SlideShare a Scribd company logo
White Paper



Seven Essential Strategies for
Effective Archiving



Sponsored by:




Abstract
Archiving helps organizations effectively retain, manage, and leverage their
information assets. It is also complimentary to backup and broader data protection
activities. This paper outlines seven essential strategies for archiving that drive cost
savings, risk reduction and IT transformation.


Disclaimer
Contoural provides information regarding business, compliance and litigation trends
and issues for educational and planning purposes. However, legal information is not
the same as legal advice – the application of law to an individual's or organization's
specific circumstances. Contoural and its consultants do not provide legal advice.
Organizations should consult with competent legal counsel for professional
assurance that our information, and any interpretation of it, is appropriate to each
organization’s particular situation.


                                                                  Copyright 2012 Contoural, Inc.
Seven Essential Strategies for Effective Archiving



                                                Table of Contents
Introduction ................................................................................................................3
The Importance of Archiving .......................................................................................3
   To Improve Data Storage Efficiency ....................................................................................3
   To Promote “Information Transformation” .........................................................................3
   To Cope with eDiscovery and Regulatory Requirements ......................................................4
Seven Essential Strategies for Effective Archiving ........................................................4
   Strategy 1: Clearly Define the Roles of Backup and Archiving...............................................4
   Strategy 2: Adopt a Disk-Based Archive...............................................................................5
   Strategy 3: Converge Backup and Archive Storage ...............................................................6
   Strategy 4: Use Storage and Application Intelligence to Classify Information........................7
   Strategy 5: Adopt Value-Based Retention Policies ...............................................................8
   Strategy 6: Enable Enterprise-wide Defensible Deletion ......................................................8
   Strategy 7: Plan for Today and the Future ...........................................................................9
Conclusion: Stay Ahead of the Curve with Archiving ....................................................9
About EMC................................................................................................................ 10
About Contoural, Inc. ................................................................................................ 11




Copyright © 2012 Contoural, Inc.                                                                                            2
Seven Essential Strategies for Effective Archiving



Introduction
IDC have recently estimated the size of the digital universe at 1.8 zettabytes (1.8
trillion gigabytes in 500 quadrillion files), a volume that is more than doubling every
two years. In the face of such growth, managing information seems to be getting
harder to accomplish. The difficulty is exacerbated by:
   The need to retain larger volumes of data for longer periods of time to meet
    governance and compliance requirements.
   The need to maintain accessibility to data for business intelligence and
    eDiscovery requirements.
   Limited information technology (IT) budget dollars.
Organizations and vendors have responded with technologies based on magnetic
tape, specialized storage platforms, optical media, automated storage tiering and
deduplication. Each of these can play a role in managing retention and controlling
costs, but given today’s explosive growth of information, some are better than
others.
This paper outlines seven critical strategies for effective archiving that drive cost
savings, reduce risk and enable ―information transformation.‖

The Importance of Archiving
When customers are asked what ―archiving‖ means to them, the answers depend on
the perspective of the respondent. To IT managers, archiving often means the
placement of electronically stored information (ESI) on the most cost-effective media
throughout the information’s lifecycle. Compliance officers want archives to contain
ESI that can be indexed, located and controlled, is stored authentically, and has
retention policies applied. And attorneys require historical data stores that can be
quickly searched for information to support an immediate legal challenge. We
believe there are three key drivers for archiving.
To Improve Data Storage Efficiency
Typically, organizations have
implemented formal archiving processes         Definition of an archive: ―…a specialized
and technologies to improve IT cost            repository…used to…preserve, protect,
control. With archiving, capacity on                    control, maintain authenticity and
expensive primary storage can be                    integrity, accommodate physical and
reclaimed by moving infrequently-              logical migration, and guarantee access
accessed information to lower-cost tiers.      to information and data objects over their
Reducing the size of primary data stores                        required retention period.‖
can reduce backup and recovery times                                          (Source: SNIA)
and boost database and application
performance.
To Promote “Information Transformation”
Archiving can help organizations use growing volumes of information in potentially
new and unanticipated ways. For example, new product innovation can be fostered


