fighting data glut
TRANSCRIPT
F I L E A N A LYS I S
FIGHTING DATAGLUT WITH
UNCONTROLLED GROWTH We have all become victims of data hoarding, generating incredible volumes of data without an effective system for managing it. Stale, duplicate, sensitive, private, and mission critical files become lost in an unstructured data nightmare.
80% IS UNSTRUCTURED
A Breakdown
STOREDDATA
Is Mission-critical 20%Only
Is redundant, outdated, or trivial
30%
Is unknown50%
SO WHAT? ISN’T STORAGE GETTING CHEAPER?
ACCESS THREATS
COMPLIANCE COSTS
52%Hardware costs only account for 48% of
expenses.
MORE THAN JUST MONEYThe cost of a security
breach can be detrimental to your organization.
Making sure critical data is secure, vaulted, or deleted for retention can be costly if not done correctly.
More than half of all costs are associated with data compliance
Of organizations won’t find value in
“dark data”
+90%A Waste of Space
DATA HOARDING AFFECTS EVERYONE
CHIEF INFORMATION OFFICERS (CIO)
Dark Data: Data that hasn’t been accessed in 1+ years.
KEY STAKEHOLDERS
CHIEF DATA OFFICERS (CDO)
ENTERPRISE ARCHITECTS
INFORMATION MANAGERS
A strong information governance program starts at the top.
Beginning with buy-in from chief executives, File Analysis can save
an entire organization.
KNOWING WHAT’S VALUABLE
THE INTERNAL STRUGGLE
Users see their data as a proof of productivity, fearing that its deletion could be detrimental to their job or that they might need it someday.
TAKING CONTROL OF DATA GROWTH
GET A DATA FOOTPRINT Using File Analysis, you can begin to see the scope of your unstructured data through graphical reports, identifying access threats and major sources of ROT data.
ANALYSIS
MANAGEMENT
SECURITY
Analyze millions of files across many Petabytes of file storage along with their security and identity infrastructure.
Provisioning, management and cleanup of the file storage based on policies that you define surrounding identity, role and schedule.
Make sure your files are secure and retained properly. Remove access threats and prevent them with security based on location, group collaboration, and role.
THE FILE ANALYSIS SOLUTION
EFFICIENCY With File Analysis, good data management practices can be implemented and enforced.
G E T T H E T L S
CONTROL DATA HOARDING
Deploying a File Analysis solution gives you the tools to tackle the “people-related challenges of hoarding and misguided thinking”1 through tangible analysis reports to support a data management program.
Data Hoarders
IMPLEMENT LIFECYCLE MANAGEMENT
1:121The average ratio of IT Staff to employee as reported by survey of
1,400 CIOs 2
Information Manager
User
MANAGEMENT TASKSOn-boarding, group membership, access rights, storage increases, vaulting, retention for compliance, and more...
The manual management of files can be time-consuming and monotonous, pulling IT Staff away from other tasks and causing headaches for management; also leaving room for human error - which can result in security risks and oversights.
File Analysis gives IT Staff the ability to implement lifecycle
management practices for users and their data by setting policies for creation, retention
and deletion, to meet compliance and governance
needs automatically.
IDENTIFY WHAT’S VALUABLE
By utilizing in depth reports on your data surrounding accessibility, growth, and compliance, you can make decisions about deleting or archiving files, addressing potential security threats, and load balancing data. These reports allow you to plan for future growth and save money on unnecessary additional storage that might be feeding your organization’s data glut.
1
1
1
1 Graphic created by Condrey Corp. , based on Gartner Research: Source Gartner, Organiza�ons Wi l l Need to Tackle Three Chal lenges to Curb Unstructured Data Glut and Neglect , 17 June 2015 2 Garud, S . (2001, Apr i l 25) . C IOs: IT Support Staff Fal ls Short of the Ideal Ra�o. Retr ieved December 28, 2015, f rom h�p:// i t .tmcnet.com/topics/ i t/ar�cles/167584-c ios- i t-support-staff-fa l ls -short-the- ideal .htm