Design of a WORM Filesystem Terry Stokes Dell EMC/Isilon
|
|
- Muriel Cunningham
- 6 years ago
- Views:
Transcription
1 Design of a WORM Filesystem Terry Stokes Dell EMC/Isilon
2 Who am I? 15+ years in network protocols. Previously worked at Blue Coat Systems, RadioFrame and Microsoft Anti-trust (MCPP). Co-founded a network capture device startup in Currently work in the AIMA group at Isilon. 2
3 Disclaimers Not Isilon Smartlock design. Dated design, developed in I m not a filesystems expert. 3
4 Founded in 2003, folded in Product called the Compliance Appliance. Capture and archive electronic communications. Incorporated a WORM filesystem. 10+ sweat equity employees. Two WORM filesystem patents. Failed to get funding. 4
5 Other Traffic O Enterprise Data Center Traffic Capture ( and IM) Inspection, Analysis, Discovery and Reporting Compliance Appliance Store & Archive 5
6 To Archiver Structured Objects Message Handler MSN-IM Message Handler Exchange Message Handler SMTP Message Handler HTTP Packet Capture Network Tap Network 6
7 IT Litigation & Compliance LDAP Directory SOAP Query & Analysi s Application Dashboard Reports Discovery Workflow SEARCH Messages And Message Relationships Policy-Based Capture, Retention, Access Control Index Store Message Archive Indexer: Message Relationships Archiver: Structured Objects External Storage IM Web Existing Archives 7 Network
8 Remote Office Compliance Officer Indexing and Search Devices Messaging Servers 5 Message Stores Capture Device 2 Capture Device 3 Corp Counsel Internet LOB User Capture Device 1 Firewall Outside Parties: Legal Discovery, Regulatory Enforcement, Audit, Administrator Remote Office Capture Device 4 8
9 WORM Storage 2003 Optical storage (CD-R, optical tape, etc). EMC Centera CE Content-Addressable Storage Content hashed for storage location. NetApp Snaplock Plugin for Data OnTap Software prevents file deletion. 9
10 Customer Research Talked to potential customers. Banks, Brokers, Healthcare, Manufacturers investment firms. Several had home grown software solutions. A few simply backed up optical storage. Issue was greater than simply providing a better WORM storage solution. 10
11 Regulations SOX Section 404, 802 HIPAA Protected Health info Securities Regulations Gramm Leach Bliley Act SEC 17a-4 NASD 3010/3110 NYSE 440/472 Fin Privacy Rule Safeguards Rule Basel-II Supervisory Control CA SB 1386 Privacy and Protection US Patriot Act Cust Identification Pgm ISO Retention & Safeguarding DOD STD ERecords Management 11
12 Multiple Protocols SEC rules are ambiguous: All broker-dealer communications must be held for 3 years on non-rewriteable and nonerasable storage. Originally SEC only enforced storage. Added instant messaging requirement. What about broker web pages? VoIP? Each protocol requires a separate solution. 12
13 Slow Message Retrieval Message discovery requests (from legal and SEC) have a time limit. Many SEC requests involved several brokers, with each broker search taking 2-3 days. By the time search was complete, only a day or two left to review before handover. Didn t know what was being handed over. Legal Discovery industry born from this. 13
14 Deletion of Expired Messages s can hurt you! Harmful s have been used in several notable trials, Microsoft for one. One unexpired can indirectly hold hundreds of expired s on optical storage media. It is important for a company to delete s as soon as regulations allow. 14
15 Survey of Filesystems Reviewed top ten filesystems for ideas. ReiserFS: Uses B+ trees for file objects (inodes, directories and file data). Employs tail packing. Sun XFS: Use B+ trees for tracking free extents and free inodes. Uses extents instead of blocks. 15
16 Extents 16
17 Distributed Storage 17
18 Distributed Storage 18
19 Unsupported Operations 19
20 Specialized Storage Formatted for electronic communications. Instant Messaging HTTP Web Pages VoiceOverIP File content and meta data encrypted. 20
21 Specialized Storage Restricted File Writes Write out entire file or not at all. No appends or modifications. NVRAM backed journal for crashes. Restricted File Reads. Only two types: Read inode (for searches) Read entire file (for viewing/gathering) 21
22 Layered Filesystem 22
23 Data Encryption/Compression Layer 23
24 WORM Layer 24
25 Volume Layout 25
26 Structure Data Message Relationships Msg1 Msg2 Msg3 Attachment Associations INDEX SPACES Att-1 Att-2 Headers: Relational DB Content + Att: Reverse Keyword Structured Objects Msg Protocol Msg Headers Msg Content Msg Attachments Msg Protocol 26
