A New Approach to Information Governance

Jonathan Preston & Lynn Collier
Our EIG service provides effective management of information ensures that the right information is kept for the right period of time in a manner that guarantees its availability, confidentiality and integrity. Hitachi Data Systems provides you with a cost-effective end-to-end compliance solution, from strategy to implementation.

The Enterprise Information Governance Service from Hitachi Data Systems provides a tried and tested phased approach to identifying, assessing, developing and implementing an information governance framework. Flexible and customizable, the EIG Service from Hitachi Data Systems enables you to optimize your storage solutions and achieve compliance by:

•Identifying relevant regulatory regimes
•Developing EIG policies, such as the creation of retention schedule rules
•Classifying legacy content, identifying duplications, corrupt content and age of content, and identifying completeness of metadata with a view of compliance
•Applying EIG policies to assigned content using automated tools
•Migrating data from current to new systems

Attend this webinar and learn how to:

•Protect and ensure the integrity of your data as a valuable asset
•Manage data in different physical locations and a variety of storage solutions
•Control growing data-related operational cost
•Ensure legal and regulatory compliance across national boundaries
•Ensure consistent information retention schedules
Nov 2 2011
32 mins
A New Approach to Information Governance
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2865)
  • Upcoming (85)
  • Date
  • Rating
  • Views
  • Join us for this live webinar where we will walk through a real-world example in which FireEye Managed Defense analysts utilized the FireEye Platform’s MVX virtual machine technology and endpoint response capabilities to identify, alert, and remediate an active Advanced Persistent Threat (APT) attack.

    In this case study we will cover:

    • How the attacker executed a “smash-and-grab” attack aimed at stealing intellectual property.
    • How FireEye detected the attack as it was beginning and re-secured the network and prevented sensitive data from leaving the client’s networks.
    • Best practices for investigating and responding to similar attacks.
  • Today most companies are witnessing an explosion in the amount of data that they store. According to recent estimates, large databases grow by 65% year over year and 85% of the data contained in these large databases is inactive. This often out-of-control data growth stems from a variety of sources and can have a negative impact on application performance, database management tasks, and overall total costs.

    During this webinar, learn how you can improve application performance while simplifying IT for Oracle applications with Informatica Smart Partitioning and Oracle ZS3 storage appliance.

    In this event, we will share how the combination of Oracle Tiered Storage and Informatica Data Archive Smart Partitioning:
    Reduces the cost of data by enabling storage tiering and compression of referentially intact data partitions
    Improves application performance up to a factor of 6X or more by automatically optimizing datasets for user requests
    Eliminates complex archiving strategies and provides full and rapid access to archived data from the native Oracle Application
  • Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Protiviti's IT Priorities Survey results reveal 2/3 companies are going through a major IT transformation in 2014. Join Protiviti's IT Consulting managing directors to discuss why.
  • Security professionals are increasingly realizing that protecting executives and corporate assets requires more than just “guns and guards.” It requires a proactive strategy to identify and prevent a threat, rather than reacting to one. So how can security professionals be proactive and minimize the threats that originate from the Internet?

    In this webcast we’ll look at how you can use an individual’s online “footprint” to identify potential threats and develop a more effective security plan. We’ll also present a case study of one of our own executives and show why online threat intelligence is not the same as news alerts or monitoring social media for brand buzz.
  • Today's organizations are moving more interactions online through web, mobile and API-enabled web services to empower their customers and increase revenue. Managing the high volume of customer identities and enabling secure interactions across a set of web, mobile and hybrid apps, from a variety of different devices can be challenging.
    On April 24th at 1pm ET, please join David Gormley, Director, Security Solutions for CA Technologies, to learn how you can securely accelerate the delivery of new applications and services, while improving the customer experience across multiple channels of interaction.
  • Presented by the experts with the facts.

    The Inside Story of the Discovery, the Timeline and Solutions to Protect Your Organization. Finally, All of Your Questions Answered.

    Join the conversation and get the latest Heartbleed updates by following @CodenomiconLTD
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • Email Gateway 7.6 including advanced threat defense, hybrid cloud setup and ”ClickProtect” spear phishing protection.
You might also like Promoted
  • Channel
  • Channel profile
Up Down
  • Increase Your IT Agility and Cost-efficiency with HDS Cloud Solutions Recorded: Dec 7 2011 61 mins
    Find out how to build and use your cloud to support your business’s objectives. Learn about new HDS cloud solutions and services that help you create clouds for infrastructure, content and information. Simplify and accelerate your transition to the cloud. Improve your competitive edge and build a foundation for future innovation.

