fighting data glut

1
FILE ANALYSIS FIGHTING DATA GLUT WITH UNCONTROLLED GROWTH We have all become victims of data hoarding, generating incredible volumes of data without an effective system for managing it. Stale, duplicate, sensitive, private, and mission critical files become lost in an unstructured data nightmare. 80% IS UNSTRUCTURED A Breakdown STORED DATA Is Mission-critical 20% Only Is redundant, outdated, or trivial 30% Is unknown 50% SO WHAT? ISN’T STORAGE GETTING CHEAPER? ACCESS THREATS COMPLIANCE COSTS 52% Hardware costs only account for 48% of expenses. MORE THAN JUST MONEY The cost of a security breach can be detrimental to your organization. Making sure critical data is secure, vaulted, or deleted for retention can be costly if not done correctly. More than half of all costs are associated with data compliance Of organizations won’t find value in “dark data” + 90% A Waste of Space DATA HOARDING AFFECTS EVERYONE CHIEF INFORMATION OFFICERS (CIO) Dark Data: Data that hasn’t been accessed in 1+ years. KEY STAKEHOLDERS CHIEF DATA OFFICERS (CDO) ENTERPRISE ARCHITECTS INFORMATION MANAGERS A strong information governance program starts at the top. Beginning with buy-in from chief executives, File Analysis can save an entire organization. KNOWING WHAT’S VALUABLE THE INTERNAL STRUGGLE Users see their data as a proof of productivity, fearing that its deletion could be detrimental to their job or that they might need it someday. TAKING CONTROL OF DATA GROWTH GET A DATA FOOTPRINT Using File Analysis, you can begin to see the scope of your unstructured data through graphical reports, identifying access threats and major sources of ROT data. ANALYSIS MANAGEMENT SECURITY Analyze millions of files across many Petabytes of file storage along with their security and identity infrastructure. Provisioning, management and cleanup of the file storage based on policies that you define surrounding identity, role and schedule. Make sure your files are secure and retained properly. Remove access threats and prevent them with security based on location, group collaboration, and role. THE FILE ANALYSIS SOLUTION EFFICIENCY With File Analysis, good data management practices can be implemented and enforced. GET THE T LS CONTROL DATA HOARDING Deploying a File Analysis solution gives you the tools to tackle the “people-related challenges of hoarding and misguided thinking” 1 through tangible analysis reports to support a data management program. Data Hoarders IMPLEMENT LIFECYCLE MANAGEMENT 1:121 The average ratio of IT Staff to employee as reported by survey of 1,400 CIOs 2 Information Manager User MANAGEMENT TASKS On-boarding, group membership, access rights, storage increases, vaulting, retention for compliance, and more... The manual management of files can be time-consuming and monotonous, pulling IT Staff away from other tasks and causing headaches for management; also leaving room for human error - which can result in security risks and oversights. File Analysis gives IT Staff the ability to implement lifecycle management practices for users and their data by setting policies for creation, retention and deletion, to meet compliance and governance needs automatically. IDENTIFY WHAT’S VALUABLE By utilizing in depth reports on your data surrounding accessibility, growth, and compliance, you can make decisions about deleting or archiving files, addressing potential security threats, and load balancing data. These reports allow you to plan for future growth and save money on unnecessary additional storage that might be feeding your organization’s data glut. 1 1 1 1 Graphic created by Condrey Corp., based on Gartner Research: Source Gartner, Organiza�ons Will Need to Tackle Three Challenges to Curb Unstructured Data Glut and Neglect, 17 June 2015 2 Garud, S. (2001, April 25). CIOs: IT Support Staff Falls Short of the Ideal Ra�o. Retrieved December 28, 2015, from h�p://it.tmcnet.com/topics/it/ar �cles/167584-cios-it-support-staff-falls-short-the-ideal.htm

Upload: talaya-allen

Post on 13-Apr-2017

19 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Fighting Data Glut

F I L E A N A LYS I S

FIGHTING DATAGLUT WITH

UNCONTROLLED GROWTH We have all become victims of data hoarding, generating incredible volumes of data without an effective system for managing it. Stale, duplicate, sensitive, private, and mission critical files become lost in an unstructured data nightmare.

