines ~ DIRKS: A Strategic Approach to Managing Business Information ~ Sedona Principles Addressing Electronic Document Production ~ NIST ...Principles and Practices for Securing IT Systems 800-14 ~ NIST ...Developing Security Plans for Federal Information Systems 800-18 ~ NIST Security Self-Assessment Guide... 800-26 ~ NIST Risk Management Guide... 800-30 ~ NIST Contingency Planning Guide... 800-34 ~ NIST ...Patch and Vulnerability Management Program 800-40 ~ NIST Guidelines on Firewalls and Firewall Policy 800-41 ~ NIST Security Controls for Federal Information Systems 800-53 ~ NIST ...Mapping...Information and...Systems to Security Categories 800-60 ~ NIST Computer Security Incident Handling Guide 800-61 ~ NIST Security Considerations in...Information System Development 800-64 ~ ISO 73:2002 Risk management -- Vocabulary ~ ISO 1335 Information technology – Guidelines for management of IT Security ~ ISO 17799:2000 Code of Practice for Information Security Management ~ ISO 27001:2005 ...Information Security Management Systems -- Requirements ~ IT Information Library (ITIL) Planning to Implement Service Management ~ IT Information Library (ITIL) ICT Infrastructure Management ~ IT Information Library (ITIL) Service Delivery ~ IT Information Library (ITIL) Service Support ~ IT Information Library (ITIL) Application Management ~ IT Information Library (ITIL) Security Management ~ COSO Enterprise Risk Management (ERM) Framework ~ CobiT 3rd Edition ~ CobiT 4th Edition ~ ISACA IS Standards, Guidelines, and Procedures for Auditing and Control... ~ NFPA 1600 ...Disaster/Emergency Management and Business Continuity... ~ Information Security Forum (ISF) Standard of Good Practice ~ Information Security Forum (ISF) Security Audit of Networks ~ A Risk Management Standard, jointly issued by AIRMIC, ALARM, and IRM ~ Business Continuity Institute (BCI) Good Practice Guidelines ~ IIA Global Technology Audit Guide - Information Technology Controls ~ ISSA Generally Accepted Information Security Principles (GAISP) ~ CERT Operationally Critical Threat, Asset & Vulnerability Evaluation (OCTAVE) ~ Cable Communications Privacy Act Title 47 § 551 ~ Telemarketing Sales Rule (TSR) amendment 16 CFR 310.4(b)(3)(iv) ~ CAN SPAM Act ~ Children's Online Privacy Protection Act (COPPA) 16 CFR 312 ~ Children's Online Privacy Protection Act (COPPA) 16 CFR 312 ~ Driver's Privacy Protection Act (DPPA) 18 USC 2721 ~ Family Education Rights Privacy Act (FERPA) 20 USC 1232 ~ Privacy Act of 1974 5 USC 552a ~ Telemarketing Sales Rule (TSR) 16 CFR 310 ~ Video Privacy Protection Act (VPPA) 18 USC 2710 ~ Specter-Leahy Personal Data Privacy and Security Act ~ AR Personal Information Protection Act SB 1167 ~ AZ Amendment to Arizona Revised Statutes 13-2001 HB 2116 ~ CA Information Practice Act SB 1386 ~ CA General Security Standard for Businesses AB 1950 ~ CA Public Records Military Veteran Discharge Documents AB 1798 ~ CA OPP Recommended Practices on Notification of Security Breach ~ CO Prohibition against Using Identity Information for Unlawful Purpose HB 1134 ~ CO Consumer Credit Solicitation Protection HB 1274 ~ CO Prohibiting Inclusion of Social Security Number HB 1311 ~ CT Requiring Consumer Credit Bureaus to Offer Security Freezes SB 650 ~ CT Concerning Nondisclosure of Private Tenant Information HB 5184 ~ DE Computer Security Breaches HB 116 ~ FL Personal Identification Information/Unlawful Use HB 481 ~ GA Consumer Reporting Agencies SB 230 ~ GA Public employees; Fraud, Waste, and Abuse HB 656 ~ HI Exempting disclosure of Social Security numbers HB 2674 ~ IL Personal Information Protection Act HB 1633 ~ IN Release of Social Security Number, Notice of Security Breach SB 503 ~ LA Database Security Breach Notification Law SB 205 Act 499 ~ ME To Protect Maine Citizens from Identity Theft LD 1671 ~ MN Data Warehouses; Notice Required for Certain Disclosures HF 2121 ~ MO HB 957 ~ MT To Implement Individual Privacy and to Prevent Identity Theft HB 732 ~ NJ Identity Theft Prevention Act A4001/S1914 ~ NY A4254, A3492 [no title] ~ NV SB 347 [no title] ~ NC Security