    By attending this webcast, you’ll learn how to
    •Gain agility and react faster to the growing and changing needs of your businesses.
    •Reduce operational and capital costs through a flexible infrastructure that supports cloud delivery models for IT.
    •Simplify and accelerate the adoption of private, hybrid and public cloud with an integrated portfolio of Hitachi cloud technologies, solutions and services.

    Presenter
    Miklos Sandorfi, Chief Strategy Officer, File, Content and Cloud, Hitachi Data Systems
  • Driving Efficiency and cost savings across hospital Information Infrastructures Recorded: Nov 24 2011 40 mins
    Healthcare providers today are experiencing ever increasing data growth and demands for improved services and clinical workflow. Clinicians are demanding faster and simplified access to patient related data, regardless of their location or the data source. IT departments are being asked to manage increasing complexity whilst being asked to provide greater performance and improved service levels in the most cost effective way.

    There is a definite need therefore for improved automation, simplified information management to address the challenge of doing more with less.

    Healthcare Organisations are therefore looking for innovative ways to maximise the efficiency of their existing information infrastructures, whilst at the same time deploying new technology where cost & value can be justified.

    Attend this webinar and hear about:

    - How to maximise the utilisation of your existing Storage Infrastructure to defer procurement
    - Reduce the complexity and cost of maintenance & management
    - Improve responsiveness to demands for new clinical services and applications whilst maintaining service levels
    - Increased IT agility to limit financial impact of changes and improved planning for future upgrades.
  • The Rise of The Information Center Recorded: Nov 22 2011 39 mins
    The promise of Cloud and the reality of the deliverable today provide organisations with a new set of choices when establishing an information governance policy for the future. Driving value and intelligence from the data which must be retained, and that which organisations choose to retain, is key to future profitability, economic efficiency, service provision and competitive edge. Big data, analytics, discovery and content repurposing are all clear objectives now and for the future.

    For commercial enterprises and government institutions alike as the tidal wave of data increases in size, Cloud Services and Cloud Enabled architectures will be crucial in ensuring organisations are not lost in the flood.”

    Attend this webinar and learn how to
    - Establish a cost effective foundation upon which to build a forward-thinking solution for data management
    - Minimise the backup burden created by massive growth in unstructured data
    - Centralise policy management and enforcement across your business
    - Create an economically viable and sustainable infrastructure from which to transition your business to meet future requirements
  • A New Approach to Information Governance Recorded: Nov 2 2011 32 mins
    Our EIG service provides effective management of information ensures that the right information is kept for the right period of time in a manner that guarantees its availability, confidentiality and integrity. Hitachi Data Systems provides you with a cost-effective end-to-end compliance solution, from strategy to implementation.

    The Enterprise Information Governance Service from Hitachi Data Systems provides a tried and tested phased approach to identifying, assessing, developing and implementing an information governance framework. Flexible and customizable, the EIG Service from Hitachi Data Systems enables you to optimize your storage solutions and achieve compliance by:

    •Identifying relevant regulatory regimes
    •Developing EIG policies, such as the creation of retention schedule rules
    •Classifying legacy content, identifying duplications, corrupt content and age of content, and identifying completeness of metadata with a view of compliance
    •Applying EIG policies to assigned content using automated tools
    •Migrating data from current to new systems

    Attend this webinar and learn how to:

    •Protect and ensure the integrity of your data as a valuable asset
    •Manage data in different physical locations and a variety of storage solutions
    •Control growing data-related operational cost
    •Ensure legal and regulatory compliance across national boundaries
    •Ensure consistent information retention schedules
  • Maintaining and Supporting IT, New Operating Models Recorded: Oct 12 2011 24 mins
    Focusing existing IT resources in areas that add growth to the bottom line has become a top challenge for IT organizations. According to IDC, companies are spending over 90% of their budgets in maintaining and managing the existing environment. Only about 5-10 percent are actually used to drive things like new customer offerings , additional transaction models and business growth. Shortages on skill and resources create additional challenges.

    This Web seminar wants to show ways that allow you to shift resources to higher ended growth domains while pooling day-today-maintenance and administration in a new flexible way.

    Attend this webinar and learn about:
    •Why maintenance and support contracts should become proactive resource centres rather than passive “insurances” for incidents
    •The long term ROIs of your IT as a function of how productive the in-house staff can add to the bottom line
    •The classic model of maintenance and support contracts has to adapt to these challenges and needs to allow more diverse and flexible resources
  • Maintaining and Supporting IT, New Operating Models Recorded: Oct 12 2011 21 mins
    Focusing existing IT resources in areas that add growth to the bottom line has become a top challenge for IT organizations. According to IDC, companies are spending over 90% of their budgets in maintaining and managing the existing environment. Only about 5-10 percent are actually used to drive things like new customer offerings , additional transaction models and business growth. Shortages on skill and resources create additional challenges.