27 Superblock Format 27
28 AG Header Format 28
29 Inode Format 29
30 File Format 30
31 Disk File Format 31
32 Automatic File Deletion Hourly process to delete expired files. Deletion holds table: 32
33 WORM Characteristics Disk structures and data encrypted. Non-standard disk format. Unsupported file and directory operations. Access to file contents restricted via software. 33
34 Performance Characteristics Use of extents. File contents optimized on disk. Tail packing in inode. Read operations optimized for archival. Structured file format. B+ trees for free inodes and extents. 34
35 If I did it again Investigate SED drives. Drop support for off-box storage. Include disk defragmentation scheme. Add rudimentary directory structure. Remove distributed storage by location. 35
36 Questions? 36
Storage for Compliance Applications
Storage for Compliance Applications Karthik Kannan Network Appliance 495 E Java Drive, Sunnyvale CA 94089-1125 Phone: +1-408-822 6000 E-mail: kkannan@netapp.com Presented at the THIC Meeting at the Sony
More informationINTEGRATING EMC XTENDER AND DISKXTENDER FOR ELECTRONIC MESSAGING ARCHIVAL WITH NETAPP NEARSTORE
White Paper INTEGRATING EMC EMAILXTENDER AND DISKXTENDER FOR ELECTRONIC MESSAGING ARCHIVAL WITH NETAPP NEARSTORE Abstract This white paper describes how to use the EMC EmailXtender archiving solution to
More informationXDU On the Road. John Nitti Vice President Worldwide Sales and Marketing
XDU On the Road John Nitti Vice President Worldwide Sales and Marketing DocuLynx Inc. DocuLynx is a privately held, independent, IT software & ASP services company est. in 2004 in Omaha, Nebraska. DocuLynx
More informationEMC E Networked Storage CAS Specialist. Download Full Version :
EMC E20-570 Networked Storage CAS Specialist Download Full Version : https://killexams.com/pass4sure/exam-detail/e20-570 D. During each backup at 1:14 a.m. QUESTION: 131 A CUA running 4.0 has been archiving
More informationOptim. Optim Solutions for Data Governance. R. Kudžma Information management technical sales
Optim Solutions for Data Governance R. Kudžma Information management technical sales kudzma@lt.ibm.com IBM Software Group 10/23/2009 2008 IBM Corporation What is Data Governance Data Governance is the
More informationProofpoint Enterprise Archive for SEC and FINRA Compliance
DATA SHEET Proofpoint Enterprise Archive for SEC and FINRA Compliance PROOFPOINT PROVIDES FINRA AND SEC REGULATED FIRMS WITH: Simplified Regulatory compliance. Helps firms to meet regulatory requirements
More informationIBM Archiving Solution DB2 CommonStore for Lotus Domino
IBM Software Group IBM Email Archiving Solution DB2 CommonStore for Lotus Domino Anthony Tang Advisory Sales Specialist Information Management Software Group Challenges for Notes Administrators Increasing
More informationData Privacy and Cybersecurity
Data Privacy and Cybersecurity Key Contacts Timothy C. Blank Boston +1 617 728 7154 Dr. Olaf Fasshauer National Munich +49 89 21 21 63 28 Joshua H. Rawson New York +1 212 698 3862 Translate Page In an
More informationSarbanes-Oxley Act (SOX)
Sarbanes-Oxley Act (SOX) Introduction The Sarbanes-Oxley (SOX) Act was introduced in 2002 to protect shareholders and the general public from fraudulent accounting activities by bringing greater accountability
More informationMeeting the Compliance Challenge With Microsoft Exchange Server 2007 White Paper
Meeting the E-Mail Compliance Challenge With Microsoft Exchange Server 2007 White Paper Published: October 2006 For the latest information, please see http://www.microsoft.com/exchange Abstract Microsoft
More informationOverview Bank IT examination perspective Background information Elements of a sound plan Customer notifications
Gramm-Leach Bliley Act Section 501(b) and Customer Notification Roger Pittman Director of Operations Risk Federal Reserve Bank of Atlanta Overview Bank IT examination perspective Background information
More informationRegulatory Circular RG Members and Member Firm Organizations. Division of Member and Regulatory Services. Date: October 28, 2009
Regulatory Circular RG09-122 To: From: Members and Member Firm Organizations Division of Member and Regulatory Services Date: October 28, 2009 RE: Supervision of Electronic Communications and Electronic
More informationSQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY
SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY THE INTERSECTION OF COMPLIANCE AND DIGITAL DATA Organizations of all sizes and shapes must comply with government and industry regulations.
