Skip to main content
TrustRadius
Veritas Data Insight

Veritas Data Insight

Overview

What is Veritas Data Insight?

Over half of all enterprise data is “dark” or unknown, creating regulatory risks. Data Insight, from Veritas gives compliance teams the ability to classify and contextualize content, to make it easier to search through data, gain insights, and meet regulatory…

Read more
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Veritas Data Insight?

Over half of all enterprise data is “dark” or unknown, creating regulatory risks. Data Insight, from Veritas gives compliance teams the ability to classify and contextualize content, to make it easier to search through data, gain insights, and meet regulatory requirements.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

2 people also want pricing

Alternatives Pricing

What is GitGuardian Internal Monitoring?

GitGuardian Internal Monitoring helps organizations detect and fix vulnerabilities in source code at every step of the software development lifecycle. With GitGuardian’s policy engine, security teams can monitor and enforce rules across their VCS, DevOps tools, and infrastructure-as-code…

What is Solix EDMS?

Solix Enterprise Data Management Suite (Solix EDMS) is an information lifecycle management solution, from Solix Technologies in Santa Clara. Solix helps infrastructure and operations leaders implement the right policies, processes, and technology for application decommissioning and data retention,…

Return to navigation

Product Details

What is Veritas Data Insight?

Many organizations struggle with identifying data users and owners for their unstructured data. This challenge is compounded with the fact that organizations lack visibility into the types of content and data that is spread across their computing environment. With Veritas Data Insight, users can monitor file access to automatically identify the data user of a file based on the access history. This method enables more efficient remediation and data management.

Data Insight scans the unstructured data systems and collects full access history of users across the data. It helps organizations monitor and report on access to sensitive information.

Data Insight also helps organizations to solve the problem of identifying data owners and responsible parties for information in spite of incomplete or inaccurate metadata or tracking information. This helps support large-scale business owner-driven remediation processes and workflows.

Data Insight provides the following information:
  • Who owns the data
  • Who is responsible for remediation
  • Who has seen the data
  • Who has access to the data
  • What data is most at-risk
  • Frequency of usage of data

The ownership and the usage information from Data Insight can be used for the following purposes:

Data owner identification
Data Insight enables rule-based inference of data owners based on actual usage. Data owner information may not reflect the responsible party. The responsible party or data owner can be a line manager in the business unit, the head of a department, or an information security officer. Veritas Data Insight provides the information to tie the most active user of a file to a manager or responsible party for remediation steps.

Data custodian identification
Data Insight enables the assignment of one or more users as custodians of a data repository. Custodian tagging is typically used to determine the person responsible for remediation. The assigned custodian need not have made any accesses on the files and folders. In addition to the physical paths, you can also assign custodians on DFS paths.

Data leak investigation
In the event of a data leak, the Veritas Data Insight Management Server lets the user view detailed information and an audit history of who accessed the data.

Locate at-risk data
Data Insight enables organizations to find which shares or folders have overly permissive access rights. Organizations can use this data to prioritize risk-reduction efforts such as the discovery of sensitive data or a review of permissions (or access control rights) to limit access to only those individuals who have a business need.

Manage inactive data
Data Insight enables better data governance by letting users archive inactive and orphan data using Enterprise Vault. Additionally, users can decide to manage the archived data by applying retention rules, deleting the archived data, or by putting legal hold on the archived data.

Provide advanced analytics about activity patterns
Data Insight enables users to analyze the activity on high-risk folders by providing in-depth analysis of usage and collaborative activity. The analysis helps classify users based on configured attributes to better understand the activity pattern of users in yan environment.

Permission remediation
Data Insight leverages the usage analytics provided by audit logs to provide recommendations for revoking permissions of inactive or disabled users on a path. You can then analyze the business impact of applying the recommendations and configure settings to handle the permission changes.

Users can also search for specific permissions and revoke them where necessary as also modifying group membership directly from the Workspace.

Content classification
Data Insight lets users classify content on data sources that it monitors by providing means to define classification rules (policies) that let you specify values (tags) that can be assigned to any matching items. The classification feature works in conjunction with the policy framework provided by Veritas Information Classifier to assign tags to files. For example, a content scan may search for items whose contents include a credit card number and assign a tag of "PII" (for "personally identifiable information") to any that do.

Data Insight also allows the classification of images. The classification of images is facilitated by a software called Tesseract that is responsible for text extraction from the images. Tesseract needs to be installed on the classification node for classifying contents in an image.

Remediation using the Self-Service Portal
Data owners and custodians can take remediation actions using the Self-Service portal. Custodians can log in to the Self-Service Portal to do the following:
  • View Data Loss Prevention (DLP) policy violations and remediate DLP incidents using Smart Response rules.
  • Review permission on resources and make recommendations to allow or revoke user access on resources.
  • Provide confirmation about whether the custodians indeed own the data resources that are assigned to them.

Veritas Data Insight Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation