Describes how you can use the Information Map view to fulfill different use cases.
Veritas Information Map provides intelligence about the data that resides on your Network Attached Storage (NAS) devices and cloud storage repositories across geographical locations. It lets you collect information about the data on your various content sources such as Windows file servers, Linux and UNIX file servers, Network Attached Storage (NAS) devices, and the Amazon S3 cloud buckets to help you visualize the information that is stored within your organization and on public cloud platforms.
In case of NetBackup, Information Map uses the file and folder metadata from the [Veritas] NetBackup catalog stored on the NetBackup master servers. Additionally, Information Map also discovers cloud storage objects (such as Amazon S3) via the Veritas Cloud Agent to help customers visualize data stored within their Amazon S3 cloud accounts. It then processes this information and displays various perspectives of the data in your environment in the Information Map console.
Use the Information Map application console to visualize the geographical location of the information stored within your file systems. You can click on a location widget in the Information Map and drill-down to the detailed dashboard view for that location. The dashboard view displays various tiles that enable you to identify the following:
-
The total file volume for configured locations which helps you quickly review the volume of information that you are managing.
-
The size and count of the data set that is old or no longer in use.
-
Non-business information which is being stored on the primary file servers which has no relevance to your organization.
-
Files that do not have an Active Directory owner.
-
The top locations, content sources, and containers such as shares and folders that are the biggest contributors to your data volume.
-
A summary of the data types that is stored on your file systems which contribute towards the volume of the data. For example, .ppt, .docx, .pdf, etc.
-
The total size against the age of the data based on the created, modified, or the last accessed date.
You can use the intelligence that Information Map provides for the following purposes:
-
File system visibility
You can use the visibility that Information Map provides to take decisions such as moving the stale, orphan, or non-business data to cheaper or secondary storage tiers.
-
Information analytics
Information Map helps you map the location of the information in your organization to help you find the data sets of interest. The analytics that Information Map provides enables you to identify file servers and shares that may need to be protected or monitored closely.
Information Map drives the following use cases:
Intelligent storage use cases
-
Decommission servers and shares - By identifying file servers and shares with little activity on them, you can make decisions to decommission, migrate or re-purpose the storage resources.
-
Address stale data - By identifying information which is old or no longer in use, you can decide to delete, to archive, or to move to a more appropriate storage tier.
-
Address non-business data - By identifying information that is of non-typical business use, like MP3s and videos, you can alleviate the disproportional strain on storage capacity of such file types by archiving or deleting.
-
Adopt orphan information - By identifying files which lack a current Active Directory owner, you can delete the orphaned information or associate it with an administrator or other custodian.
-
Smart migrations - By assessing age and activity of information, you can target the migrations of specific or relevant subsets of information to new storage hardware or cloud systems.
Retention management use cases
-
PST identification and retention - By identifying network stored PST files, you can remove them from primary storage. If desired, you can accelerate migration of the PSTs into Veritas Enterprise Vault using Enterprise Vault's PST migration tool set.
Legal, compliance, and security use cases
-
Focus eDiscovery collections - Associating potential custodians with their data enables legal teams to focus collection efforts to the specific areas of data owned by the employees involved in a particular matter.
-
Enhanced protection for priority shares - By identifying file servers and shares with a high level of activity in them, backup teams are better informed when prioritizing areas of their environment to focus backup and recovery efforts.
-
Identify potential rogue applications: Abnormally high levels of activity in file servers or shares can also be a sign of a rogue application working within the server or share which needs to be shutdown.