More informationSecure Messaging is far more than traditional encryption.
Resellers Secure Messaging TM Secure Messaging Secure Messaging is far more than traditional encryption. It s an easy-to-use encryption and message control platform that empowers greater communication,
More informationAdvanced encryption and message control to complement and enhance your security investment in ZixDLP.
Secure Messaging Encryption and Control for ZixDLP Advanced email encryption and message control to complement and enhance your security investment in ZixDLP. Businesses of every size, in every industry
More informationComplete document security
DOCUMENT SECURITY Complete document security Protect your valuable data at every stage of your workflow Toshiba Security Solutions DOCUMENT SECURITY Without a doubt, security is one of the most important
More informationDELL EMC ISILON CONFIGURATION AS AN ARCHIVE TARGET FOR VERITAS ENTERPRISE VAULT
DELL EMC ISILON CONFIGURATION AS AN ARCHIVE TARGET FOR VERITAS ENTERPRISE VAULT Using a Dell EMC Isilon scale-out NAS cluster to store WORM and Non-WORM Veritas Enterprise Vault (EV) archive content requires
More informationIMlogic IM Manager. A Technical Overview. IM makes it possible IMlogic makes it work
IMlogic makes it work Table of Contents 1.0 Introduction............................................... 3 1.1 Instant Messaging in the Enterprise......................... 3 1.2 Instant Messaging and Security............................
More informationSARBANES-OXLEY (SOX) ACT
SARBANES-OXLEY (SOX) ACT Table of Contents Introduction 03 Who is affected by SOX? 05 Why should my organization 05 comply with SOX? What does SOX require for email 06 compliance? How can my organization
More informationExam : ST Title : Symantec Mail Security 8300 Series (STS) Version : Demo
Exam : ST0-030 Title : Symantec Mail Security 8300 Series (STS) Version : Demo 1. What is a key prerequisite for enabling the end-user Email Spam Quarantine feature? A. Selecting the 'Delete messages sent
More informationTechnical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.
Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple
More informationCipherpost Pro is far more than traditional encryption.
Resellers Cipherpost Pro TM Secure Messaging Cipherpost Pro is far more than traditional encryption. It s an easy-to-use secure messaging and information management platform that empowers greater communication,
More informationarchiving with the IBM CommonStore solution
IBM Software Group E-mail archiving with the IBM CommonStore solution Comprehensive flexible reliable Borut Obran Genis d.o.o. 2006 IBM Corporation Agenda Overview Mailbox management Discovery Compliance
More informationOracle Database Vault
An Oracle White Paper July 2009 Oracle Database Vault Introduction... 3 Oracle Database Vault... 3 Oracle Database Vault and Regulations... 4 Oracle Database Vault Realms... 5 Oracle Database Vault Command
More informationWHITE PAPER PAPERWISE DOCUMENT MANAGEMENT COMPLIANCE WITH SEC 17A-4
WHITE PAPER PAPERWISE DOCUMENT MANAGEMENT COMPLIANCE WITH SEC 17A-4 Prepared By Chris Jones Documentation and Content 417.886.7505 cjones@paperwise.com Prepared On March 20, 2013 TABLE OF CONTENTS Introduction
More informationFinancial Services Compliance
Financial Services Compliance FINRA books and records requirements, including SEC rule 17A for broker dealers, SEC rule 31A-2 and 204-2 for investment advisors Note: This white paper is intended to provide
More informationDon t just manage your documents. Mobilize them!
Don t just manage your documents Mobilize them! Don t just manage your documents Mobilize them! A simple, secure way to transform how you control your documents across the Internet and in your office.
