A New Approach to Information Governance

Jonathan Preston & Lynn Collier
Our EIG service provides effective management of information ensures that the right information is kept for the right period of time in a manner that guarantees its availability, confidentiality and integrity. Hitachi Data Systems provides you with a cost-effective end-to-end compliance solution, from strategy to implementation.

The Enterprise Information Governance Service from Hitachi Data Systems provides a tried and tested phased approach to identifying, assessing, developing and implementing an information governance framework. Flexible and customizable, the EIG Service from Hitachi Data Systems enables you to optimize your storage solutions and achieve compliance by:

•Identifying relevant regulatory regimes
•Developing EIG policies, such as the creation of retention schedule rules
•Classifying legacy content, identifying duplications, corrupt content and age of content, and identifying completeness of metadata with a view of compliance
•Applying EIG policies to assigned content using automated tools
•Migrating data from current to new systems

Attend this webinar and learn how to:

•Protect and ensure the integrity of your data as a valuable asset
•Manage data in different physical locations and a variety of storage solutions
•Control growing data-related operational cost
•Ensure legal and regulatory compliance across national boundaries
•Ensure consistent information retention schedules
Nov 2 2011
32 mins
A New Approach to Information Governance
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2855)
  • Upcoming (88)
  • Date
  • Rating
  • Views
  • You are invited to register for our upcoming COSO webinar, COSO 2013: Mapping Controls to Principles. Transitioning to the New COSO Framework is top of mind for many organizations. How do you get started? How do you map controls to principles or vice versa? What are some of the preliminary findings organizations are seeing as they head down the path to implement the framework?

    Please submit top-of-mind questions during the webinar registration process.

    CPE credits will be provided to qualifying attendees.
  • *On this webcast we're giving away a pass to our partner event: the Chicago Cyber Incident Response Summit, between June 21-23, 2014*

    Let’s face it, there’s unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is ‘How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?’ With the advanced threats that are pervasive today, it’s becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.

    In this webinar, William Stewart, Senior Vice President of Booz Allen Hamilton and Jeff Lunglhofer, Principal of Booz Allen Hamilton–a leading management technology and consulting firm driving strategic innovation for clients–will discuss the top trends in cyber threat mitigation, data privacy, data governance, and data security, with Mark Bower, VP Product Management and Solutions Architecture at Voltage Security.

    Attend this webinar to learn more about how to:
    •Increase responsiveness and security in your IT environment and architecture
    •Fight pervasive threats from inside and outside attack with data-centric technologies
    •Raise your organization’s overall data privacy, compliance, and security profile
    •Implement a new data de-identification framework across production, test & dev, and analytics use cases
    •Proactively enable critical business initiatives
    --Can't attend live? Register below to receive a link to the recorded webcast.
  • This webinar is presented by McAfee and Intel to help customers understand their Data Protection solution from McAfee and to get the most business value out of their Intel based endpoints. Products that apply to this webcast include McAfee Complete Data Protection Suites, featuring Endpoint Encryption, and EPO Deep Command to extend the reach of your IT department to lower your total cost of ownership. The webinar will include a special highlight on Intel® Core™ vPro™ Processors and associated technologies that increase productivity and hardware-assisted security in the enterprise. This webcast is provided as a 35-40 minute overview and includes 5-10 minutes of Q & A.

    Join this webinar on Data Protection and learn about:
    • The key features of Data Protection and how it can provide you with the security you need
    • Use cases on utilizing the synergy between Intel® vPro™ and McAfee Data Protection technologies to reduce your overall TCO
    • How you can extend the reach of your IT team with the ability to remotely wake up or even power on PC’s, remediate “disabled” endpoints and remotely reset pre-boot passwords
    • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
  • Modulo Director of Technical Services John Ambra walks Risk Manager users through the latest version 8.4, and answers user questions at the end.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Jack Madden converses with James Rendell to get the CA perspective on Enterprise Mobility Management’s (EMM) future potential. EMM must not for get BYOD but also go beyond it into Mobile App Management (MAM) and find ways to keep users personal information and employers information separated and find a way to embrace the Internet of Things.
  • Jack Madden discusses Enterprise Mobility with Arun Bhattacharya to get the CA perspective on the way it should be. This means going beyond BYOD and MDM, and embracing MAM, MEM, MCM, and IoT. For many companies, finding the balance between employers and users privacy and security has been a problematic issues.
  • Heartbleed is not an exploit you want to ignore as an IT professional. It exposes passwords and cryptographic keys, and requires not only that you patch OpenSSL for each of the services using the OpenSSL library, but also that you replace the private keys and certificates so that attackers won’t be able to use any of the data compromised by the vulnerability. The simplicity of the exploit makes it powerful. It appears that over a half million websites are vulnerable.
    In this session we'll cover:
    What you need to know about the Heartbleed vulvnerability
    How to detect it using AlienVault USM
    How to investigate successful Heartbleed exploits
  • In this webcast we will show:
    1. The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organization
    2. How you can identify your business exposure and what systems are vulnerable
    3. How Tripwire’s solutions work together to help you close the detection, remediation and prevention gaps around Heartbleed
You might also like Promoted
  • Channel
  • Channel profile
Up Down
  • Increase Your IT Agility and Cost-efficiency with HDS Cloud Solutions Recorded: Dec 7 2011 61 mins
    Find out how to build and use your cloud to support your business’s objectives. Learn about new HDS cloud solutions and services that help you create clouds for infrastructure, content and information. Simplify and accelerate your transition to the cloud. Improve your competitive edge and build a foundation for future innovation.

    By attending this webcast, you’ll learn how to
    •Gain agility and react faster to the growing and changing needs of your businesses.
    •Reduce operational and capital costs through a flexible infrastructure that supports cloud delivery models for IT.
    •Simplify and accelerate the adoption of private, hybrid and public cloud with an integrated portfolio of Hitachi cloud technologies, solutions and services.

    Presenter
    Miklos Sandorfi, Chief Strategy Officer, File, Content and Cloud, Hitachi Data Systems
  • Driving Efficiency and cost savings across hospital Information Infrastructures Recorded: Nov 24 2011 40 mins
    Healthcare providers today are experiencing ever increasing data growth and demands for improved services and clinical workflow. Clinicians are demanding faster and simplified access to patient related data, regardless of their location or the data source. IT departments are being asked to manage increasing complexity whilst being asked to provide greater performance and improved service levels in the most cost effective way.

    There is a definite need therefore for improved automation, simplified information management to address the challenge of doing more with less.

    Healthcare Organisations are therefore looking for innovative ways to maximise the efficiency of their existing information infrastructures, whilst at the same time deploying new technology where cost & value can be justified.

    Attend this webinar and hear about:

    - How to maximise the utilisation of your existing Storage Infrastructure to defer procurement
    - Reduce the complexity and cost of maintenance & management
    - Improve responsiveness to demands for new clinical services and applications whilst maintaining service levels
    - Increased IT agility to limit financial impact of changes and improved planning for future upgrades.
  • The Rise of The Information Center Recorded: Nov 22 2011 39 mins
    The promise of Cloud and the reality of the deliverable today provide organisations with a new set of choices when establishing an information governance policy for the future. Driving value and intelligence from the data which must be retained, and that which organisations choose to retain, is key to future profitability, economic efficiency, service provision and competitive edge. Big data, analytics, discovery and content repurposing are all clear objectives now and for the future.

    For commercial enterprises and government institutions alike as the tidal wave of data increases in size, Cloud Services and Cloud Enabled architectures will be crucial in ensuring organisations are not lost in the flood.”

