SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
Novell File Management Suite
Enhancing Novell Filr
© Novell, Inc. All rights reserved.2
Governing Data - Front and Center
“In short, if you're looking to implement a data governance program, stop looking
for a single, comprehensive solution. It doesn't exist. Instead, build up a portfolio
of solutions, small and large, customizing your approach (and architecture) to
your own organization.” Information Week – Data Governance: No Single Solution. November 2012
A huge percentage of employees have access to information they don’t
need for their roles in the company, thus introducing unnecessary risks in
terms of how that data can either be accidentally or purposely compromised.
© Novell, Inc. All rights reserved.3
Files Matter – Unstructured Data
Relocate
Find
Govern
• 80% unstructured data
• 60% compound annual growth rate
 41% active frequent access
 21% active non-frequent access
 18% inactive obsolete
 19% don’t know: dark data
• What’s on your Network?
Novell File Reporter
© Novell, Inc. All rights reserved.5
Problem:
What is on the Network
“Our new NAS device is already 40 percent full. We
just bought it two months ago!
I need to know what files we’re storing on the
network, who is storing them, how important they are,
if we have a problem with duplicate files, and
anything else I can find out.
And I need to know now.”
© Novell, Inc. All rights reserved.6
Problem:
Rights Knowledge
“I was just notified that an employee is being
investigated for sharing highly sensitive files.
This can affect our standing as a government
contractor.
I have disabled this employee’s account, but I need
to know now exactly what rights he has across the
network.”
© Novell, Inc. All rights reserved.7
Novell® File Reporter - Find
Inventories network file systems and generates reports
detailing the files being stored on your terabytes of
network storage
• What are you storing?
• Who does it belong to?
• How is it being used?
• Where is it?
• Who has access to it?
• How did they gain access to it?
Across the entire line of business
© Novell, Inc. All rights reserved.8
Novell Storage Manager
© Novell, Inc. All rights reserved.10
Problem:
Manual Storage Creation
“The new school year begins next week
and we need to create over 10,000
student and faculty home folders, with
disk quota settings and rights.
This is going to take all week, and I’m not
positive we’re going to get all of these
settings established correctly.”
We need help!”
© Novell, Inc. All rights reserved.11
Problem:
Identity Management Systems and File
Storage
“The identity management system we deployed last
year is adequately managing our users’ access to
applications—but it is not giving them access to files
stored on the network.
Is there a solution that can tie into identity
management systems and grant or revoke access to
network data?”
© Novell, Inc. All rights reserved.12
Novell® Storage Manager - Govern
Automation of the file management processes and complete
lifecycle of user and collaborative network file storage based
on the Identity and role of users in the organization
Event driven policies consistently:
•Provision individual and collaborative storage
•Manage and enforce permissions
•Manage quotas
•Groom files
•Automate transfers and moves
•Migrate data
Works with any identity management system
© Novell, Inc. All rights reserved.13
Novell Storage Manager
Identity-driven File Management
Identity-driven
Storage Provisioning
Create
User
Vault
Files
Deferred
Delete
Delete
Immediate
Automate
Transfers
& Moves
Delete
User
Set / Manage File
Rights & Ownership
Provision
Role Based
Data
Manage
Quota
Manage
Renames
Collaborative
Identity
Management
HR System
Disabled
User Policy
Manage Profile
Attributes
NSM
Reports
Analyse
File
Grooming
NSM
Policies
Novell Dynamic File Services
© Novell, Inc. All rights reserved.15
Problem:
Intelligent File Tiering
“Is there are way I can tier my file system based on
ownership, usage, content, or size and still give my
users access to all their data in on place?”
© Novell, Inc. All rights reserved.16
Problem:
Controlling Data in the Cloud
“How can I utilize cloud storage for file archiving and
maintain the continuity of the files? Particularly the
file owner and last access dates when moving files to
and from cloud storage.”
© Novell, Inc. All rights reserved.17
Novell® Dynamic File Services - Relocate
Tier data between Microsoft network shares based on compliance
needs while giving users access to all their files in one place. Or
use our intelligent policy engine to remove and archive files.
•Merged view between Microsoft network shares
•Maintain metadata and ownership
•Archive data to Microsoft network shares
•Archive data to Amazon S3, Box, CloudMe, or Dropbox
•Control your cloud archive from one console
•Storage vendor agnostic
Built for Microsoft environments
Note: Novell Dynamic File Services is for Windows environments only. We’ve included
similar functionality for Open Enterprise Server in Dynamic Storage Technology (DST).
Work Used to Be…
19 © Novell, Inc. All rights reserved.
Now, Work Can Happen
Anywhere
Some Call This Mobility
© Novell, Inc. All rights reserved.20
Some Call This Mobility
Some Call This Mobility
© Novell, Inc. All rights reserved.21
© Novell, Inc. All rights reserved.22
Novell® Filr
Secure mobile device
access to files
IT remains in control of
what’s shared and how
Users can access home
directories and folders
© Novell, Inc. All rights reserved.23 © Novell, Inc. All rights reserved.23
0
1 Million
2 Million
3 Million
4 Million
5 Million
6 Million
7 Million
8 Million
2005 2006 2007 2008 2009 2010
CORPORATE DATA BREACH
Every year the cost to recover from a
goes higher and higher
© Novell, Inc. All rights reserved.24
File System Chaos
What’s on your File System?
Know exactly what’s available for
access and sharing
Who has access… and to what?
Know what rights users have in
Filr-enabled network areas
Hidden Access
Know what groups users have
rights to
© Novell, Inc. All rights reserved.28
Something to Share
Make sure every user has a
directory to share with Filr
Compliant
Remain in compliance with
organizational policies
Control the chaos
Filr is opening
the door to a
new enterprise
file sharing
experience
File Reporter
Identifies areas
of concern
regarding
rights and data
in the file
system
Storage
Manager
remediates
these concerns
and enforces
policies moving
forward
Demo
© Novell, Inc. All rights reserved.33
We Know the Problem
Novell Storage Manager
Novell File Reporter
Novell Dynamic File Services
Novell File Management Suite
eDirectory
eDirectory
Active Directory
Novell Storage Manager
Novell File Reporter
OES Dynamic Storage Technology
Novell File Management Suite for OES New
801.861.7000 (Worldwide)
800.453.1267 (Toll-free)
Corporate Headquarters
1800 South, Novell Place
Provo, Utah 84606
Join us on:
www.novell.com
© Novell, Inc. All rights reserved.34
This document could include technical inaccuracies or typographical errors.
Changes are periodically made to the information herein. These changes
may be incorporated in new editions of this document. Novell, Inc. may
make improvements in or changes to the software described in this
document at any time.
Copyright © 2012 Novell, Inc. All rights reserved.
All Novell marks referenced in this presentation are trademarks or registered
trademarks of Novell, Inc. in the United States. All third-party trademarks are the
property of their respective owners.

Contenu connexe

Tendances

Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responsesshafzonly
 
Harvard university i tv3.2
Harvard university i tv3.2Harvard university i tv3.2
Harvard university i tv3.2kevin_donovan
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User InformationDenodo
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET Journal
 
GWAVACon 2013: Novell Keynote - Dave Wilkes
GWAVACon 2013: Novell Keynote - Dave WilkesGWAVACon 2013: Novell Keynote - Dave Wilkes
GWAVACon 2013: Novell Keynote - Dave WilkesGWAVA
 
Security in cloud (and grid) computing Overview
Security in cloud  (and grid) computing OverviewSecurity in cloud  (and grid) computing Overview
Security in cloud (and grid) computing OverviewTawanda Douglas Muringani
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudIRJET Journal
 
The Enterprise File Fabric for Google Cloud Platform
The Enterprise File Fabric for Google Cloud PlatformThe Enterprise File Fabric for Google Cloud Platform
The Enterprise File Fabric for Google Cloud PlatformHybrid Cloud
 
Supporting Research through "Desktop as a Service" models of e-infrastructure...
Supporting Research through "Desktop as a Service" models of e-infrastructure...Supporting Research through "Desktop as a Service" models of e-infrastructure...
Supporting Research through "Desktop as a Service" models of e-infrastructure...David Wallom
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Mahmuda Rahman
 
