Cost Effective Methodology for Remediating Offsite Tapes Webinar

Technology along with a defensible disposition strategy makes tape remediation a cost effective and viable project, that will pay for itself quickly. Attend this webinar and learn the seven step method for extracting relevant data into an online archive for legal hold and then shred the tapes. See a detailed financial analysis showing the cost an effort required to remediate legacy tapes in order to determine ROI. And learn how Index Engines automated tape access solution can deliver full knowledge of the tape content and give you the ability to extract individual files and emails without the original backup software. Register for this Webinar here

Defensible Deletion Gains Traction

According to Barry Murphy of the eDJ Group 1/3 of organizations have a Defensible Deletion program in place as a key component of their overall Information Governance strategies. Another 1/3 have plans to deploy such a program in the near future. This is a major step from the days of “saving everything” which eventually results in risk and liability. Read full article:

Backup Tapes At Center of Key Case

Penalties issued in case where emails were not produced at the request of the judge. The plaintiff could not initially find the emails, but after digging deeper into all ESI sources found the relevant emails on legacy backup tapes. This caused the judge to issue fines and sanctions for failing to preserve emails. Backup tapes have become a key source of relevant ESI and are often the only source of data that has been purged from online sources. Organizations must include backup tapes when implementing legal hold and preservation efforts. Ignoring legacy backup tapes will be the cause for future fines and sanctions. Read Article:

Defensible Deletion Webinar – Sponsored by Merrill Corp. & Index Engines

Why Implement a Defensible Deletion Strategy – Information Governance Best Practices

A Methodology for Controlling Cost and Managing Risk – WEBINAR

Simply stated, information is either an asset to an organization, or it is a liability. This idea isn’t new. Organizations have been practicing records and information management for years – assessing the value of corporate information against business, legal and regulatory needs and then making conscious retention and disposition decisions.

While these disposition drivers remain paramount, in today’s information-based economy and technology-driven business environment, controlling cost and mitigating risk has become an increasingly complex, and often times daunting task.

This webinar brought to you by Merrill Corporation and Index Engines will show how implementing a defensible deletion strategy not only mitigates long term risks and liabilities related to enterprise data assets, but also saves time and expense in supporting ongoing litigation and eDiscovery efforts.

Register for this webinar>

Date: Tue June 26, 2012
Time: 2:00pm EST.

When Speed Matters Check the Facts

eDiscovery projects are always faced with extremely tight deadlines and complex technical challenges. When a Florida based manufacturing firm had to produce ESI they knew that they had a number of choices in eDiscovery platforms, but didn’t have time to research the best solution for their needs. Collection was to be performed against a 14TB corpus of unstructured user data and time was short. This client decided to bring in two different platforms that both claimed high speed processing and they would deploy the platform that completed the processing of the data first. The race was on.

See which platform wins the race and how…

Medical data breaches raising alarm – the Washington Post

Important article on the increasing issue of medical/patient data being accessed and/or stolen. Most stolen data is taken because it’s not where it’s supposed to be. Indexing the data on your enterprise, including backup tapes, to identify and classify files is key to finding storage-related security lapses before they occur.

Read this article:

More information on how to protect your data before its compromised:

Policy as an Ally in Navigating the Data Lake

GLA ARMA, the California chapter, published the article “Policy as an Ally in Navigating the Data Lake” in their May/June Newsletter.

Data Lakes. Big Data. Digital Exhaust. Buzz words are flying, with all signs pointing to a data explosion occurring within corporate America’s firewalls. Some estimates state that 90% of all data was created in the last two years. How do organizations keep up with this rapid growth? Buying storage is easy, but that doesn’t solve the problem. Read Full Article>

Manage Costs & Risk with Defensible Deletion

Organizations retain far too much data. Users archive email on their desktops. Old files and documents are hidden away on legacy backup tapes. As employees leave a company their data lives on in network servers and is never purged.

A defensible deletion strategy is one where user data is known and either archived or remediated according to policy. This process is not only a “house cleaning” operation to clean up old data sources, such as legacy tape content, but also an ongoing process to manage data created during the normal course of business.

This webinar will show how to implement a defensible deletion policy and intelligently manage user files and email according to corporate policies in order to free up IT resources.

Date: May 3, 2012 2:00PM EST
Register Now

Learn more about Index Engines

Defensible Deletion: An aggressive approach to data management Index Engines Seeks to Help Enterprises Purge ‘Legacy Data’

As the volume of corporate data continues its exponential rise, enterprises are faced with the daunting task of continually upgrading and expanding their storage infrastructures.

But is more storage really the answer? Find out More>

Learn more about Index Engines