Breach Notification Law (Identity Theft Protection Act) SB 1048 ~ ND Personal information protection act SB 2251 ~ OH Personal information -- contact if unauthorized access HB 104 ~ RI Security Breach Notification Law H 6191 ~ TN Security Breach Notification SB 2220 ~ TX Identity Theft Enforcement and Protection Act SB 122 ~ VT Relating to Identity Theft HB 327 ~ VA Identity theft; penalty; restitution; victim assistance HB 872 ~ WA Notice of a breach of the security SB 6043 ~ EU Directive on Privacy and Electronic Communications 2002/58/EC ~ EU Directive on Data Protection 95/46/EC ~ US Department of Commerce EU Safe Harbor Privacy Principles ~ ...Consumer Interests in the Telecommunications Market Act No. 661 ~ Directive On Privacy And Electronic Communications 2002.58.EC ~ OECD Technology Risk Checklist ~ OECD Guidelines on...Privacy and Transborder Flows of Personal Data ~ UN Guidelines for the Regulation of Computerized
  • 20. Thinking about Information Governance for SharePoint?Are you going to break the “experience”?Thinking about Information Governance for SharePoint?Do you have other content outside of SharePoint that needs to be archived?What aren’t you using SharePoint for?How would you describe your use of SharePoint in the following areas:Old content that shouldn’t be in SharePoint anyway……But needs to be managed according to regulatory and corporate policies…51%…that you might just need to provide in the event you get sued57%72%AIIM Industry Watch: “SharePoint Strategies and Experiences,” July 2010
  • 21. The IdealProvideretention and control of archived business-relevant SharePoint contentHelp manage the growing number of outdated/orphaned SharePoint sites and contentShorten our backup windows and maintain performanceEnable centralized management & access for content from SharePoint
  • 22. The Operational RequirementsTo scale to 100s of millions of documents customers need to distribute the data to several databases and sites – or “remove” / “move” dataEnsure scalabilityMaintain performanceMeet backup windows
  • 23. Big savings through ExternalizationSharePoint End UserSQL ServerBLOB HandlerMetadataMetadataContentLeverage Microsoft’s preferred method for externalizationReduce load on SQLReduce costs via tiered storageMaintain end-user experienceEnsure performance & scalabilityObjectObject
  • 24. The Information Governance RequirementsTo manage the 100s of sites and millions of documents that are orphaned or inactive customers must ensure policies are in place for governing the content once it has left SharePointMaintain retention & controlLitigation readinessContent accessibility
  • 25. Supplemental ECMEmbrace and Extend Workloads with PartnersFoundational ECMPhysical Records ManagementScanning and CaptureTransactional Content ManagementBusiness Process ManagementArchiving and Library ServicesDocument Output ManagementRich Media ManagementWeb Content ManagementRecords ManagementDocument ManagementHuman Centric WorkflowSharePoint ECM
  • 26. Information Intelligence for SharePointPhysical Records ManagementScanning and CaptureTransactional Content ManagementBusiness Process ManagementArchiving and Library Services
  • 27. Information Intelligence for SharePointPhysical Records ManagementScanning and CaptureTransactional Content ManagementBusiness Process ManagementArchiving and Library ServicesInformation AccessInformation GovernanceIntelligent CaptureMaintain the SharePoint experience while connecting active content to active processes Enable instant access by moving physical documents into SharePointEnsure centralized compliance, archival & eDiscovery and maintain retention and control on inactive dataCustom Consulting RequirementsStorage
  • 28. Information Intelligence for SharePointPhysical Records ManagementScanning and CaptureTransactional Content ManagementBusiness Process ManagementArchiving and Library ServicesEMC SourceOne for Microsoft SharePoint
  • 29. EMC SourceOne for Microsoft SharePointArchiving and Library ServicesOperational EfficienciesInformation GovernanceEnd-User TransparencyFor Microsoft SharePointInformation GovernanceEnsure centralized compliance, archival & eDiscovery and maintain retention and control on inactive data
  • 30. The Operational ValueTo scale to 100s of millions of documents customers need to distribute the data across several databases and sites – or “move” the dataEnhanced scalabilityImproved performanceShorter backupFor Microsoft SharePoint
  • 31. Externalization for Operational EfficienciesSharePoint End UserEMC EBS HandlerMetadataMetadataContentSQL ServerLeverage Microsoft’s preferred method for externalizationReduce load on SQLReduce costs via tiered storageMaintain end-user experienceEnsure performance & scalabilityObjectObject
  • 32. The Information Governance ValueTo manage the 100s of sites and millions of documents that are orphaned or inactive customers must ensure policies are in place for governing the content once it has left SharePointMaintain retention & controlLitigation readinessContent accessibilityFor Microsoft SharePoint
  • 33. Leverage the Power of SourceOneCentralized Information GovernanceSourceOne supports multiple content types for archival including Email & SharePointCentrally manage and administrate all archived content
  • 34. Data Sources and ScopesSelect required data sourceChoose any combination of scopes, such as: An entire farmA specific site within a farmhttp://moss2007Automatically include new scopes added in the futureOr exclude child scopes as required
  • 35. Content Types for ArchivalChoose specific content types, from Libraries to List items, folders and customWhen parent types are selected, child types are automatically also includedChild types can be explicitly excludedTypes can be imported to retrieve metadata column information
  • 36. Content for archival can be defined by:Date
  • 37. VersionContent for archival can be filtered by:Attachment type
  • 39. Select specific business folders for content destinationContent inherits retention policy based on folderSelect processing option:Copy
  • 41. Outline specific schedule for individual archive activitiesDefine how often the process recurs and when the activity endsArchive Schedule
  • 42. Consistent SharePoint user experience Advanced search of “archived” contentGet search results from multiple locations:SourceOne archive SharePoint farmLeverage search to find list items (e.g., contacts, documents, tasks, Wikis, meetings, etc.)SharePoint Search Portal
  • 43. Migrating to SharePoint 2010:A story of good housekeepingEMC SourceOne + Microsoft SharePoint 2010
  • 44. Understand what you have using File IntelligenceWhat type of content do you have?When was the last time it was accessed?
  • 45. Create 3 Simple Buckets…ActiveInactiveDelete…Maintain Good Information Governance
  • 46. Key DifferentiatorsStarted by addressing your most immediate needs
  • 48. Archive based on object state – not just historical
  • 49. Complete end user transparency
  • 50. Built on next generation architecture
  • 53. EMC owns the data center Delivering BenefitsOne single product!
  • 54. SourceOne Archiving for Microsoft SharePoint gives customers a building block approach
  • 56. Using the Microsoft recommended approach for externalizing content organizations can start with the operational challenges – Leveraging only pieces of the SourceOne architecture instead of an “all or nothing” approach
  • 57. Leverage the power of the SourceOne archiving platform
  • 58. Provides a scalable, distributed architecture
  • 60. Consolidates retention policies across content types
  • 61. End-to-end solutions – One-stop shop
  • 62. EMC uniquely offers the software, hardware and services to support SharePoint archiving deployments from planning to long-term supportInformation Intelligence for SharePointPhysical Records ManagementScanning and CaptureTransactional Content ManagementBusiness Process ManagementArchiving and Library ServicesCaptiva for Microsoft SharePointMy Documentum for SharePointRepository Services for Microsoft SharePointSourceOne for Microsoft SharePointEMC Microsoft ConsultingEMC Storage