2013 bio it world
2013 bio it world2013 bio it world
2013 bio it worldChris Dwan
 
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution BriefThe Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution BriefHybrid Cloud
 
EMC Storage Redefine FILE
EMC Storage Redefine FILEEMC Storage Redefine FILE
EMC Storage Redefine FILEsolarisyougood
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
An introduction of cloud storage
An introduction of cloud storage An introduction of cloud storage
An introduction of cloud storage Wenbin Zhao
 

Tendances (20)

Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responses
 
Harvard university i tv3.2
Harvard university i tv3.2Harvard university i tv3.2
Harvard university i tv3.2
 
cloud abstract
cloud abstractcloud abstract
cloud abstract
 
Cl104
Cl104Cl104
Cl104
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User Information
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
 
GWAVACon 2013: Novell Keynote - Dave Wilkes
GWAVACon 2013: Novell Keynote - Dave WilkesGWAVACon 2013: Novell Keynote - Dave Wilkes
GWAVACon 2013: Novell Keynote - Dave Wilkes
 
federal reserve.
federal reserve.federal reserve.
federal reserve.
 
Security in cloud (and grid) computing Overview
Security in cloud  (and grid) computing OverviewSecurity in cloud  (and grid) computing Overview
Security in cloud (and grid) computing Overview
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
 
Oruta
OrutaOruta
Oruta
 
The Enterprise File Fabric for Google Cloud Platform
The Enterprise File Fabric for Google Cloud PlatformThe Enterprise File Fabric for Google Cloud Platform
The Enterprise File Fabric for Google Cloud Platform
 
DirectShare by Cloudtenna
DirectShare by CloudtennaDirectShare by Cloudtenna
DirectShare by Cloudtenna
 
Supporting Research through "Desktop as a Service" models of e-infrastructure...
Supporting Research through "Desktop as a Service" models of e-infrastructure...Supporting Research through "Desktop as a Service" models of e-infrastructure...
Supporting Research through "Desktop as a Service" models of e-infrastructure...
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
 
2013 bio it world
2013 bio it world2013 bio it world
2013 bio it world
 
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution BriefThe Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
 
EMC Storage Redefine FILE
EMC Storage Redefine FILEEMC Storage Redefine FILE
EMC Storage Redefine FILE
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
An introduction of cloud storage
An introduction of cloud storage An introduction of cloud storage
An introduction of cloud storage
 

En vedette

GWAVACon - SEP sesam Backup: we care about your data (deutsch)
GWAVACon - SEP sesam Backup: we care about your data (deutsch)GWAVACon - SEP sesam Backup: we care about your data (deutsch)
GWAVACon - SEP sesam Backup: we care about your data (deutsch)GWAVA
 
This is why you should come to gwava con
This is why you should come to gwava conThis is why you should come to gwava con
This is why you should come to gwava conGWAVA
 
GWAVACon 2015: Microsoft MVP - Ist die Cloud wirklich sicher?
GWAVACon 2015: Microsoft MVP - Ist die Cloud wirklich sicher?GWAVACon 2015: Microsoft MVP - Ist die Cloud wirklich sicher?
GWAVACon 2015: Microsoft MVP - Ist die Cloud wirklich sicher?GWAVA
 
GWAVACon - SEP Sesam Backup: We care about your data (English)
GWAVACon - SEP Sesam Backup: We care about your data (English)GWAVACon - SEP Sesam Backup: We care about your data (English)
GWAVACon - SEP Sesam Backup: We care about your data (English)GWAVA
 
GWAVACon 2013: Keynote SEP - Hubert Schweinesbein
GWAVACon 2013: Keynote SEP - Hubert SchweinesbeinGWAVACon 2013: Keynote SEP - Hubert Schweinesbein
GWAVACon 2013: Keynote SEP - Hubert SchweinesbeinGWAVA
 
