Webinar: Tame risk hidden in legacy archives

Join Index Engines and Vedder Price Thursday, March 14

Is old data jeopardizing your organization?

Massive volumes of content are created every day and as this content ages it fades into the background and becomes a challenge and a risk to manage.

Backup tapes represent a major aspect of this legacy data. They embody archives of user content, from sensitive email communications to critical contracts and agreements.

But there are innovative, automated ways to reduce legacy data, manage data risks and control costs. Find out more during an exclusive webinar presented by Index Engines and Vedder Price, Thursday March 14 at 1 pm ET. Register now.

It’s a real problem that’s costing organizations millions in litigation and eDiscovery costs. Stockpiles of hidden data contain unknown risk and liabilities.

Managing this data and ensuring it complies with current information governance policies is an ongoing, complex challenge.

This webinar will give real-world new approaches towards reducing legacy data, controlling its cost, and managing the content that can be enacted immediately. Register now.

Presenters
Bruce Radke, Shareholder, Vedder Price
Jim McGann, Vice President Marketing, Index Engines

Webinar: Deadlines, Defensibility and Dollars – eDiscovery Best Practices

Join Index Engines Thur, March 7th for this exclusive web event
We understand service providers face a growing challenge from their clients – the completion of more complex projects under stricter deadlines and budgets with less man hours.

But, there’s a solution we’d like to share with you.

Discover how to keep your cost and man power resources in line while completing projects on deadline with extreme accuracy during an exclusive webinar brought to you by Index Engines, the leader in high speed ESI collection and management.

In less than 60 minutes, you’ll uncover how eDiscovery Service Providers:

Deliver culled data that is de-duplicated and metadata filtered days ahead of their deadline and competition, expediting the culling process,
Secure the integrity of findings and make it defensible using a single interface that allows for unified identification and capture of unique ESI from multiple sources, and
Accurately predict cost by deciding on a pricing model – project, subscription or custodian based – that is the most cost effective for your business.

Register now for this complimentary best practices webinar, on Thur, March 7th at 2:00PM EST and discover how top eDiscovery Service Providers are developing their business by focusing on: deadlines, defensibility and dollars.

About Index Engines’ eDiscovery model
Index Engines’ high speed ESI collection and management platform makes the eDiscovery process time and cost efficient; enabling eDiscovery service providers to complete more complex projects under stricter deadlines and budgets with less man hours. With our best-in-breed integrated workflow, we concentrate on your Deadlines, Defensibility and Dollars.

Will out of context emails make your company look “scandalous”

The news of more leaked emails is making their way around the blogosphere, including one of our favorites over at Yahoo Finance.

Henry Blodget of the Daily Ticker brings up an intriguing point, no matter how many policies you put in place or how much you hope that your employees have common sense – ‘knucklehead emails’ still get sent out.

I call them ‘knucklehead emails’ because the ones I refer to have no malice associated with them, they’re just not well thought out, like joking about a gambling spree with the petty cash. Sure, to the writer it’s funny because there’s only $10 available and the recipient knows it, but to the outside reader one year later, not so funny. It’s completely harmless until taken out of context. (The ones with malice and cover-up attempt, that’s a difference topic for another day.)

Every company has at least a handful of “knucklehead emails” somewhere in their database whether it’s football pools (Gambling), the sending of a credit card number (PII violation), or the forwarding of a joke (Sexual harassment).

In today’s hyper-sensitive and over-regulated world, if those emails got out, yours could be the next company sharing a headline with the word ‘scandalous.’

The key to preventing these situations is being aware of what information exists and making decisions on it. After all, does your information governance policy really exist if there’s no one there to enforce it?

Understanding what exists by adding a data profiling policy to your information governance plan is a start. Parameters can also be set to start a defensible deletion policy for information that has no business value. The only thing a forwarded chain mail from an ex-employee that hasn’t been viewed in seven years can do is come back to hurt you. The harsh truth is, your email servers are filled with valueless emails waiting to find their way out in to the open.

Organizations need to be proactive to protect their consumers and themselves. The ‘keep everything’ policy does more than just inflate your storage costs, it puts you in line to be the next “scandalous” company.

For more information on protecting your company from “knucklehead emails” contact info@indexengines.com

Live in Chicago: Defensible solutions for reducing data accumulation and legacy data retention

Discover how to reduce data risk and cost Feb. 21 in Chicago

What: Index Engines and Esicon Consulting are holding a complimentary, live seminar “Defensible solutions for reducing data accumulation and legacy data retention”

Who: Index Engines, the leader in enterprise information management and archiving solutions and Esicon Consulting, an information technology and data management litigation consulting firm
Why: Many companies have legacy data on backup tapes that has been sitting in vaults 5, 10 or more years with the door only opening to put more tapes inside. Frighteningly, these tapes are full stockpiles of email servers and user documents that have not been managed according to the evolving legal and regulatory policies.
Now, technology has made viewing and accessing backup tape data possible without restoring systems or it becoming a time and cost burden, allowing organizations to proactively manage legacy data for risk and liabilities.

Who benefits: Legal professionals that want to reduce legal and organization risk and the costs associated with maintaining and adding data storage. (CLE: This program qualifies for 2 hours of general credit for Illinois attorneys)

When: Thursday, Feb. 21

Where: The Franklin Center, 222 West Adams Street, Chicago

Cost: Free

Register: http://go.indexengines.com/l/11252/2013-01-25/pwf2q
Contact info@indexengines.com for more information

As another company settles with the FTC over data privacy violations, Index Engines says ‘breaches are preventable’

In wake of another FTC fine resulting from exposure of personally identifiable information, enterprise information management provider, Index Engines, says the technology exists to avoid security breaches and fines.