More informationSecure Messaging Mobile App Privacy Policy. Privacy Policy Highlights
Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review
More informationGetting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions
Getting ready for GDPR Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions GDPR Background Single EU-wide Regulation Harmonizes Global User Data Protection across
More informationIBM Internet Security Systems October Market Intelligence Brief
IBM Internet Security Systems October 2007 Market Intelligence Brief Page 1 Contents 1 All About AIX : Security for IBM AIX 1 AIX Adoption Rates 2 Security Benefits within AIX 3 Benefits of RealSecure
More informationGoogle Message Discovery
Google Message Discovery ABOUT GOOGLE APPS Google Apps is a suite of applications that includes Gmail, Google Calendar (shared calendaring), Google Talk (instant messaging and voice over IP), Google Docs
More informationCompliance and Privileged Password Management
Introduces Compliance and Privileged Password Management [ W H I T E P A P E R ] Written by Kris Zupan, CEO/CTO e-dmz Security, LLC April 13, 2007 Compliance and Privileged Password Management Overview
More informationArcSight Express for the Mid-Market
ArcSight Express for the Mid-Market Dhiraj Sharan Software Development Manager September 2009 2009 ArcSight, Inc. All rights reserved. ArcSight and the ArcSight logo are trademarks of ArcSight, Inc. All
More informationBusiness Advantages. In this age of heightened awareness of information security issues...
In this age of heightened awareness of information security issues... Businesses of every size, in every industry both regulated and nonregulated are recognizing the critical value of DeliverySlip. DELIVERYSLIP.COM
More informationFinancial Services Compliance
Financial Services Compliance WHITEPAPER SEC RULE 17A FOR BROKER-DEALERS SEC RULE 31A-2 AND 204-2 FOR INVESTMENT ADVISORS. Financial Services Compliance Whitepaper 2 U.S. Security Exchange Commission -
More informationInformation Security in Corporation
Information Security in Corporation System Vulnerability and Abuse Software Vulnerability Commercial software contains flaws that create security vulnerabilities. Hidden bugs (program code defects) Zero
More informationInformation Lifecycle Management with Oracle Database 10g Release 2 and NetApp SnapLock
Information Lifecycle Management with Oracle Database 10g Release 2 and NetApp SnapLock Regulatory Compliance for Enterprise Data with Oracle Database 10g Release 2 and NetApp SnapLock Arvind Shrisvastava,
More informationNASD NOTICE TO MEMBERS 97-58
NASD NOTICE TO MEMBERS 97-58 NASD Regulation Requests Comment On Proposed Interpretive Material 1031 Regarding Cold Calling Activity; Comment Period Expires October 31, 1997 Suggested Routing Senior Management
More informationCERTIFICATE POLICY CIGNA PKI Certificates
CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationAn Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule
An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule Legal Disclaimer: This overview is not intended as legal advice and should not be taken as such. We recommend that you consult legal
More informationArchiving: Market Needs Overview
ZL TECHNOLOGIES, INC. WHITE PAPER ZL Technologies Inc. 2000 Concourse Drive, San Jose, CA. 95131. 408.240.8989. www.zlti.com Table of Contents Executive Summary... 2 Email Archiving: Market Needs Overview...
More informationICE IM Compliance Overview
ICE IM Compliance Overview January 2017 This material may not be reproduced or redistributed in whole or in part without the express, prior written consent of IntercontinentalExchange, Inc. Copyright Intercontinental
More informationNext Generation E-Discovery and Litigation Holds: What Every GC Should Be Doing Today
: What Every GC Should Be Doing Today ZL TECHNOLOGIES, INC. WHITE PAPER ZL Technologies Inc. 2000 Concourse Drive, San Jose, CA. 95131. 408.240.8989. www.zlti.com Table of Contents Legal holds: What legal
More informationHIPAA Regulatory Compliance
Secure Access Solutions & HIPAA Regulatory Compliance Privacy in the Healthcare Industry Privacy has always been a high priority in the health profession. However, since the implementation of the Health
More informationAspects of Information Lifecycle Management
Oxford University TSM Symposium 2005 Tivoli Storage Manager : Facing the Future St Catherine's College, 27-29 September 2005 IBM TotalStorage Software Aspects of Information Lifecycle Management TSM and
More informationPolicy. Sensitive Information. Credit Card, Social Security, Employee, and Customer Data Version 3.4
Policy Sensitive Information Version 3.4 Table of Contents Sensitive Information Policy -... 2 Overview... 2 Policy... 2 PCI... 3 HIPAA... 3 Gramm-Leach-Bliley (Financial Services Modernization Act of
More informationAgenda. Introduction & Drivers of Networks DLP. Requirements, Challenges of Network DLP. Addressing Network DLP with Fidelis XPS
Agenda Introduction & Drivers of Networks DLP Requirements, Challenges of Network DLP Addressing Network DLP with Fidelis XPS 1 The Value of Network DLP low high 2 DLP Issues Top Concern for CSOs Merrill
More informationData Security: Public Contracts and the Cloud
Data Security: Public Contracts and the Cloud July 27, 2012 ABA Public Contract Law Section, State and Local Division Ieuan Mahony Holland & Knight ieuan.mahony@hklaw.com Roadmap Why is security a concern?