Copyright © 2012 Contoural, Inc.                                                               3
Seven Essential Strategies for Effective Archiving


if engineers can access archived project materials such as designs, test results, and
requirement documents. Customer service can be improved by providing ready
access to historical customer records, email, and correspondence. Healthcare
records can be used as reference material for new research. Archiving such
information with secure data retention capabilities keeps it secure, accessible and
ready to provide business value today and in the future.
To Cope with eDiscovery and Regulatory Requirements
Regulations force organizations to secure certain types of data and make them
accessible. It’s important for companies to know where that information resides so
that they can protect it, and to eliminate stale data so that it doesn’t get them in
trouble. eDiscovery – the requirement that customers collect, preserve, review and
produce information for legal proceedings and investigations – remains a big
concern because of its urgency and expense, both of which can disrupt IT
operations. Capabilities for efficient retention and searching of data stores –
enabled by archiving – can substantially reduce risk and cut the cost of compliance
and eDiscovery.

Seven Essential Strategies for Effective Archiving
Archiving helps organizations more effectively retain, manage, protect, and utilize
their information assets. It should be considered as an essential element of an
overall data protection and storage management strategy.

Strategy 1: Clearly Define the Roles of Backup and Archiving

Many organizations depend on backup tapes for long-term retention. For such
organizations, they are considered to be an ―archive.‖ We believe that this is
misguided.
Backups are secondary copies of active production data. Since backups deal with
constantly changing business information, they are generally short-term focused and
often overwritten. This makes them a poor choice for retaining data for compliance
reasons. Further, retrieval of fine-grained information (for example, a single email or
SharePoint document) from backups can be time-consuming and expensive,
especially if the tapes need to be brought back from off-site storage.

            Archive                               Backup

            Primary information                   Copy of information


            Used for compliance and efficiency:   Used for recovery:
             – data retained in original form     – improves availability, allowing
            – enables response to legal or           applications to be restored to a
               regulatory action                     point in time
            – offloads information from
               production systems and storage

            Typically long-term:                  Typically short-term:
            – months, years or even decades       – information held for days or weeks



Copyright © 2012 Contoural, Inc.                                                         4
Seven Essential Strategies for Effective Archiving


By contrast, archives focus on information retrieval, usually at the level of a file, e-
mail or other individual piece of content. When a piece of information stops
changing or is no longer frequently used and long-term retention must be applied, it
is best to move it to a searchable archive, from where it can be retrieved in less time
and at lower cost compared to backups.
If magnetic tapes are still in widespread use, formal archiving procedures can be a
―bridge‖ technology to help eliminate or at least reduce their role. In fairness, the
dynamics of tape usage for backup have changed in recent years. Leading IT
departments have embarked on conscious tape elimination efforts that have yielded
significant benefits. For example, Virtual Tape Libraries (VTLs) use disks to emulate
industry standard tape libraries. VTLs can help IT departments reduce Recovery
Time Objectives (RTO) and Recovery Point Objectives (RPO) significantly,
consolidate storage and keep backup information readily accessible. But the sheer
increase of information volume means that this approach fills the capacity of storage
arrays in many organizations.
Our advice is to move away from the paradigm of “backup as archive” for long-term
retention. Backups – especially magnetic tapes, because of the cost of physical
storage and the latency involved in retrieving information – are a poor choice for
managing data to enable eDiscovery, to comply with regulatory requirements and to
promote information transformation as we’ve defined it.

