As another company settles with the FTC over data privacy violations, Index Engines says ‘breaches are preventable’

In wake of another FTC fine resulting from exposure of personally identifiable information, enterprise information management provider, Index Engines, says the technology exists to avoid security breaches and fines.

HOLMDEL, NJ – Nearly 300,000 people allegedly had their Social Security and credit card numbers exposed when unencrypted backup tapes and other data storage belonging to Cbr Systems, Inc were stolen from a vehicle; causing the FTC to hand down drastic penalties over the next 20 years and an information management provider to preach ‘an ounce of prevention.’

Index Engines, a leader in enterprise information management and archiving solutions, watched the essence of what they help companies avoid happen as the FTC required Cbr Systems to establish and maintain a complete information security program and submit to independent security audits every other year for 20 years.

“Index Engines helps companies reduce their liability and security risks by profiling electronically stored information so they can quickly, easily and affordably see what they have,’’ Index Engines Vice President David Ballard said. “This process helps make breaches preventable because organizations know immediately where sensitive data resides within the enterprise and can secure it according to policy.”

Index Engines allows users to map out the type, location and age of data, enabling companies to determine the disposition of the content in order to maintain compliance to regulations governing electronic data.

Along with metadata, Index Engines enables companies to govern themselves with a Personally Identifiable Information (PII) search that finds and accesses sensitive content including unencrypted data, social security and credit card numbers. This standard search would have protected Cbr Systems’ information.

“Most companies have sound information governance and privacy policies, but they don’t have the capability or knowledge to enforce them,” Index Engines Vice President Jim McGann said. “The solutions are out there, companies just need to be proactive in understanding what they have or it will be a case of what you don’t know will hurt you.”

Index Engines also says this is not the first FTC data privacy charge that could have been prevented. Last year the FTC charged Wyndham Worldwide and three affiliates after credit card numbers were kept in plain text files that resulted in the electronic theft of credit card data. Index Engines allows users to search emails, files, PDFs, servers and legacy tapes and determine if they are at risk for security breaches.

“When you look at all a company risks from having a data privacy breach – fines, penalties and the loss of consumer trust – there’s no viable reason enforcing your data privacy policy shouldn’t be the first line item on your budget,’’ McGann said. “Affordable, efficient technology exists to avoid security breaches and protect PII.”

Accelerating Time to Data

Index Engines eDiscovery and Legal Hold Workflow

eDiscovery professionals struggle to meet tight deadlines and manage even tighter budgets.

Service providers and litigation support professionals alike are constantly stressed when facing large and complex jobs that require identification, collection and culling of electronically stored information (ESI). This all boils down to time to data. Time to search. Time to review. Time to get the job done.

At LegalTech next week Index Engines will introduce the concept of Accelerating Time to Data. Many of our clients have used traditional tools and software to manage different aspects of ESI processing. From tools to extract PSTs from Exchange, to indexing tools, to search and culling tools, OCR, review, hosting, etc.

Using many tools requires moving ESI which takes time and compromises defensibility. When eDiscovery jobs were small and manageable these tools did the job, painfully, but it was completed close to schedule. As the scale of eDiscovery jobs has grown and the complexity has expanded these tools have failed to meet deadlines.

Time to data is about using a unified approach to manage ESI processing. A single platform allows you to get the job done faster as you are not managing multiple tools and transferring ESI. A single unified platform ensures reliability and defensibility and provides a single audit trail that can be easily referenced as needed.

Time to data is our theme at LegalTech and beyond. As the fastest ESI indexing solution on the market today it is time to impact your time to data and start meeting deadlines and budgets. And don’t believe those other vendors that claim to be the fastest at 1TB per day, the mark to beat here is only delivered by Index Engines at 1TB per hour.

Visit Index Engines at LegalTech booth #2105.

Data Profiling the Key to Cost Control and Risk Management

The “save everything” data strategy has become costly, inefficient and risky for legal teams across the globe.

Understanding what user data exists, where it’s located, who owns it, and why it’s being kept is a necessity every company strives for, yet data is horded and stockpiled causing data discovery and management costs to increase annually along with risk of additional lawsuits.

Legal departments must work with IT to understand what exists and develop a policy that will protect the organization from harm and long-term risk. This discovery process is developed through data profiling, or the mapping of user data, which sheds light on content and helps refine and define policies, effectively discovering and managing potential liabilities before they strike.

A thorough data profile will uncover metadata and provide the legal team with a comprehensive view into what data exists. This in turn allows companies to manage data more effectively and control long term risk.

For example, many organizations do not know the location of or how to manage user created pst files, which represent mini-archives of sensitive email.

A data map not only uncovers all pst’s, but shows who owns them and when they were last accessed or modified. Using this information, an organization can determine if pst’s are a liability and create a plan on how to best manage them.

Companies can determine the disposition of user content, move what is required by compliance onto legal hold, eliminate potential PCI compliance violations, secure sensitive content in the corporate archive and purge data that no longer has business value.

Data profiling is the first step to mitigating unseen compliance risks and additional litigation discovery costs. Start protecting yourself with a profile of your most sensitive sources of data whether it’s specific departmental servers from finance or senior executives, or legacy backup tapes.

Once you discover what data exists, you can effectively manage it and create an enforceable governance policy and archiving strategy going forward.

Discover more about using data profiling to your advantage in this free white paper, “How to use Data Mapping to Manage Liability

Litigation Support Today – Streamline your eDiscovery Lab

Today’s requirement for ESI (electronically stored information) collection and preservation has exploded. Projects can easily grow into terabytes of data, sources of collection have become complex, and the simple requirements of collecting ESI have morphed into full-fledged legal preservation and hosting capabilities. As the environment has changed, organizations might wish to consider new platforms that can streamline the eDiscovery process to better control costs and provide value-added capabilities.

A recent article in Litigation Support Today discusses how eDiscovery service providers can increase productivity and client satisfaction.

Read Article>

New release of Octane ver. 4.5 – enhancing ediscovery workflow

New release adds support for Relativity®, OCR and high speed forensic image processing broadening EDRM support through a unified platform

“Index Engines is committed to providing a single, unified platform that provides powerful processing of electronic data in support of eDiscovery and compliance. With deployment of the Octane platform our clients have streamlined costs and resources, improved overall responsiveness, and take advantage of best of breed technologies such as Relativity.” states Jim McGann, VP of Marketing at Index Engines.

Read full release: http://bit.ly/Sq3ZVi

Bigger isn’t always better when it comes to Big Data

Analyzing data: Why a “bigger is better” mentality may be at odds with intelligent information governance 5V’s of big data – Volume, Velocity, Variety, Value and Veracity. The Five Vs keep in-house counsel from turning “big data” into “bad data” http://bit.ly/Q4l56V @dean_gonsowski @InsideCounsel

Read entire article

Legacy Backup Tape Remediation Chalk Talk

Watch Ed Moke, VP of Operations at Index Engines explains the process of legacy backup tape remediation. Purging legacy disaster recovery tapes saves offsite storage costs (Iron Mountain, Recall and others) and eliminates risk and liability of the unmanaged user files and email. Index Engines supports direct indexing, search and extraction of files and email from tapes created using Symantec NetBackup and Backup Exec, IBM TSM, EMC Legato Networker, CA ArcServe, HP DataProtector, and others. Simply load DLT, LTO, AIT and other tapes in library and automate the process of indexing and extraction of the content based on legal and compliance policy. No need for expensive tape restoration or the original backup software.

Watch Video

Learn more about Tape Remediation