More informationVeritas Enterprise Vault 6.0 What s New
WHITE PAPER: ENTERPRISE SOLUTIONS Veritas Enterprise Vault 6.0 What s New A Review of the Latest Release of Veritas Enterprise Vault Software Now from Symantec White Paper: Symantec Enterprise Solutions
More informationAccess to University Data Policy
UNIVERSITY OF OKLAHOMA Health Sciences Center Information Technology Security Policy Access to University Data Policy 1. Purpose This policy defines roles and responsibilities for protecting OUHSC s non-public
More informationRegulatory Notice 10-21
Regulatory Notice 10-21 SEC Approves New Consolidated FINRA Rules SEC Approval and Effective Dates for New Consolidated FINRA Rules and the Repeal of Certain NASD and Incorporated NYSE Rules Effective
More informationCipherCloud CASB+ Connector for ServiceNow
ServiceNow CASB+ Connector CipherCloud CASB+ Connector for ServiceNow The CipherCloud CASB+ Connector for ServiceNow enables the full suite of CipherCloud CASB+ capabilities, in addition to field-level
More informationUSE CASE FINANCIAL SERVICES
USE CASE FINANCIAL SERVICES Table of Contents Introduction 03 Why get CipherPost Pro? 04 CipherPost Pro overview 05 CipherPost Pro benefits & features 06 CipherPost Pro for the 09 financial industry APPRIVER.COM
More informationIntroduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike
Anonymous Application Access Product Brief Contents Introduction 1 The Safe-T Solution 1 How It Works 2-3 Capabilities 4 Benefits 4 List 5-11 Introduction With the move to the digital enterprise, all organizations
More informationOverview of Archiving. Cloud & IT Services for your Company. EagleMercury Archiving
EagleMercury Email Archiving Part of EagleMercury Security Collaboration Suite Assure compliance, speed ediscovery, and help protect your intellectual property Overview of Email Archiving EagleMercury
More informationCompliance in 5 Steps
Email Compliance in 5 Steps Introduction For most businesses, email is a vital communication resource. Used to perform essential business functions, many organizations rely on email to send sensitive confidential
More informationWhy you MUST protect your customer data
Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are
More informationChapter 10: File System Implementation
Chapter 10: File System Implementation Chapter 10: File System Implementation File-System Structure" File-System Implementation " Directory Implementation" Allocation Methods" Free-Space Management " Efficiency
More informationArcserve UDP Archiving FAQ
Arcserve UDP Archiving FAQ UDP Archiving Setup How long does it take to set up UDP Archiving? Download the Virtual Appliance and install in 30 minutes. Then configure the mail server with journaling or
More informationClick "Continue", then select "Browse for fixes" and click "Continue" again.
