2.0 Blockchain Storage & Discovery. GROOVIX Introduction GROOVIX Compliant Cloud Service is a secure, data management and eDiscovery solution, designed.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

COMPANY’S OVERVIEW & SOFTWARE DEFINATION.
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
School Systems Learn the Value of Document Management to Better Serve Students, Parents and Staff and Presented By:
Presentation by Priyanka Sawarkar
Copyright Hub Software Engineering Ltd 2010All rights reserved Hub Document Manager Product Overview.
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
Altman IM Ltd | | capture | index | organise | workflow Enterprise document & content management … for all types & size.
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
Centres of excellence and first choice for healthcare providers Digital Archival Program Neville Pinto Team Leader - Server & Storage Services.
Welcome to the World of Cloud SMSF Auditing To Revolutionize your Business.
ECM RFP 101 Presented by: Carol Mitchell C.M. Mitchell Consulting.
SOFTWARE PRESENTATION ODMS (OPEN SOURCE DOCUMENT MANAGEMENT SYSTEM)
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
Secure Electronic Data Communications and Transactions.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Internet Resources Discovery (IRD) IBM DB2 Digital Library Thanks to Zvika Michnik and Avital Greenberg.
Tools and Services for the Long Term Preservation and Access of Digital Archives Joseph JaJa, Mike Smorul, and Sangchul Song Institute for Advanced Computer.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Lexmark Print Management
Why Compliance Legal and Regulatory requirements Organizational governance requests Internal and external threats Today’s Challenges Duplicate solutions.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Databases & Data Warehouses Chapter 3 Database Processing.
ViciDocs for BPO Companies Creating Info repositories from documents.
High-Speed, High Volume Document Storage, Retrieval, and Manipulation with Documentum and Snowbound March 8, 2007.
AGENDA Welcome and introductions Brief introduction to PSI Mobile Technical Overview Demonstration Q and A Next Actions.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
MODULE – 8 OBJECT-BASED AND UNIFIED STORAGE
1 © Copyright 2009 EMC Corporation. All rights reserved. ISIS and PixTools Toolkits Quickly Enabling Document Capture Solutions EMC Corporation.
Archiving Where did I put that mail?. Business criticity Importance to manage : –Authenticity –Integrity –Perennity –Compliance High TCO of mail.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
fact sheet (07/03/2007) 1 ARE ARCHIVING SOLUTIONS RECORDKEEPING SOLUTIONS? 7 th March 2007 Stephen Clarke Government Recordkeeping Programme.
Budget Module For Sage MIP Fund Accounting. Sage Requirements Fund Accounting 10.0 or higher Budget Module optional but required for multiple budget versions.
1 © 2008 Avaya Inc. All rights reserved. IPOffice Configuration Service Emil Ratnam.
Module 9 Configuring Messaging Policy and Compliance.
Ecords Management Records Management Paul Smallcombe Records & Information Compliance Manager.
Chapter 9 Section 2 : Storage Networking Technologies and Virtualization.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Module 9 Configuring Messaging Policy and Compliance.
Developing Policy and Procedure Management System إعداد برنامج سياسات وإجراءات العمل 8 Safar February 2007 HERA GENERAL HOSPITAL.
Module 7 Planning and Deploying Messaging Compliance.
BEST Guard – Information Logging. bEST Guard Records all actions executed on an MFP Produkt type: Server based application (software only) Development.
Enterprise Messaging & Collaboration. e-Interact Modules.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
INTRODUCTION  netCORE offers 360 degree digital communication solutions Messaging and Mobility  Pioneers in Linux based mailing solution and catering.
© 2014 VMware Inc. All rights reserved. Cloud Archive for vCloud ® Air™ High-level Overview August, 2015 Date.
Place image here INFORMATION MANAGEMENT Cloud Computing and Enterprise Information Management March 2010 Jim Cuff VP Strategy, Iron Mountain Digital.
ImageNow -- An Overview --. What is ImageNow?  Loyola’s document imaging and workflow application  Primary application (web based and desktop) of the.
Capture This! PO105 James Green. Table of Contents Capture Overview Laserfiche Tools Case Scenarios Questions and Answers.
Maintaining and Updating Windows Server 2008 Lesson 8.
Scalable Web Apps Target this solution to brand leaders responsible for customer engagement and roll-out of global marketing campaigns. Implement scenarios.
Users and Administrators
Amazon Storage- S3 and Glacier
Brandon Botes #SPSJHB Records Management – Friend or Foe ???
Brandon Botes #SPSDBN Records Management – Friend or Foe ???
Joseph JaJa, Mike Smorul, and Sangchul Song
Store, Share, Sync and Collaborate
Scalable Web Apps Target this solution to brand leaders responsible for customer engagement and roll-out of global marketing campaigns. Implement scenarios.
12: :00     Welcome   13: :55     Terumo and Flexso will share insights on the successful implementation of SuccessFactors Compensation module.
Searchable. Secure. Simple.
Collaborative Business Solutions
Brandon Botes #SPSJHB Records Management – Friend or Foe ???
Office Edition Overview (Dec. 2018).
Designed for powerful live monitoring of larger installations
Features Overview.
COMPLETE BUSINESS TEXTING SOLUTION
Users and Administrators
Presentation transcript:

2.0 Blockchain Storage & Discovery

GROOVIX Introduction GROOVIX Compliant Cloud Service is a secure, data management and eDiscovery solution, designed to record and store data and to provide a single view across all data types such as voice, SMS, , file and folder, video, webmail, instant messaging and social networking that works with blockchain technology. Use of 2.0 blockchain technology also enables GROOVIX to act as a jurisdictional cold storage environment for digital currencies and tokens. GROOVIX has been designed with Service Providers & Platform Operators in mind and includes many important aspects that make it a valuable product to offer as a managed service or to underpin the security, compliance and trustworthiness of 2.0 crypto technology. GROOVIX is provided to customers as a Managed Cloud Service which is implemented into a resilient hosted architecture

GROOVIX Compliant Cloud Service is a secure, data management and eDiscovery solution, designed to record and store data and to provide a single view across all data types such as voice, SMS, , file and folder, video, webmail, instant messaging, social networking & Digital Tokens. Secure Storage Digital signatures taken at time of capture for all objects and metadata. Collected objects can be divided between different physical stores. Secure Access Encrypted web access or via 2048 bit encryption VPN connection. All users have a global unique ID ("Global ID") which forms part of the unique attribute assigned to all associated objects and metadata. Back upData synchronised/backed up between multiple data centres. Data Security / IntegrityUnique encryption keys are utilised for each customer and each user. Intuitive Use Interface Provides a "one window" view to all data assets. Retrieval of all data can be achieved via a familiar tree structure or via a search. High Availability / Redundancy Multiple data centre active-active operation replay able collection transactions process to rebuild corrupt data. Ease of DeploymentCustomer requires to only have network access to the managed service. GROOVIX Overview

GROOVIX has different collector functions for different data sources that will interface with the source systems to extract the data and feed it through the process engine to: Index Encrypt Apply policies (e.g. retention) Compress Store

GROOVIX - What it Does Collects and Tracks changes of Data & Digital Assets from multiple sources Helping to consolidate storage of your business data Classifies, Indexes and set retention policy Making your data searchable in a meaningful way Encrypts, Third party authentication Ensuring your data is secure, undeniable and audited Single Instance and Compress Reducing storage infrastructure costs Stores across multiple sites Building in Business Continuity of your data

GROOVIX - How it Works GROOVIX provides an organization with a solution that addresses the following business challenges:

Compliance Management GROOVIX provides a solution designed to enable compliance with: BSI BIP A Code of Practice on the Legal Admissibility of Information Stored in Electronic Document Management Systems; ISO TR Electronic imaging - Information stored electronically - Recommendations for trustworthiness and reliability; and BSI DISC PD An international code of good practice in five parts for electronic documents and e-commerce transactions as legally admissible evidence. Powerful Search Capabilities All objects and metadata are indexed in real time creating over 40 searchable metadata fields. Non-repudiation of Data (Evidential Weight) Third party authentication is a one way secure process to ensure a full set of original records exists at any point in time. Auditability Full encrypted and digitally signed audit trail for all objects and user activity. Data Security / IntegrityUnique encryption keys are utilised for each customer and each user. Features

Retention Management GROOVIX allows an organization to easily manage all their retention policies for multiple data types individually or for all data types for a specific employee. With the self service portal customers can manage the retention policy settings for all their data giving them the flexibility to adjust to meet changes in their organization policies or relevant legal or regulatory changes. Once any data has reached the end of its retention policy then it is automatically removed or deleted from the system. If however any data has been put on legal hold then it will not be removed and thus keeping the integrity of any ongoing investigation alive. Retention Policy ManagementSet different retention policies for different data. Automatic deletion The system automatically deletes data as its configured retention period ends. Secure Legal Hold DataAny data set to legal hold will not be deleted by the retention manager process. Features