    Attend this webinar and learn how to
    - Establish a cost effective foundation upon which to build a forward-thinking solution for data management
    - Minimise the backup burden created by massive growth in unstructured data
    - Centralise policy management and enforcement across your business
    - Create an economically viable and sustainable infrastructure from which to transition your business to meet future requirements
  • A New Approach to Information Governance Recorded: Nov 2 2011 32 mins
    Our EIG service provides effective management of information ensures that the right information is kept for the right period of time in a manner that guarantees its availability, confidentiality and integrity. Hitachi Data Systems provides you with a cost-effective end-to-end compliance solution, from strategy to implementation.

    The Enterprise Information Governance Service from Hitachi Data Systems provides a tried and tested phased approach to identifying, assessing, developing and implementing an information governance framework. Flexible and customizable, the EIG Service from Hitachi Data Systems enables you to optimize your storage solutions and achieve compliance by:

    •Identifying relevant regulatory regimes
    •Developing EIG policies, such as the creation of retention schedule rules
    •Classifying legacy content, identifying duplications, corrupt content and age of content, and identifying completeness of metadata with a view of compliance
    •Applying EIG policies to assigned content using automated tools
    •Migrating data from current to new systems

    Attend this webinar and learn how to:

    •Protect and ensure the integrity of your data as a valuable asset
    •Manage data in different physical locations and a variety of storage solutions
    •Control growing data-related operational cost
    •Ensure legal and regulatory compliance across national boundaries
    •Ensure consistent information retention schedules
  • Maintaining and Supporting IT, New Operating Models Recorded: Oct 12 2011 24 mins
    Focusing existing IT resources in areas that add growth to the bottom line has become a top challenge for IT organizations. According to IDC, companies are spending over 90% of their budgets in maintaining and managing the existing environment. Only about 5-10 percent are actually used to drive things like new customer offerings , additional transaction models and business growth. Shortages on skill and resources create additional challenges.

    This Web seminar wants to show ways that allow you to shift resources to higher ended growth domains while pooling day-today-maintenance and administration in a new flexible way.

    Attend this webinar and learn about:
    •Why maintenance and support contracts should become proactive resource centres rather than passive “insurances” for incidents
    •The long term ROIs of your IT as a function of how productive the in-house staff can add to the bottom line
    •The classic model of maintenance and support contracts has to adapt to these challenges and needs to allow more diverse and flexible resources
  • Maintaining and Supporting IT, New Operating Models Recorded: Oct 12 2011 21 mins
    Focusing existing IT resources in areas that add growth to the bottom line has become a top challenge for IT organizations. According to IDC, companies are spending over 90% of their budgets in maintaining and managing the existing environment. Only about 5-10 percent are actually used to drive things like new customer offerings , additional transaction models and business growth. Shortages on skill and resources create additional challenges.

    This Web seminar wants to show ways that allow you to shift resources to higher ended growth domains while pooling day-today-maintenance and administration in a new flexible way.

    Attend this webinar and learn about:
    •Why maintenance and support contracts should become proactive resource centres rather than passive “insurances” for incidents
    •The long term ROIs of your IT as a function of how productive the in-house staff can add to the bottom line
    •The classic model of maintenance and support contracts has to adapt to these challenges and needs to allow more diverse and flexible resources
  • Balancing Skills & Resources with Your Storage Growth Recorded: Jul 14 2011 37 mins
    As labour and skills are fast becoming the most sought after resource in the data center, we want to show you examples of how some of our customers cope.

    This 20 minutes web-seminar is focusing of intelligent ways to deploy remote managed operations services for core activities ranging from:

    •Alerting & reporting
    •Trend Analyses
    •Capacity Administration
    •Backup management
    •Chargeback management
    •Full storage management

    Remote Operational Services from Hitachi Data Systems are provided by fully certified team members who help you improve overall efficiencies, meet service level objectives and better storage infrastructure investment.

    This will allow you to focus your scarce resources on the important bits of your business.

    Listen to Trevor Williams - Global Product Manager, Managed Services - and learn how other companies are using these services to their advantage.
  • Deployez une infrastructure previsible de cloud prive Recorded: Jun 16 2011 46 mins
    Hitachi Data Systems et Microsoft ont établi un partenariat stratégique qui a abouti à la mise au point de plusieurs solutions convergentes qui vous aideront à tirer le meilleur parti des systèmes dans lesquels vous avez investi.

    Grâce aux solutions Hitachi basées sur Microsoft Hyper-V Cloud Fast Track, vous pourrez rapidement déployer des machines virtuelles Hyper-V, d'une manière simple et automatisée, sécuriser vos données et évoluer facilement pour accompagner votre croissance.

    Les solutions Hitachi pour Hyper-V Cloud s'inscrivent dans une stratégie globale de solutions de Data Center convergent alliant la disponibilité exceptionnelle du stockage Hitachi et la puissance de calcul élevée des serveurs Hitachi , et les associant aux éléments réseau appropriés.

    Les solutions de Data Center convergent Hitachi sont disponibles dans différentes configurations et avec un plan d'action pour vos opérations d'automatisation et d'orchestration futures. Vous êtes libre de choisir les éléments de cloud qui conviennent le mieux à vos besoins actuels et de progresser à votre rythme.
  • Enabling the Virtual Data Center Recorded: Mar 31 2011 51 mins
    As virtualization becomes more pervasive across the data center, the tight integration between virtualized servers and storage becomes increasingly important.

    Manage and protect information across your entire VMware virtualized infrastructure to provide agility and seamless scalability for virtualized environments and reduce operational costs.

    Offloading storage intensive processes from the VMware vSphere 4.1 environment to Hitachi storage enables significant improvements in VMware performance. It can dynamically scale from hundreds to thousands of virtual machines on a single amalgamated tiered storage infrastructure to keep your environment streaming. This is supported on the Hitachi Adaptable Modular Storage 2000 family and the new Hitachi Virtual Storage Platform.

    Join our webinar and learn how to:

    •Control costs due to virtual server sprawl by consolidating on the Hitachi Virtualized Storage Platform
    •Improve quality of service (QoS) to meet increasingly demanding and growing [virtualized] application requirements
    •Assess the performance advantages of virtual storage platforms for large scale deployments (more than 10k) of virtual desktops (Citrix and VMware View) with the Hitachi Virtualized Storage Platform
  • Hitachi Clinical Repository: Clinical Transformation Recorded: Mar 17 2011 31 mins
    Hitachi Clinical Repository – The Foundation of Your Clinical Transformation

    Discover the key challenges that currently prohibit clinical information sharing; and how these act as a barrier to information integration and access.

    Interoperability is a critical piece of any hospital’s Electronic Health Record strategy – one which relies heavily on consolidation of patient information necessary for physicians to make well informed patient care decisions.

    Effective Electronic Health Record implementation requires consolidation of different departmental systems in order to adequately access the longitudinal record. There are strong drivers for interoperability of patient data; storage virtualization, consolidation and metadata-based open repositories are key enablers to help achieve this.

    Attend this webinar and learn about:

    •The benefits of a patient-centric view of information
    •Approaches to Infrastructure & and it’s impact for healthcare transforming technologies
    •Attaining application and storage architecture independence
    •The benefits of unlocking your most vital asset; information
    •Applying a “future-proof” approach to deploying 21st century solutions
  • Data Deduplication - Hitachi Data Systems and FalconStor VTL Recorded: Mar 3 2011 29 mins
    Backup is critical to protecting data and ensuring its recoverability.

    However, backup applications, by design, continuously create new copies of the same data, resulting in an explosion of required storage capacity on tape and disk.

    The HDS & FalconStor data deduplication solution integrates seamlessly into your backup environment to address this problem, slashing media costs, streamlining management tasks, and minimizing the bandwidth required for replication. Data deduplication improves efficiency and saves money—exactly what is needed when IT budgets are tight.