GWAVACon - Secure and managed file transfer (English)
GWAVACon - Secure and managed file transfer (English)GWAVACon - Secure and managed file transfer (English)
GWAVACon - Secure and managed file transfer (English)GWAVA
 
GWAVACon - Office 365 OverviewThis tray got something for everybody!
GWAVACon - Office 365 OverviewThis tray got something for everybody!GWAVACon - Office 365 OverviewThis tray got something for everybody!
GWAVACon - Office 365 OverviewThis tray got something for everybody!GWAVA
 
Open Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor DeutschOpen Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor DeutschGWAVA
 

En vedette (8)

GWAVACon - SEP sesam Backup: we care about your data (deutsch)
GWAVACon - SEP sesam Backup: we care about your data (deutsch)GWAVACon - SEP sesam Backup: we care about your data (deutsch)
GWAVACon - SEP sesam Backup: we care about your data (deutsch)
 
This is why you should come to gwava con
This is why you should come to gwava conThis is why you should come to gwava con
This is why you should come to gwava con
 
GWAVACon 2015: Microsoft MVP - Ist die Cloud wirklich sicher?
GWAVACon 2015: Microsoft MVP - Ist die Cloud wirklich sicher?GWAVACon 2015: Microsoft MVP - Ist die Cloud wirklich sicher?
GWAVACon 2015: Microsoft MVP - Ist die Cloud wirklich sicher?
 
GWAVACon - SEP Sesam Backup: We care about your data (English)
GWAVACon - SEP Sesam Backup: We care about your data (English)GWAVACon - SEP Sesam Backup: We care about your data (English)
GWAVACon - SEP Sesam Backup: We care about your data (English)
 
GWAVACon 2013: Keynote SEP - Hubert Schweinesbein
GWAVACon 2013: Keynote SEP - Hubert SchweinesbeinGWAVACon 2013: Keynote SEP - Hubert Schweinesbein
GWAVACon 2013: Keynote SEP - Hubert Schweinesbein
 
GWAVACon - Secure and managed file transfer (English)
GWAVACon - Secure and managed file transfer (English)GWAVACon - Secure and managed file transfer (English)
GWAVACon - Secure and managed file transfer (English)
 
GWAVACon - Office 365 OverviewThis tray got something for everybody!
GWAVACon - Office 365 OverviewThis tray got something for everybody!GWAVACon - Office 365 OverviewThis tray got something for everybody!
GWAVACon - Office 365 OverviewThis tray got something for everybody!
 
Open Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor DeutschOpen Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor Deutsch
 

Similaire à GWAVACon 2013: Novell File Management Suite Enhancing Novell Filr

GWAVACon - Files Matters (English)
GWAVACon - Files Matters (English)GWAVACon - Files Matters (English)
GWAVACon - Files Matters (English)GWAVA
 
GWAVACon 2015: Micro Focus - Novell File Reporter
GWAVACon 2015: Micro Focus - Novell File ReporterGWAVACon 2015: Micro Focus - Novell File Reporter
GWAVACon 2015: Micro Focus - Novell File ReporterGWAVA
 
Novell File Management Suite Use Cases
Novell File Management Suite Use CasesNovell File Management Suite Use Cases
Novell File Management Suite Use CasesNovell
 
Novell File Management Suite Use Cases
Novell File Management Suite Use CasesNovell File Management Suite Use Cases
Novell File Management Suite Use CasesNovell
 
Database Systems
Database SystemsDatabase Systems
Database SystemsUsman Tariq
 
Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014kevintsmith
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsjayussuryawan
 
Current trends in dbms
Current trends in dbmsCurrent trends in dbms
Current trends in dbmsDaisy Joy
 
Data Analytics: HDFS with Big Data : Issues and Application
Data Analytics:  HDFS  with  Big Data :  Issues and ApplicationData Analytics:  HDFS  with  Big Data :  Issues and Application
Data Analytics: HDFS with Big Data : Issues and ApplicationDr. Chitra Dhawale
 
Database Systems
Database SystemsDatabase Systems
Database SystemsUsman Tariq
 
Complete dbms notes
Complete dbms notesComplete dbms notes
Complete dbms notesTanya Makkar
 