Problem Overview ================ Product: IBM Security Guardium Release: 10.5 Fix ID#: Guardium v10.5 FAM for NAS Fix Completion Date: 2018-08-30 Filename: MD5Sum: FAMforNas-V10.6.0.88.zip c39180f260504f3b833c597f9a6ed77c
More informationFeature Set. Intelligent Archiving & ediscovery Software Solutions
Intelligent Email Archiving & ediscovery Software Solutions Summary: SonaVault 6.1 is an on-premise email archiving and ediscovery software solution that is specifically designed to work with Microsoft
More informationEvolved Backup and Recovery for the Enterprise
Evolved Backup and Recovery for the Enterprise with Asigra technology Working gives me confidence in my data protection plan. I know that if I ever need to restore, it will take a few minutes rather than
More informationWHITE PAPER. Iron Mountain Delivers File Archiving Service. By Brian Babineau With Lauren Whitehouse. February, 2009
WHITE PAPER Iron Mountain Delivers File Archiving Service By Brian Babineau With Lauren Whitehouse February, 2009 Table of Contents ESG WHITE PAPER Table of Contents... i Introduction... 1 Why Archive
More informationNew York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines
New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities
More informationGLBA. The Gramm-Leach-Bliley Act
GLBA The Gramm-Leach-Bliley Act Table of content Introduction 03 Who is affected by GLBA? 06 Why should my organization comply with GLBA? 07 What does GLBA require for email compliance? 08 How can my organization
More informationNorth American Market for Electronic Content Archiving
An Osterman Research Industry Survey Report January 2016 Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel: +1 206 683 5683 Tel: +1 206 905 1010 info@ostermanresearch.com
More informationDELL EMC DATA DOMAIN RETENTION LOCK SOFTWARE
WHITEPAPER DELL EMC DATA DOMAIN RETENTION LOCK SOFTWARE A Detailed Review ABSTRACT Enterprises continue to see an exponential growth in the structured and unstructured data that is proliferating across
More informationUNITRENDS CLOUD BACKUP FOR OFFICE 365
UNITRENDS CLOUD BACKUP FOR OFFICE 365 FREQUENTLY ASKED QUESTIONS Unitrends Cloud Backup for Office 365 provides full, automatic protection that is purpose-built for Microsoft SaaS applications, eliminating
More informationOPERATING SYSTEM. Chapter 12: File System Implementation
OPERATING SYSTEM Chapter 12: File System Implementation Chapter 12: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management
More informationU.S. Private-sector Privacy Certification
1 Page 1 of 5 U.S. Private-sector Privacy Certification Outline of the Body of Knowledge for the Certified Information Privacy Professional/United States (CIPP/US ) I. Introduction to the U.S. Privacy
More informationUpgrade Strategies for Oracle E-Business: Leveraging Archiving Best Practices
Upgrade Strategies for Oracle E-Business: Leveraging Archiving Best Practices Cynthia Babb Product Marketing Manager - Optim TM ERP Solutions Dhan Patel Technical Product Manager Optim TM E-Business Solution
More informationEnterprise SM VOLUME 1, SECTION 5.7: SECURE MANAGED SERVICE
VOLUME 1, SECTION 5.7: SECURE MANAGED EMAIL SERVICE 5.7 SECURE MANAGED EMAIL SERVICE (SMES) [C.2.10.8] The Level 3 Team s (SMES) will meet or exceed the Government s requirements for SMES, as defined in
More informationWELCOME TO TIVOLI NOW!
! WELCOME TO TIVOLI NOW! IBM Tivoli Continuous Data Protection for Files IBM Tivoli Storage Manager Express Tivoli Continuous Data Protection for Files Modern (and necessary) Workstation/Laptop Backup
More informationRegulatory Notice 09-64
Regulatory Notice 09-64 Customer Assets Verification of Instructions to Transmit or Withdraw Assets from Customer Accounts Executive Summary As part of their duty to safeguard customer assets and to meet
More informationNetwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationA Guide to Messaging Archiving
A Guide to Messaging Archiving! An Osterman Research White Paper Published January 2008 SPONSORED BY! Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax:
More informationChapter 11: Implementing File Systems
Chapter 11: Implementing File Systems Operating System Concepts 99h Edition DM510-14 Chapter 11: Implementing File Systems File-System Structure File-System Implementation Directory Implementation Allocation
More informationIntegrated solutions for regulatory compliance with Microsoft Windows Server technologies
Integrated solutions for regulatory compliance with Microsoft Windows Server technologies Abstract... 3 Introduction... 3 Current business environment... 3 Solution components... 4 Microsoft Exchange Server
More informationEvaluating Archiving Solutions
Evaluating Email Archiving Solutions THE CLIPPER GROUP ExplorerTM Published Since 1996 Report #TCG2006036 May 9, 2006 Evaluating Email Archiving Solutions Analyst: Dianne McAdam Navigating Information
More informationfor the Dental Industry
for the Dental Industry If you re practicing dentistry, you ll also need to be an expert on email encryption and patient privacy. Dental practices are among the fastest growing adopters of cloud email
More informationNYDFS Cybersecurity Regulations: What do they mean? What is their impact?