    This Web seminar wants to show ways that allow you to shift resources to higher ended growth domains while pooling day-today-maintenance and administration in a new flexible way.

    Attend this webinar and learn about:
    •Why maintenance and support contracts should become proactive resource centres rather than passive “insurances” for incidents
    •The long term ROIs of your IT as a function of how productive the in-house staff can add to the bottom line
    •The classic model of maintenance and support contracts has to adapt to these challenges and needs to allow more diverse and flexible resources
  • Balancing Skills & Resources with Your Storage Growth Recorded: Jul 14 2011 37 mins
    As labour and skills are fast becoming the most sought after resource in the data center, we want to show you examples of how some of our customers cope.

    This 20 minutes web-seminar is focusing of intelligent ways to deploy remote managed operations services for core activities ranging from:

    •Alerting & reporting
    •Trend Analyses
    •Capacity Administration
    •Backup management
    •Chargeback management
    •Full storage management

    Remote Operational Services from Hitachi Data Systems are provided by fully certified team members who help you improve overall efficiencies, meet service level objectives and better storage infrastructure investment.

    This will allow you to focus your scarce resources on the important bits of your business.

    Listen to Trevor Williams - Global Product Manager, Managed Services - and learn how other companies are using these services to their advantage.
  • Deployez une infrastructure previsible de cloud prive Recorded: Jun 16 2011 46 mins
    Hitachi Data Systems et Microsoft ont établi un partenariat stratégique qui a abouti à la mise au point de plusieurs solutions convergentes qui vous aideront à tirer le meilleur parti des systèmes dans lesquels vous avez investi.

    Grâce aux solutions Hitachi basées sur Microsoft Hyper-V Cloud Fast Track, vous pourrez rapidement déployer des machines virtuelles Hyper-V, d'une manière simple et automatisée, sécuriser vos données et évoluer facilement pour accompagner votre croissance.

    Les solutions Hitachi pour Hyper-V Cloud s'inscrivent dans une stratégie globale de solutions de Data Center convergent alliant la disponibilité exceptionnelle du stockage Hitachi et la puissance de calcul élevée des serveurs Hitachi , et les associant aux éléments réseau appropriés.

    Les solutions de Data Center convergent Hitachi sont disponibles dans différentes configurations et avec un plan d'action pour vos opérations d'automatisation et d'orchestration futures. Vous êtes libre de choisir les éléments de cloud qui conviennent le mieux à vos besoins actuels et de progresser à votre rythme.
  • Enabling the Virtual Data Center Recorded: Mar 31 2011 51 mins
    As virtualization becomes more pervasive across the data center, the tight integration between virtualized servers and storage becomes increasingly important.

    Manage and protect information across your entire VMware virtualized infrastructure to provide agility and seamless scalability for virtualized environments and reduce operational costs.

    Offloading storage intensive processes from the VMware vSphere 4.1 environment to Hitachi storage enables significant improvements in VMware performance. It can dynamically scale from hundreds to thousands of virtual machines on a single amalgamated tiered storage infrastructure to keep your environment streaming. This is supported on the Hitachi Adaptable Modular Storage 2000 family and the new Hitachi Virtual Storage Platform.

    Join our webinar and learn how to:

    •Control costs due to virtual server sprawl by consolidating on the Hitachi Virtualized Storage Platform
    •Improve quality of service (QoS) to meet increasingly demanding and growing [virtualized] application requirements
    •Assess the performance advantages of virtual storage platforms for large scale deployments (more than 10k) of virtual desktops (Citrix and VMware View) with the Hitachi Virtualized Storage Platform
  • Hitachi Clinical Repository: Clinical Transformation Recorded: Mar 17 2011 31 mins
    Hitachi Clinical Repository – The Foundation of Your Clinical Transformation

    Discover the key challenges that currently prohibit clinical information sharing; and how these act as a barrier to information integration and access.

    Interoperability is a critical piece of any hospital’s Electronic Health Record strategy – one which relies heavily on consolidation of patient information necessary for physicians to make well informed patient care decisions.

    Effective Electronic Health Record implementation requires consolidation of different departmental systems in order to adequately access the longitudinal record. There are strong drivers for interoperability of patient data; storage virtualization, consolidation and metadata-based open repositories are key enablers to help achieve this.