Data Base Management Systems
Data Base Management SystemsData Base Management Systems
Data Base Management SystemsRaj vardhan
 
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...dbpublications
 
The Journey to Data Mesh with Confluent
The Journey to Data Mesh with ConfluentThe Journey to Data Mesh with Confluent
The Journey to Data Mesh with Confluentconfluent
 

Similaire à GWAVACon 2013: Novell File Management Suite Enhancing Novell Filr (20)

GWAVACon - Files Matters (English)
GWAVACon - Files Matters (English)GWAVACon - Files Matters (English)
GWAVACon - Files Matters (English)
 
Cl107
Cl107Cl107
Cl107
 
GWAVACon 2015: Micro Focus - Novell File Reporter
GWAVACon 2015: Micro Focus - Novell File ReporterGWAVACon 2015: Micro Focus - Novell File Reporter
GWAVACon 2015: Micro Focus - Novell File Reporter
 
Novell File Management Suite Use Cases
Novell File Management Suite Use CasesNovell File Management Suite Use Cases
Novell File Management Suite Use Cases
 
Novell File Management Suite Use Cases
Novell File Management Suite Use CasesNovell File Management Suite Use Cases
Novell File Management Suite Use Cases
 
FILR Demo
FILR DemoFILR Demo
FILR Demo
 
Files matter-fms
Files matter-fmsFiles matter-fms
Files matter-fms
 
Database Systems
Database SystemsDatabase Systems
Database Systems
 
Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
 
INT 1010 07-2.pdf
INT 1010 07-2.pdfINT 1010 07-2.pdf
INT 1010 07-2.pdf
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systems
 
Big Data
Big DataBig Data
Big Data
 
Current trends in dbms
Current trends in dbmsCurrent trends in dbms
Current trends in dbms
 
Data Analytics: HDFS with Big Data : Issues and Application
Data Analytics:  HDFS  with  Big Data :  Issues and ApplicationData Analytics:  HDFS  with  Big Data :  Issues and Application
Data Analytics: HDFS with Big Data : Issues and Application
 
Database Systems
Database SystemsDatabase Systems
Database Systems
 
Complete dbms notes
Complete dbms notesComplete dbms notes
Complete dbms notes
 
Data Base Management Systems
Data Base Management SystemsData Base Management Systems
Data Base Management Systems
 
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
 
The Journey to Data Mesh with Confluent
The Journey to Data Mesh with ConfluentThe Journey to Data Mesh with Confluent
The Journey to Data Mesh with Confluent
 

Plus de GWAVA

Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen GWAVA
 
Open Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit RunOpen Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit RunGWAVA
 
Open Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor EnglishOpen Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor EnglishGWAVA
 
Micro Focus iPrint
Micro Focus iPrintMicro Focus iPrint
Micro Focus iPrintGWAVA
 
GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1GWAVA
 
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...GWAVA
 
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application VirtualizationDesktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application VirtualizationGWAVA
 
Open Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows worldOpen Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows worldGWAVA
 
ZENworks 2017 - Overview
ZENworks 2017 - OverviewZENworks 2017 - Overview
ZENworks 2017 - OverviewGWAVA
 
Vibe Custom Development
Vibe Custom DevelopmentVibe Custom Development
Vibe Custom DevelopmentGWAVA
 
Third Party Client Access to GroupWise
Third Party Client Access to GroupWiseThird Party Client Access to GroupWise
Third Party Client Access to GroupWiseGWAVA
 
Gwava Cloud Offering
Gwava Cloud OfferingGwava Cloud Offering
Gwava Cloud OfferingGWAVA
 
Let’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and FeaturesLet’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and FeaturesGWAVA
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the CloudGWAVA
 
Exchange 2016 Cloud Migration
Exchange 2016 Cloud MigrationExchange 2016 Cloud Migration
Exchange 2016 Cloud MigrationGWAVA
 
Large Scale GWAVA 7
Large Scale GWAVA 7Large Scale GWAVA 7
Large Scale GWAVA 7GWAVA
 
GWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYINGGWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYINGGWAVA
 