    •Eliminate redundant data
    •Shrink your backup repository by 95%
    •Reduce your storage requirements and maximize storage utilization
    •Integrate seamlessly with backup software
    •Maintain tape backup processes while maximizing data retention on disk
    •Enable cost-effective, high performance D2T and D2D backup operations

    The deduplication solution includes disk mirroring to protect against local storage failure as well as replication to protect against disasters. The solution also includes a failover capability, which lets you recover data and respond to business requirements even if multiple nodes in a cluster fail. This same clustering approach allows you to scale to meet growing capacity and performance requirements while enhancing the overall deduplication efficiency. Clustering enables separate FalconStor VTL devices to be managed and used logically as a single data repository, supporting even the largest data requirements.

    Attend this live webcast and:
    •Learn how Hitachi Adaptable Modular Storage and FalconStor Virtual Tape Library with Deduplication can improve the backup and recovery of your data
    •Improve recovery reliability, speed, availability and capacity
    •Reduce the amount of date you need to store using deduplication
  • Transform Your Data Center with Hitachi Data Systems VSP Recorded: Feb 3 2011 45 mins
    Transform Your Data Center with Hitachi Data Systems Virtual Storage Platform
  • Vendor neutral healthcare solutions, Hitachi Data System's vision Recorded: Feb 3 2011 39 mins
    Vendor neutral healthcare solutions, Hitachi Data System's vision
  • Reduce storage cost to 40% with Hitachi file & content solutions Recorded: Feb 3 2011 55 mins
    Reduce storage cost up to 40% with Hitachi file and content solutions
  • Managing midrange storage in enterprise environments Recorded: Feb 3 2011 64 mins
    Managing midrange storage in enterprise environments
  • Transforming IT for the Future Recorded: Feb 2 2011 46 mins
    Under conditions of shrinking budgets, organizational change and increased competition, enterprises are being challenged to make information both available and secure while their IT organizations are asked to do more with less. Join Bob Plumridge, CTO at Hitachi Data Systems EMEA & Chairman for SNIA Europe discussing his thoughts on transforming IT for the future and how Hitachi are solving the industry’s most pressing challenges with their approach of one platform for all data, coupled with their leadership in virtualization technology. He will discuss the latest major steps toward transforming the way companies implement IT and turn their raw data into valuable information that offers scalability and adaptability for the future.

    As CTO for Hitachi Data Systems Bob is responsible for aligning technology vision with business strategy and evangelising this vision to the press, analysts and existing and potential customers. With over 30 years experience in storage, Bob’s expertise is both wide and deep having worked in many roles in the industry from Field Engineering to Technical Product Support through to his present CTO role.Bob has worked for a variety of companies including ICL, Memorex Telex and EMC prior to joining HDS in 1988. Also Bob is currently the Chairman of the Board of Directors of the Storage Networking Industry Association (SNIA) for EMEA.
  • Transform Your Data Centre with Hitachi Data Systems VSP & HCS7 Recorded: Jan 27 2011 38 mins
    Hitachi Data Systems has seen significant take-up of its Virtual Storage Platform (VSP) and Hitachi Command Suite 7.0 (HCS) since the launch in September 2010.

    The 3D scaling and automated dynamic tiering are assisting customers to meet increasing workload requirements in both open and mainframe environments.

    Attend this live webcast and learn how to:

    1) Deliver twice the performance as verified by the Storage Performance Council
    2) Achieve up to 40% better power efficiency
    3) Store 40% more data per square foot and reclaim data centre space
    4) Simplify storage management and provide business intelligence
    5) Automate data placement to lower storage costs using the new Hitachi Dynamic Tiering Facility
Data Drives Our World and Information is the New Currency
Webcasts for IT professionals
You might also like Promoted
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A New Approach to Information Governance
  • Live at: Nov 2 2011 10:00 am
  • Presented by: Jonathan Preston & Lynn Collier
  • From:
Your email has been sent.
or close
You must be logged in to email this