    Attend this webinar and learn about:

    •The benefits of a patient-centric view of information
    •Approaches to Infrastructure & and it’s impact for healthcare transforming technologies
    •Attaining application and storage architecture independence
    •The benefits of unlocking your most vital asset; information
    •Applying a “future-proof” approach to deploying 21st century solutions
  • Data Deduplication - Hitachi Data Systems and FalconStor VTL Recorded: Mar 3 2011 29 mins
    Backup is critical to protecting data and ensuring its recoverability.

    However, backup applications, by design, continuously create new copies of the same data, resulting in an explosion of required storage capacity on tape and disk.

    The HDS & FalconStor data deduplication solution integrates seamlessly into your backup environment to address this problem, slashing media costs, streamlining management tasks, and minimizing the bandwidth required for replication. Data deduplication improves efficiency and saves money—exactly what is needed when IT budgets are tight.

    •Eliminate redundant data
    •Shrink your backup repository by 95%
    •Reduce your storage requirements and maximize storage utilization
    •Integrate seamlessly with backup software
    •Maintain tape backup processes while maximizing data retention on disk
    •Enable cost-effective, high performance D2T and D2D backup operations

    The deduplication solution includes disk mirroring to protect against local storage failure as well as replication to protect against disasters. The solution also includes a failover capability, which lets you recover data and respond to business requirements even if multiple nodes in a cluster fail. This same clustering approach allows you to scale to meet growing capacity and performance requirements while enhancing the overall deduplication efficiency. Clustering enables separate FalconStor VTL devices to be managed and used logically as a single data repository, supporting even the largest data requirements.

    Attend this live webcast and:
    •Learn how Hitachi Adaptable Modular Storage and FalconStor Virtual Tape Library with Deduplication can improve the backup and recovery of your data
    •Improve recovery reliability, speed, availability and capacity
    •Reduce the amount of date you need to store using deduplication
  • Transform Your Data Center with Hitachi Data Systems VSP Recorded: Feb 3 2011 45 mins
    Transform Your Data Center with Hitachi Data Systems Virtual Storage Platform
  • Vendor neutral healthcare solutions, Hitachi Data System's vision Recorded: Feb 3 2011 39 mins
    Vendor neutral healthcare solutions, Hitachi Data System's vision
  • Reduce storage cost to 40% with Hitachi file & content solutions Recorded: Feb 3 2011 55 mins
    Reduce storage cost up to 40% with Hitachi file and content solutions
  • Managing midrange storage in enterprise environments Recorded: Feb 3 2011 64 mins
    Managing midrange storage in enterprise environments
  • Transforming IT for the Future Recorded: Feb 2 2011 46 mins
    Under conditions of shrinking budgets, organizational change and increased competition, enterprises are being challenged to make information both available and secure while their IT organizations are asked to do more with less. Join Bob Plumridge, CTO at Hitachi Data Systems EMEA & Chairman for SNIA Europe discussing his thoughts on transforming IT for the future and how Hitachi are solving the industry’s most pressing challenges with their approach of one platform for all data, coupled with their leadership in virtualization technology. He will discuss the latest major steps toward transforming the way companies implement IT and turn their raw data into valuable information that offers scalability and adaptability for the future.

    As CTO for Hitachi Data Systems Bob is responsible for aligning technology vision with business strategy and evangelising this vision to the press, analysts and existing and potential customers. With over 30 years experience in storage, Bob’s expertise is both wide and deep having worked in many roles in the industry from Field Engineering to Technical Product Support through to his present CTO role.Bob has worked for a variety of companies including ICL, Memorex Telex and EMC prior to joining HDS in 1988. Also Bob is currently the Chairman of the Board of Directors of the Storage Networking Industry Association (SNIA) for EMEA.
  • Transform Your Data Centre with Hitachi Data Systems VSP & HCS7 Recorded: Jan 27 2011 38 mins
    Hitachi Data Systems has seen significant take-up of its Virtual Storage Platform (VSP) and Hitachi Command Suite 7.0 (HCS) since the launch in September 2010.

    The 3D scaling and automated dynamic tiering are assisting customers to meet increasing workload requirements in both open and mainframe environments.

    Attend this live webcast and learn how to:

    1) Deliver twice the performance as verified by the Storage Performance Council
    2) Achieve up to 40% better power efficiency
    3) Store 40% more data per square foot and reclaim data centre space
    4) Simplify storage management and provide business intelligence
    5) Automate data placement to lower storage costs using the new Hitachi Dynamic Tiering Facility
Data Drives Our World and Information is the New Currency
Webcasts for IT professionals
You might also like Promoted
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A New Approach to Information Governance
  • Live at: Nov 2 2011 10:00 am
  • Presented by: Jonathan Preston & Lynn Collier
  • From:
Your email has been sent.
or close
You must be logged in to email this