Isabelle-Guid

Understanding Data Governance – Don’t Be Intimidated By It

Understanding Data Governance

Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping for the best. On the flipside, opening the hood and checking if policies or regulations are being respected means you have to do something about it: define new policies and enforce them everywhere you have data, a months long process that involves people’s time, money, developing new skills, external experts and a lot of pain for IT.

Content Governance is about understanding the unknowns when it comes to your content and answering questions: what do we know about our content? Is it encrypted and stored at the right location? Are the right people is accessing it? Is this file subject to regulations or is it confidential and protected accordingly? What will be the business impact if it is accidentally deleted? It’s a holistic look at the sum of what is produced by your business.

data-policy

The reality is that all businesses content needs to be governed. In my interactions with customers, Chief Information Officers (CIOs), Chief Data Officers (CDOs) and other peers there are several recurring themes or myths that come up, here’s a look at them and some suggestions for tackling the issues:

1. A content governance solution is long and costly to install. We need experts.

Historically this has been the case with on-premises solutions that require a lot of servers. The more data to analyze the more servers you needed. In addition, running perpetual license software meant organizations needed costly professional services experts to deploy it. By the time an organization was ready to update its content governance policies IT would usually find siloed, inconsistent and outdated systems – a patchwork solution that had been ignored.

This problem is solved with a software-as-a-service (SaaS) content governance solution. No additional hardware, no experts needed. It’s like a whole team of data scientists working for you in the cloud.

2. There is no one size fits-all solution; I need many content governance solutions to cover all my content repositories

This one is actually not a myth. To date, most solutions are very specific, working only for email or only for Microsoft SharePoint and others. These solutions do not play nice across repositories and leave IT in a bind where there are specialty solutions for each type of repository and no single source of the truth.

The fix here is to look to a solution that is open and supports a broad variety of repositories and when it does not support the one you need natively, ensure the solution has a software developer tool kit (SDK) so you or your content repository vendor can integrate with it. This type of solution removes the silo effect and creates a single source of the truth in an agnostic way allowing customization of policies and the ability to apply them across the board all at once.

3. For my cloud content the only option is to rely on the vendors native content governance solution

It’s true that the majority of data governance solutions are mainly focused on on-premises content. Also the cloud is quite new and there is no “cloud standard” for content. As a result, a lot of cloud content applications have their own governance tool. The problem is these solutions are limited (you can’t be an expert at everything) and it means for every app you need to use a different tool, limiting your visibility and control and making your content governance quality dependent on each provider.

The fix here is to abstract the content layer (where the data lives) from the governance logic (how the data is managed) so the policies can applied to any content and the implementation of these policies are translated for each repository. Such an overlay solution will have to be hybrid and unify views across repositories with a consistent level of control.

4. Most content governance solutions are biased and encourage an upsell of their own back-up, archiving or disaster recovery solutions

Historically, content governance has been an adjacent market for data storage vendors with archiving, disaster recovery or back-up solutions leaving customers wondering if the classification telling them which data was mission-critical (typically a huge amount) and had to be duplicated was not a self-fulfilling prophecy to cross-sell solutions. How can you trust a content governance recommendation when interests are not aligned?

Going back to our key of being open, the solution to busting this myth is to look for a vendor that is content repository and data storage agnostic, independent and open. This will allow you to separate the vendor from the solution, the action of the recommendation versus the recommendation. No matter what the recommendation for managing your content, the goal should be to separate the solution from the vendor and ensure the vendor you select can work agnostically across repositories.

5. If my organization deploys a content governance solution, the usability and productivity of users will be impacted

Introducing content governance means monitoring all activities around your content and making the best decision on how to protect it. Solutions designed with IT in mind often ignore usability for non-IT employees. If it takes a knowledge worker more time to look for content on a repository or to even access it there will be dissatisfaction and business productivity loss – users will be driven towards so-called ‘shadow IT’.

The key to avoiding this is to select a vendor that has collaboration expertise and understands content workflow – how information moves throughout the enterprise. The goal should be to control the content not the apps or the users.

At its core a content governance solution allows businesses to understand more about their data, create and enforce policies to govern it and use this information for business insight and decision-making. The goal is to be open, collaborative and supportive of multiple repositories while still supporting contractual and regulatory requirements. To be more productive, users will select their preferred apps regardless of attempts by IT to control them. Instead IT should focus on the content and how it is being access by these users (not the apps).

The Win-Win: users can interact across repositories in an agnostic way and IT can sleep at night.

By Isabelle Guis, Chief Strategy Officer, Egnyte

Isabelle-GuidIsabelle Guis is the Chief Marketing and Strategy Officer at Egnyte, overseeing all global marketing as well as product and go-to-market strategies. She previously served as EMC’s vice president of Marketing for the Public Cloud Solutions Group and Enterprise Storage Division, driving cloud buyer and service provider segmentations, as well as messaging, product positioning and go-to-market strategies for the company’s core storage solutions.

Isabelle has also held leadership positions at Avaya, Big Switch Networks, Cisco Systems, and Nortel Networks. She holds a Master of Science in Electrical Engineering and Computer Science from Supelec (France), and an MBA from Harvard Business School.

CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information and consultancy services.

Are you a cloud services expert in a world of digital transformation? If so, contact us for information on how to become part of our growing cloud consultancy ecosystem.

CONTRIBUTORS

Scale Matters in the Enterprise Cloud

Scale Matters in the Enterprise Cloud

The Enterprise Cloud What used to be an unknown and mysterious term, “the cloud” is now a common and mostly ...
Countdown to GDPR: Preparing for Global Data Privacy Reform

Countdown to GDPR: Preparing for Global Data Privacy Reform

Preparing for Global Data Privacy Reform Multinational businesses who aren’t up to speed on the regulatory requirements of the European ...
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, ...
As Enterprises Execute Their Digital Strategies, New Multi-cloud Landscape Emerge

As Enterprises Execute Their Digital Strategies, New Multi-cloud Landscape Emerge

The Multi-cloud Landscape The digital universe is expanding rapidly, and cloud computing is building the foundation for almost infinite use ...
How Big Data Can Empower Native Ads

How Big Data Can Empower Native Ads

Empower Native Ads The realm of big data is expanding an astonishing rate, and its presence can be felt across ...
Imminent IoT Eye-Tracking Technologies To Transform The Connected World

Imminent IoT Eye-Tracking Technologies To Transform The Connected World

IoT Eye Tracking Smelling may be the first of the perceptible senses, but the eye is the fastest moving organ ...
Principles of an Effective Cybersecurity Strategy

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as ...
Chris Gerva

Why Containers Can’t Solve All Your Problems In The Cloud

Containers and the cloud Docker and other container services are appealing for a good reason - they are lightweight and ...
4 Open Source Business Intelligence Tools For Big Data Reporting

4 Open Source Business Intelligence Tools For Big Data Reporting

Open Source Business Intelligence Tools It’s impossible to take the right business decisions without having insightful information to back up ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...

NEWS

Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system (Reuters) - Hackers likely working for a nation-state recently penetrated the safety system of ...
email as a service

Google Data Analysis, Artificial Intelligence and Predicting Vaccine Scares

Social media trends can predict tipping points in vaccine scares Analyzing trends on Twitter and Google can help predict vaccine ...
Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

NEW YORK, Dec. 12, 2017 /PRNewswire/ -- Deloitte forecasts double digital growth in machine learning deployments for the enterprise, an increasing worldwide ...