June 13, 2017 NYDFS Cybersecurity Regulations: What do they mean? What is their impact? Gus Coldebella Principal, Boston Caroline Simons Principal, Boston Agenda 1) Overview of the new regulations 2) Assessing
More informationTECHNICAL OVERVIEW OF NEW AND IMPROVED FEATURES OF EMC ISILON ONEFS 7.1.1
TECHNICAL OVERVIEW OF NEW AND IMPROVED FEATURES OF EMC ISILON ONEFS 7.1.1 ABSTRACT This introductory white paper provides a technical overview of the new and improved enterprise grade features introduced
More informationCopyright 2011, TeraMedica, Inc.
CHAPTER 1 Implementation Information Make certain that you understand how and who will be providing the support that you need to implement the solution. How many engineering teams are involved in the development
More informationChapter 12: File System Implementation
Chapter 12: File System Implementation Chapter 12: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency
More informationComprehensive Agentless Cloud Backup and Recovery for the Enterprise
Comprehensive Agentless Cloud Backup and Recovery for the Enterprise Asigra, Inc. with Asigra technology Working gives me confidence in my data protection plan. I know that if I ever need to restore, it
More informationOperational Network Security
Tim Boerner April 25, 2013 CS598 Network Security Operational Network Security or how I learned that the purpose of network security has little to do with actually securing the network Introduction Thinking
More informationTracking and Reporting
Secure File Transfer Tracking and Reporting w w w. b i s c o m. c o m 321 Billerica Road, Chelmsford, MA phone: 978-250-1800 email: sales@biscom.com EXECUTIVE SUMMARY The Internet has made it easier than
More informationBetter Decision Making for Information Management
I D C V E N D O R S P O T L I G H T Better Decision Making for Email Information Management July 2008 Adapted from Worldwide Email Archiving Applications 2008 2012 Forecast by Vivian Tero and Laura DuBois,
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationUnlocking the Power of the Cloud
TRANSFORM YOUR BUSINESS With Smarter IT Unlocking the Power of the Cloud Hybrid Networking Managed Security Cloud Communications Software-defined solutions that adapt to the shape of your business The
More informationIBM Content Manager Compliance Solution with IBM System Storage N Series SnapLock devices
IBM Content Manager Compliance Solution with IBM System Storage N Series SnapLock devices Author: Raghuram Tadipatri Senior Manager, IBM tadipatr@us.ibm.com Dated: 5/20/2013 Copyright IBM (2013). This
More informationPolicies & Regulations
Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major
More informationEMC Forum EMC ViPR and ECS: A Lap Around Software-Defined Services
EMC Forum 2014 Copyright 2014 EMC Corporation. All rights reserved. 1 EMC ViPR and ECS: A Lap Around Software-Defined Services 2 Session Agenda Market Dynamics EMC ViPR Overview What s New in ViPR Controller
More informationInformation Lifecycle Management for Business Data. An Oracle White Paper September 2005
Information Lifecycle Management for Business Data An Oracle White Paper September 2005 Information Lifecycle Management for Business Data Introduction... 3 Regulatory Requirements... 3 What is ILM?...
More informationKSi Malta Privacy Policy
KSi Malta Privacy Policy CONTENTS KSi Malta Privacy Policy 6 Details about the data controller & Scope 6 How information is collected from you 7 Legal basis of data processing 8 What information we collect
More informationWhite Paper: Measuring Messaging Services Quality from an End User Perspective
White Paper: Measuring Messaging Services Quality from an End User Perspective www.re-soft.com 203 972 8462 info@re-soft.com Measuring Messaging Services Quality from an End-User Perspective With today
More informationSales Training for DataMotion Products. March, 2014
Sales Training for DataMotion Products March, 2014 Outline Market Overview Product Overviews Competitive Overview Solution Examples 2 Market Overview Compliance is Complicated Financial Payment Card Industry
More informationBasic. $5/user per mo.
Product Suite Intelligent office suite Secure cloud-based file storage per user 30 GB Unlimited Unlimited Access across devices (computer, phone, or tablet) Works without an Internet connection Compatible
More informationAgenda. Introduction. Key Concepts. The Role of Internal Auditors. Business Drivers Identity and Access Management Background
Identity and Access Management IIA Detroit Chapter Dinner Meeting Vis Ta Tech Conference Center January 8, 2008 Stuart McCubbrey Director, Information Technology Audit General Motors Corporation Sajai
More information