Exercise defensible deletion with Index Engine’s Catalyst software

The hardest part of creating and enforcing defensible deletion policies around data retention within your data center is understanding what and where data exists. PSTs, former employee files and duplicate data get lost over time and become near impossible to gauge.

Data profiling creates the map so you can construct information management, defensible deletion or other retention policies. Built-in capabilities within the catalyst engine make the process simple, defensible and automated.

Many organizations find that using data profiling to determine disposition, significant actions can occur which result in cost and resource savings. Many organizations find that as much as 22 percent of data is abandoned, 14 percent aged and has had no access in more than 3 years, 24 percent duplicate content, 6 percent personal multimedia files (iTunes, video, vacation pictures, etc) that have no business value and 18 percent risk based data for legal and compliance.

Using Catalyst’s data profiling module a comprehensive understanding of what exists is available on your network. Working with the business users a plan can be defined to determine the disposition of the content.

Built-in disposition capabilities include:

Deletion with validation – Manage the defensible deletion of unstructured data using validation to ensure the content has not changed since it was profiled. Validation checks the modified date or optionally the signature of the document.

Copy – migrate or tier data to any network share. Data will be copied and stored on a less expensive or more appropriate location.
Move – copy data to a new location, validating that it was migrated correctly, followed by a delete from the original location will result in a data move. This process ensure that content is migrated accurately and reliably.
Defensible audit logs – As disposition of the data is performed, including deletion, logs will be maintained that detail the date and disposition of the document, including the user that executed the disposition.
Output listings – full path and filename listings are available allow the use of 3rd party tools and utilities to manage disposition. This would include options to encrypt data.

Leave a Reply