IP Protection GROOVIX helps an organization to protect its electronic intellectual property by storing it securely and encrypting it. A full audit trail that cannot be tampered with also ensures that the system can tell which users access what data and when. Every data object is encrypted with a unique key which can also be stored and held by a 3 rd party Seal and Key service that then enables proof of whether any data in the system has been changed or not (by comparing the key in the system to those held at the 3 rd party). For Crypto Currencies & Tokens GROOVIX is a 2.0 blockchain solution that provides non-repudiable validation of the block chain and all user interactions via the secondary Seal & Key service. Non-repudiation of Data (Evidential Weight) Third party authentication is a one way secure process to ensure a full set of original records exists at any point in time. Auditability Full encrypted and digitally signed audit trail for all objects and user activity. Data Security / IntegrityUnique encryption keys are utilised for each customer and each user. Features

Secure Cloud Storage GROOVIX provides a secure cloud storage solution for any data type and it is architected to provide high levels of resilience and data integrity. With compression and file single instancing it can also reduce the overall size required to store data. Data can be in many different formats from many different sources and is fully searchable and retrievable in individual objects or in bulk downloads. As a 2.0 service GROOVIX provides a fast read / write capability for crypto transaction processing. Secure Storage Digital signatures taken at time of capture for all objects and metadata. Collected objects can be divided between different physical stores. Secure Access Encrypted web access or via 2048 bit encryption VPN connection. All users have a global unique ID ("Global ID") which forms part of the unique attribute assigned to all associated objects and metadata. Back upData synchronised/backed up between multiple data centres. Intuitive Use Interface Provides a "one window" view to all data assets. Retrieval of all data can be achieved via a familiar tree structure or via a search. High Availability / Redundancy Multiple data centre active-active operation replay able collection transactions process to rebuild corrupt data. Features

ALL CONTENTS COPYRIGHT AVERT IT LTD GLOBAL2 24 (16,777,216) REGION2 24 (16,777,216) SUBREGION2 32 (4,294,967,296) Scalable, Logical Hierachy This is a logical naming hierarchy and could be implemented based on other criteria or labels (such as business units and departments). The region to Sub region level is also recursive. LONDONPARISTOKYONEW YORKCOMPANYAPACNAEMEA

ALL CONTENTS COPYRIGHT AVERT IT LTD GLOBAL2 24 (16,777,216) REGION2 24 (16,777,216) SUBREGION2 32 (4,294,967,296) Scalable, Logical Hierachy SIM LONDONPARISTOKYONEW YORKCOMPANYAPACNAEMEA F&FDB 2007 OTHER The SIM (Singe Instance Metadata) are the all of the keys and indexes associated with a particular SIM, each Sub Region can have 228 SIM’s. A Sub Region can have all of the data in a single SIM or distribute across multiple servers. By dividing the SIM data from the object blobs ILM becomes a simple task.

REGION2 24 (16,777,216) SUBREGION2 32 (4,294,967,296) Scalable Datastore FSI (File Single Instance) stores the actual data. There can be up to 264 (18,446,744,073,709,600,000) FSI’s. Data is de-duplified to give typically > 50% storage savings. LONDONPARISTOKYONEW YORK GLOBAL2 24 (16,777,216) COMPANYAPACNAEMEA FSI

Global Compliance Example Regional Retention Policy of 6 Months Regional Retention Policy of 7 Years Regional Retention Policy of 2 Years Regional Retention Policy of 5 Years Regional Retention Policy of 18 Months For an sent between UK, Brasil and Japan means 3 copies are saved in different storage regions with different retention policies applied

Centralised Configuration Compliance Officer: Has permission to view all global data HQ New York: Can see New York data only. Washington: Can see all US data only. EMEA Finance: Has permission to view all finance data in London and Paris. London: Can see London data only. Paris: Can see Paris data only.

Distributed Configuration Compliance Officer: Has permission to view all global data HQ New York: Can see New York data only. Washington: Can see all US data only. EMEA Finance: Has permission to view all finance data in London and Paris. London: Can see London data only. Paris: Can see Paris data only. Retention Policies can be set for storing and retrieving Digital Coins, Tokens & Assets

Administration The GROOVIX Administration system allows a Service Provider / Customer to configure the platform to meet their needs, including: Portals Storage regions Retention policies Users

Administration The GROOVIX Administration system also has in built workflow and job queue management function to enable the tracking of any outstanding provisioning or change requests.

GROOVIX Summary The GROOVIX Compliant Cloud Solution provides the following benefits: Scalability - designed to scale in a highly parallelised fashion. Reduces the costs of utilising expensive, storage-based mirroring solutions. Inbuilt information discovery capability with free text searching. Reduces management costs through its design and operating model. Is inherently highly available in it’s architecture. Secures your data through audit and encryption. Uses 2.0 blockchain technology to provide a non-repudiable cold storage vault for crypto coins, tokens & assets It is designed to benefit Service Providers and Large Customers with features such as: End User self service Administration portal Provisioning API

THANK YOU!