80% IS UNSTRUCTURED

A Breakdown

STOREDDATA

Is Mission-critical 20%Only

Is redundant, outdated, or trivial

30%

Is unknown50%

SO WHAT? ISN’T STORAGE GETTING CHEAPER?

ACCESS THREATS

COMPLIANCE COSTS

52%Hardware costs only account for 48% of

expenses.

MORE THAN JUST MONEYThe cost of a security

breach can be detrimental to your organization.

Making sure critical data is secure, vaulted, or deleted for retention can be costly if not done correctly.

More than half of all costs are associated with data compliance

Of organizations won’t find value in

“dark data”

+90%A Waste of Space

DATA HOARDING AFFECTS EVERYONE

CHIEF INFORMATION OFFICERS (CIO)

Dark Data: Data that hasn’t been accessed in 1+ years.

KEY STAKEHOLDERS

CHIEF DATA OFFICERS (CDO)

ENTERPRISE ARCHITECTS

INFORMATION MANAGERS

A strong information governance program starts at the top.

Beginning with buy-in from chief executives, File Analysis can save

an entire organization.

KNOWING WHAT’S VALUABLE

THE INTERNAL STRUGGLE

Users see their data as a proof of productivity, fearing that its deletion could be detrimental to their job or that they might need it someday.

TAKING CONTROL OF DATA GROWTH

GET A DATA FOOTPRINT Using File Analysis, you can begin to see the scope of your unstructured data through graphical reports, identifying access threats and major sources of ROT data.

ANALYSIS

MANAGEMENT

SECURITY

Analyze millions of files across many Petabytes of file storage along with their security and identity infrastructure.

Provisioning, management and cleanup of the file storage based on policies that you define surrounding identity, role and schedule.

Make sure your files are secure and retained properly. Remove access threats and prevent them with security based on location, group collaboration, and role.

THE FILE ANALYSIS SOLUTION

EFFICIENCY With File Analysis, good data management practices can be implemented and enforced.

G E T T H E T L S

CONTROL DATA HOARDING

Deploying a File Analysis solution gives you the tools to tackle the “people-related challenges of hoarding and misguided thinking”1 through tangible analysis reports to support a data management program.

Data Hoarders

IMPLEMENT LIFECYCLE MANAGEMENT

1:121The average ratio of IT Staff to employee as reported by survey of

1,400 CIOs 2

Information Manager

User

MANAGEMENT TASKSOn-boarding, group membership, access rights, storage increases, vaulting, retention for compliance, and more...

The manual management of files can be time-consuming and monotonous, pulling IT Staff away from other tasks and causing headaches for management; also leaving room for human error - which can result in security risks and oversights.

File Analysis gives IT Staff the ability to implement lifecycle

management practices for users and their data by setting policies for creation, retention

and deletion, to meet compliance and governance

needs automatically.

IDENTIFY WHAT’S VALUABLE

By utilizing in depth reports on your data surrounding accessibility, growth, and compliance, you can make decisions about deleting or archiving files, addressing potential security threats, and load balancing data. These reports allow you to plan for future growth and save money on unnecessary additional storage that might be feeding your organization’s data glut.

1

1

1

1 Graphic created by Condrey Corp. , based on Gartner Research: Source Gartner, Organiza�ons Wi l l Need to Tackle Three Chal lenges to Curb Unstructured Data Glut and Neglect , 17 June 2015 2 Garud, S . (2001, Apr i l 25) . C IOs: IT Support Staff Fal ls Short of the Ideal Ra�o. Retr ieved December 28, 2015, f rom h�p:// i t .tmcnet.com/topics/ i t/ar�cles/167584-c ios- i t-support-staff-fa l ls -short-the- ideal .htm