HOLMDEL, NJ – Nearly 300,000 people allegedly had their Social Security and credit card numbers exposed when unencrypted backup tapes and other data storage belonging to Cbr Systems, Inc were stolen from a vehicle; causing the FTC to hand down drastic penalties over the next 20 years and an information management provider to preach ‘an ounce of prevention.’

Index Engines, a leader in enterprise information management and archiving solutions, watched the essence of what they help companies avoid happen as the FTC required Cbr Systems to establish and maintain a complete information security program and submit to independent security audits every other year for 20 years.

“Index Engines helps companies reduce their liability and security risks by profiling electronically stored information so they can quickly, easily and affordably see what they have,’’ Index Engines Vice President David Ballard said. “This process helps make breaches preventable because organizations know immediately where sensitive data resides within the enterprise and can secure it according to policy.”

Index Engines allows users to map out the type, location and age of data, enabling companies to determine the disposition of the content in order to maintain compliance to regulations governing electronic data.

Along with metadata, Index Engines enables companies to govern themselves with a Personally Identifiable Information (PII) search that finds and accesses sensitive content including unencrypted data, social security and credit card numbers. This standard search would have protected Cbr Systems’ information.

“Most companies have sound information governance and privacy policies, but they don’t have the capability or knowledge to enforce them,” Index Engines Vice President Jim McGann said. “The solutions are out there, companies just need to be proactive in understanding what they have or it will be a case of what you don’t know will hurt you.”

Index Engines also says this is not the first FTC data privacy charge that could have been prevented. Last year the FTC charged Wyndham Worldwide and three affiliates after credit card numbers were kept in plain text files that resulted in the electronic theft of credit card data. Index Engines allows users to search emails, files, PDFs, servers and legacy tapes and determine if they are at risk for security breaches.

“When you look at all a company risks from having a data privacy breach – fines, penalties and the loss of consumer trust – there’s no viable reason enforcing your data privacy policy shouldn’t be the first line item on your budget,’’ McGann said. “Affordable, efficient technology exists to avoid security breaches and protect PII.”

Accelerating Time to Data

Index Engines eDiscovery and Legal Hold Workflow

eDiscovery professionals struggle to meet tight deadlines and manage even tighter budgets.

Service providers and litigation support professionals alike are constantly stressed when facing large and complex jobs that require identification, collection and culling of electronically stored information (ESI). This all boils down to time to data. Time to search. Time to review. Time to get the job done.

At LegalTech next week Index Engines will introduce the concept of Accelerating Time to Data. Many of our clients have used traditional tools and software to manage different aspects of ESI processing. From tools to extract PSTs from Exchange, to indexing tools, to search and culling tools, OCR, review, hosting, etc.

Using many tools requires moving ESI which takes time and compromises defensibility. When eDiscovery jobs were small and manageable these tools did the job, painfully, but it was completed close to schedule. As the scale of eDiscovery jobs has grown and the complexity has expanded these tools have failed to meet deadlines.

Time to data is about using a unified approach to manage ESI processing. A single platform allows you to get the job done faster as you are not managing multiple tools and transferring ESI. A single unified platform ensures reliability and defensibility and provides a single audit trail that can be easily referenced as needed.

Time to data is our theme at LegalTech and beyond. As the fastest ESI indexing solution on the market today it is time to impact your time to data and start meeting deadlines and budgets. And don’t believe those other vendors that claim to be the fastest at 1TB per day, the mark to beat here is only delivered by Index Engines at 1TB per hour.

Visit Index Engines at LegalTech booth #2105.

Data Profiling the Key to Cost Control and Risk Management

The “save everything” data strategy has become costly, inefficient and risky for legal teams across the globe.

Understanding what user data exists, where it’s located, who owns it, and why it’s being kept is a necessity every company strives for, yet data is horded and stockpiled causing data discovery and management costs to increase annually along with risk of additional lawsuits.

Legal departments must work with IT to understand what exists and develop a policy that will protect the organization from harm and long-term risk. This discovery process is developed through data profiling, or the mapping of user data, which sheds light on content and helps refine and define policies, effectively discovering and managing potential liabilities before they strike.

A thorough data profile will uncover metadata and provide the legal team with a comprehensive view into what data exists. This in turn allows companies to manage data more effectively and control long term risk.

For example, many organizations do not know the location of or how to manage user created pst files, which represent mini-archives of sensitive email.

A data map not only uncovers all pst’s, but shows who owns them and when they were last accessed or modified. Using this information, an organization can determine if pst’s are a liability and create a plan on how to best manage them.

Companies can determine the disposition of user content, move what is required by compliance onto legal hold, eliminate potential PCI compliance violations, secure sensitive content in the corporate archive and purge data that no longer has business value.

Data profiling is the first step to mitigating unseen compliance risks and additional litigation discovery costs. Start protecting yourself with a profile of your most sensitive sources of data whether it’s specific departmental servers from finance or senior executives, or legacy backup tapes.

Once you discover what data exists, you can effectively manage it and create an enforceable governance policy and archiving strategy going forward.

Discover more about using data profiling to your advantage in this free white paper, “How to use Data Mapping to Manage Liability

Litigation Support Today – Streamline your eDiscovery Lab

Today’s requirement for ESI (electronically stored information) collection and preservation has exploded. Projects can easily grow into terabytes of data, sources of collection have become complex, and the simple requirements of collecting ESI have morphed into full-fledged legal preservation and hosting capabilities. As the environment has changed, organizations might wish to consider new platforms that can streamline the eDiscovery process to better control costs and provide value-added capabilities.

A recent article in Litigation Support Today discusses how eDiscovery service providers can increase productivity and client satisfaction.

Read Article>