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)GWAVA
 
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines AnwendersRetain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines AnwendersGWAVA
 
Mobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with RetainMobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with RetainGWAVA
 

Plus de GWAVA (20)

Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen
 
Open Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit RunOpen Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit Run
 
Open Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor EnglishOpen Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor English
 
Micro Focus iPrint
Micro Focus iPrintMicro Focus iPrint
Micro Focus iPrint
 
GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1
 
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
 
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application VirtualizationDesktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
 
Open Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows worldOpen Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows world
 
ZENworks 2017 - Overview
ZENworks 2017 - OverviewZENworks 2017 - Overview
ZENworks 2017 - Overview
 
Vibe Custom Development
Vibe Custom DevelopmentVibe Custom Development
Vibe Custom Development
 
Third Party Client Access to GroupWise
Third Party Client Access to GroupWiseThird Party Client Access to GroupWise
Third Party Client Access to GroupWise
 
Gwava Cloud Offering
Gwava Cloud OfferingGwava Cloud Offering
Gwava Cloud Offering
 
Let’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and FeaturesLet’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and Features
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Exchange 2016 Cloud Migration
Exchange 2016 Cloud MigrationExchange 2016 Cloud Migration
Exchange 2016 Cloud Migration
 
Large Scale GWAVA 7
Large Scale GWAVA 7Large Scale GWAVA 7
Large Scale GWAVA 7
 
GWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYINGGWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYING
 
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
 
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines AnwendersRetain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
 
Mobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with RetainMobile Auditing and Archiving with Retain
Mobile Auditing and Archiving with Retain
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

