Compliance for IBM Connections Cinthia Shields Director, Business Development-IBM Partner Manager

Slides:



Advertisements
Similar presentations
Copyright © 2006 Quest Software Quest SharePoint Management.
Advertisements

Yammer Technical Solutions Overview
Supplier Contract Management © 2006 Oracle Corporation – Proprietary and Confidential 2. Author & Negotiate 5. Amend4. Monitor and Track 6. Renew & Closeout.
Compliance storyboard: Classifying & controlling content at the input device.
Business Development Suit Presented by Thomas Mathews.
© 2007 IBM Corporation Enterprise Content Management Integrating Content, Process, and Connectivity for Competitive Advantage Malcolm Holden October 2007.
Christian Finn Director Microsoft Corporation.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Social Networking: What You Don’t Know Can Hurt You Jim Hilsenrod.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Social media monitoring, measurement & engagement - Copyright © 2009 Radian65/17/2015.
® Executive Overview August 2007 Expertise within Reach.
DEV392: Extending SharePoint Products And Technologies Through Web Parts And ASP.NET Clint Covington, Program Manager Data And Developer Services - Office.
Agenda: Solomon N’Jie Overview Microsoft Enterprise Search Solution
MailMeter Over 2,000 installations worldwide Meet FRCP requirements SOX, GLBA, HIPAA, SEC, FINRA, BASEL II, FOI, etc. Avoid fines for failure to produce.
CallingSharingMessagingPresenceMeetingsPeople Services DevicesAppliances Manage PSTN Servers and Services 3 rd party ecosystem.
An innovative platform to allow translation and indexing of internet sites Localization World
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Affordable compliance with I n b o x N e s t S o f t w a r e for archiving TM Feature rich, easy to use archiving. 10% Discount Now Click here.
Live Meeting APIs Robert Devine Program Manager Microsoft Corporation.
Creating Online Class Communities Jennifer Dorman Discovery Education
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
© Experian CheetahMail All rights reserved. Confidential and proprietary. 1 © Experian Information Solutions, Inc All rights reserved. Confidential.
AIIM Presentation Selecting and Implementing A Records Management System June 5, 2008.
Governance, Risk, and Compliance Bill Greene Senior Industry Director.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 August 15th, 2012 BP & IA Team.
Business Driven Technology Unit 4
STORY TITLE 1 1 1H ‘08 Lotus Quickr 8.1 Lotus Quickr Lotus Quickr 8.2 Lotus Quickr Lotus Quickr Entry 2. UI enhancements 3. System administration.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
What is BAM?. :Contents *Definition *Description *Goals and benefits *BAM Applications *BAM components.
© 2011 IBM Corporation Getting social in IBM. © 2011 IBM Corporation Are we having a conversation?  Today, business happens in real-time. Market shifts.
Crystal Hoyer Program Manager IIS Team Preview of features that will be announced at MIX09 Please do not blog, take pictures or video of session.
Trimble Connected Community
Copyright © Oracle Corporation, All rights reserved. Oracle Sales and Service Key Product Highlights Releases
New Zealand Channel Day 2013 Clearwater Resort ABM Wiki Overview ABM NZ Channel Partner Conference 2013.
Business Productivity Infrastructure Optimization The Business Productivity Infrastructure Optimization Campaign For Microsoft Office 2007 Module 25 –
Nobody’s Unpredictable Ipsos Portals. © 2009 Ipsos Agenda 2 Knowledge Manager Archway Summary Portal Definition & Benefits.
OFC290 Information Rights Management in Microsoft Office 2003 Lauren Antonoff Group Program Manager.
KMS Products By Justin Saunders. Overview This presentation will discuss the following: –A list of KMS products selected for review –The typical components.
© MouthShut.com 2010 Confidential Document Brand Pulse…
Ankur Kothari Microsoft Corporation. In-Place Archive with secondary quota Access documents with SkyDrive Pro Site Mailboxes enable better collaboration.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Unique Social Computing Applications Zaffar Ahmed.
STORY TITLE 1 1 How Social Software from IBM Meets Today's Business Imperatives Easily locate the existing expertise in your organization Leverage enterprise.
User Experience Search in context; actionable results; user tax from multiple search interfaces, and logons; no unified search results; People and Information.
E-Detective Ethernet LAN Interception System (with Real-Time Content Reconstruction) Decision Group
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Teaching Mathematics with an Interactive Whiteboard and Web Sites Betsy Sparks, Christian Academy of Knoxville
Education Archiving, Internet & Social Media Monitoring
1 © Xchanging 2010 no part of this document may be circulated, quoted or reproduced without prior written approval of Xchanging. MOSS Training – UI customization.
IBM Lotus Software © 2006 IBM Corporation IBM Lotus Notes Domino Blog Template Steve Castledine.
Coding Compliance Components Writing Custom Policies for Auditing, Expiration and More Jason Morrill Program Manager Windows SharePoint Services.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Do not turn on your computers.
Lecture 5 Web 2.0 Teaser Instructor: Jie Yang Department of Computer Science University of Massachusetts Lowell Exploring the Internet, Fall 2011.
How to Leverage SOCIAL MEDIA in BLENDED LEARNING.
The overall classification of this briefing is UNCLASSIFIED US Africa Command Africa Partner Country Network Overview Mr. Jordan Pritchard AFRICOM KM.
INTRODUCTION  netCORE offers 360 degree digital communication solutions Messaging and Mobility  Pioneers in Linux based mailing solution and catering.
Workflow based Knowledge Management Solutions 1 InfoAxon Technologies Limited Confidential.
© 2014 Verint Systems Inc. All Rights Reserved Worldwide. Confidential and proprietary information of Verint Systems Inc. © 2016 Verint Systems Inc. All.
ZIMBRA ROADMAP. Contains proprietary and confidential information owned by Synacor, Inc. © / 2015 Synacor, Inc. Deliver an advanced, feature rich collaboration.
Chapter 8 Social Computing © Logorilla/iStockphoto.
Microsoft Virtual Academy Chris Oakman | Managing Partner Infrastructure Team | Eastridge Technology Curtis Sawin | Technical Solutions Professional |
Search Engine Optimization (SEO) Presentation By Celina Jonesi Small Business Seo – KG Tech.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
Actiance Governance for Microsoft
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Enterprise Collaboration Portal
Comodo Dome Data Protection
Presentation transcript:

Compliance for IBM Connections Cinthia Shields Director, Business Development-IBM Partner Manager

About Actiance  Enable the New Internet – Enterprise Collaboration, Unified Communications, Social Networks  Global operations – USA, EMEA, India, Asia/Pacific  Market Leader – 9 of the top 10 US banks – Top 5 Canadian banks – 3 of the top 5 energy companies  Compliance for Connections – Will be available on PPA!!

Risks of Using Social Collaboration Data Leakage Personal Information Intellectual Property Credit Card, SSN Client Records Compliance & eDiscovery SEC, FINRA HIPAA, FISMA SOX, PCI, FSA FRCP- eDiscovery FERC, NERC User Behavior Employee Productivity Bandwidth Explosion Every employee is the face of business

Actiance Compliance for Connections Functionality Content Logging Capture content posted by Connections users Content types –Conversational Data – Blogs, Forums, Wikis –Non-Conversational Data – Activities, Communities, Profiles, Bookmarks –Files eDiscovery Reviewer UI will show content in context of other related items Export to eDiscovery or ECM Platform: each piece of archived individually and include tags to link related items

Actiance Compliance for Connections Functionality Content Inspection Prevent data leaks and abusive language –Use lexicons defined to filter content based on keywords, phrases, and regular expressions –Can be enabled for text content in files Send alerts based on content detected Content rules can be targeted to specific groups Granular Policy Control Define policies at a global, group or user level to map to compliance or corporate governance standards Feature Access Mgmt –Control who has access to create various types of content (for example, users posting to blogs but not wikis)

Key Competitive Differentiators Product Differentiators The Actiance Compliance Solution is Purpose Built for Connections Direct API Level Integration Connector to process real-time events using synchronous events generated by Connections All policy & logging configured in a central Vantage installation Roadmap alignment Partnership Differentiators IBM can sell a complete solution--Customers can buy via Passport Leverage existing Discounts and ELAs IBM and Actiance have been partners for 5+ years Executive Level alignment Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved. 5

Blog Commentary, Control & Updates

Blog entry with comments

Drilling down for context…why did Cinthia say what she did?

Logging the Employee’s comment and context detail

Original Formatting captured and logged Logging Connections Content & Formatting

Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved. 11 Blog entry with images and links

Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved. 12 Employee blog entry logged and captured in Actiance Vantage with original formatting (Images, colors etc)

Employee activity captured and mapped to Employee ID User Activity in Connections

All IBM Connection user activities captured, time stamped

Enforcing Corporate Communication Policies Detecting inappropriate content

Lexicon keyword match

Searching under specific content category

Search results showing lexicon matches =“guarantee”

Interaction details with lexicon match highlighted

Drill down to show context

Blog entries in chronological order

Context detail Original post and comments Updated post and Sarah’s comment

Questions?