GWAVACon 2013: Novell File Management Suite Enhancing Novell Filr

  • 1. Novell File Management Suite Enhancing Novell Filr
  • 2. © Novell, Inc. All rights reserved.2 Governing Data - Front and Center “In short, if you're looking to implement a data governance program, stop looking for a single, comprehensive solution. It doesn't exist. Instead, build up a portfolio of solutions, small and large, customizing your approach (and architecture) to your own organization.” Information Week – Data Governance: No Single Solution. November 2012 A huge percentage of employees have access to information they don’t need for their roles in the company, thus introducing unnecessary risks in terms of how that data can either be accidentally or purposely compromised.
  • 3. © Novell, Inc. All rights reserved.3 Files Matter – Unstructured Data Relocate Find Govern • 80% unstructured data • 60% compound annual growth rate  41% active frequent access  21% active non-frequent access  18% inactive obsolete  19% don’t know: dark data • What’s on your Network?
  • 5. © Novell, Inc. All rights reserved.5 Problem: What is on the Network “Our new NAS device is already 40 percent full. We just bought it two months ago! I need to know what files we’re storing on the network, who is storing them, how important they are, if we have a problem with duplicate files, and anything else I can find out. And I need to know now.”
  • 6. © Novell, Inc. All rights reserved.6 Problem: Rights Knowledge “I was just notified that an employee is being investigated for sharing highly sensitive files. This can affect our standing as a government contractor. I have disabled this employee’s account, but I need to know now exactly what rights he has across the network.”
  • 7. © Novell, Inc. All rights reserved.7 Novell® File Reporter - Find Inventories network file systems and generates reports detailing the files being stored on your terabytes of network storage • What are you storing? • Who does it belong to? • How is it being used? • Where is it? • Who has access to it? • How did they gain access to it? Across the entire line of business
  • 8. © Novell, Inc. All rights reserved.8
  • 10. © Novell, Inc. All rights reserved.10 Problem: Manual Storage Creation “The new school year begins next week and we need to create over 10,000 student and faculty home folders, with disk quota settings and rights. This is going to take all week, and I’m not positive we’re going to get all of these settings established correctly.” We need help!”
  • 11. © Novell, Inc. All rights reserved.11 Problem: Identity Management Systems and File Storage “The identity management system we deployed last year is adequately managing our users’ access to applications—but it is not giving them access to files stored on the network. Is there a solution that can tie into identity management systems and grant or revoke access to network data?”
  • 12. © Novell, Inc. All rights reserved.12 Novell® Storage Manager - Govern Automation of the file management processes and complete lifecycle of user and collaborative network file storage based on the Identity and role of users in the organization Event driven policies consistently: •Provision individual and collaborative storage •Manage and enforce permissions •Manage quotas •Groom files •Automate transfers and moves •Migrate data Works with any identity management system
  • 13. © Novell, Inc. All rights reserved.13 Novell Storage Manager Identity-driven File Management Identity-driven Storage Provisioning Create User Vault Files Deferred Delete Delete Immediate Automate Transfers & Moves Delete User Set / Manage File Rights & Ownership Provision Role Based Data Manage Quota Manage Renames Collaborative Identity Management HR System Disabled User Policy Manage Profile Attributes NSM Reports Analyse File Grooming NSM Policies
  • 15. © Novell, Inc. All rights reserved.15 Problem: Intelligent File Tiering “Is there are way I can tier my file system based on ownership, usage, content, or size and still give my users access to all their data in on place?”
  • 16. © Novell, Inc. All rights reserved.16 Problem: Controlling Data in the Cloud “How can I utilize cloud storage for file archiving and maintain the continuity of the files? Particularly the file owner and last access dates when moving files to and from cloud storage.”
  • 17. © Novell, Inc. All rights reserved.17 Novell® Dynamic File Services - Relocate Tier data between Microsoft network shares based on compliance needs while giving users access to all their files in one place. Or use our intelligent policy engine to remove and archive files. •Merged view between Microsoft network shares •Maintain metadata and ownership •Archive data to Microsoft network shares •Archive data to Amazon S3, Box, CloudMe, or Dropbox •Control your cloud archive from one console •Storage vendor agnostic Built for Microsoft environments Note: Novell Dynamic File Services is for Windows environments only. We’ve included similar functionality for Open Enterprise Server in Dynamic Storage Technology (DST).
  • 18. Work Used to Be…
  • 19. 19 © Novell, Inc. All rights reserved. Now, Work Can Happen Anywhere
  • 20. Some Call This Mobility © Novell, Inc. All rights reserved.20 Some Call This Mobility
  • 21. Some Call This Mobility © Novell, Inc. All rights reserved.21
  • 22. © Novell, Inc. All rights reserved.22 Novell® Filr Secure mobile device access to files IT remains in control of what’s shared and how Users can access home directories and folders
  • 23. © Novell, Inc. All rights reserved.23 © Novell, Inc. All rights reserved.23 0 1 Million 2 Million 3 Million 4 Million 5 Million 6 Million 7 Million 8 Million 2005 2006 2007 2008 2009 2010 CORPORATE DATA BREACH Every year the cost to recover from a goes higher and higher
  • 24. © Novell, Inc. All rights reserved.24 File System Chaos
  • 25. What’s on your File System? Know exactly what’s available for access and sharing
  • 26. Who has access… and to what? Know what rights users have in Filr-enabled network areas
  • 27. Hidden Access Know what groups users have rights to
  • 28. © Novell, Inc. All rights reserved.28 Something to Share Make sure every user has a directory to share with Filr
  • 29. Compliant Remain in compliance with organizational policies
  • 30. Control the chaos Filr is opening the door to a new enterprise file sharing experience File Reporter Identifies areas of concern regarding rights and data in the file system Storage Manager remediates these concerns and enforces policies moving forward
  • 31. Demo
  • 32. © Novell, Inc. All rights reserved.33 We Know the Problem Novell Storage Manager Novell File Reporter Novell Dynamic File Services Novell File Management Suite eDirectory eDirectory Active Directory Novell Storage Manager Novell File Reporter OES Dynamic Storage Technology Novell File Management Suite for OES New
  • 33. 801.861.7000 (Worldwide) 800.453.1267 (Toll-free) Corporate Headquarters 1800 South, Novell Place Provo, Utah 84606 Join us on: www.novell.com © Novell, Inc. All rights reserved.34
  • 34. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. Novell, Inc. may make improvements in or changes to the software described in this document at any time. Copyright © 2012 Novell, Inc. All rights reserved. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States. All third-party trademarks are the property of their respective owners.