Strategy 2: Adopt a Disk-Based Archive

In addition to meeting governance and compliance requirements, organizations
retain data for business intelligence and competitive advantage. A data set's present
minimal or unknown value might become apparent in some future and unforeseen
context; just consider what’s happening with ―big data‖ and predictive analytics.
Both active and archived information can help data scientists – and rank-and-file
employees – drive new innovations or help to improve current business processes.
In this way, archiving can help organizations ―expect the unexpected‖.
Furthermore, with a robust archiving system in place, employees will be less likely to
engage in ―underground archiving‖, whereby documents are saved in private
repositories, laptops or USB drives, all of which are outside of the control of the
organization.
To make sure that information is readily accessible, archived information needs to be
available online. Organizations relying upon traditional tape-based archiving will be
challenged to address business needs due to the inherent performance and
accessibility characteristics of tape. It might also be tempting simply to devote high-
capacity arrays of inexpensive drives (or ―just a bunch of disks,‖ also known as
JBOD) to the archiving task. But ―cheap disk‖ is only inexpensive to buy. A far
greater operational cost comes from the management of such resources –
provisioning, backup/protection, replication, etc.
A better approach is to deploy a disk-based solution to address the needs of archival
workloads. Some of the characteristics of such a solution include, but are not limited
to:




Copyright © 2012 Contoural, Inc.                                                       5
Seven Essential Strategies for Effective Archiving


   Employs deduplication to maximize storage efficiency.
   Ensures data integrity, protection and security.
   Guarantees that data can be restored, even after a lengthy time period, taking
    into account changing drive technology, software versions, etc.
   Enables administrators to enforce multiple retention periods for different archive
    data sets stored on the same system.
Customers and industry observers seem to agree that an online approach to
archiving is gaining momentum:
      ―The growth of digital archive capacity stored on external disk systems
      will also exceed the overall market growth rate, increasing at a 62%
      CAGR between 2010 and 2015…rapid growth in the use of external disk-
      based storage systems for digital archiving means that the share of all
      archive capacity stored on external disk will increase from 29% in 2010
      to 35% in 2015.‖ (Source: Enterprise Strategy Group, June 2010)

Strategy 3: Converge Backup and Archive Storage

Backup is driven by the need for recoverability and disaster protection while
archiving is driven by the need for improved efficiency, information re-purposing and
to address compliance and eDiscovery challenges. Real cost savings can be
realized by adopting a strategy for the physical storage of both backup and archiving
workloads. To accomplish this, a common storage target must be able to handle the
throughput and inline deduplication requirements of backup workloads and secure
and long-term retention requirements of archive workloads. In addition, the storage
target should provide built-in capabilities for network-efficient replication for disaster
recovery needs, enterprise features such as encryption, and allow for easy
integration with existing application infrastructure.

                                       Primary Storage for
                                   PRODUCTION APPLICATIONS



         Backup and Recovery for                                 Archiving for
         DATA PROTECTION AND                                   COMPLIANCE AND
            RECOVERABILITY                                       eDISCOVERY




                                      Common Storage for
                                      Both Workloads for
                                         EFFICIENCY




Copyright © 2012 Contoural, Inc.                                                         6
Seven Essential Strategies for Effective Archiving




Backup and archiving are necessary and complimentary IT procedures. By
leveraging a common infrastructure for both, organizations can greatly ease the
burden of eDiscovery, data recovery, business continuity, and compliance and
achieve these goals in the most cost-efficient manner.

Strategy 4: Use Storage and Application Intelligence to Classify Information

Organizations must know much more about the information that they possess than
they did just a few years ago. Of course, it is important to know how many petabytes
are in place and where they reside, but to stay relevant and competitive;
organizations must understand why they have them.
Clearly, information has intrinsic value. Otherwise, it wouldn’t be captured and
retained. But the value of most data sets is subjective; deciding how much effort and
resources should be spent on keeping, expunging or archiving them can be a
confusing and contentious issue.
The good news is that determining the value of information can be made easier by
taking a good inventory of what’s in place and classifying it effectively. As the
volume of information grows, so does the amount of metadata – ―data about the
data‖ – which makes value judgments about information stores possible. Metadata
includes things like file and block size, date of last access, location and many other
storage-related parameters that enable ―storage intelligence‖ about what exists, what
resources it is consuming and whether it should be moved to lower-cost storage
tiers.
Core applications like Enterprise Resource Planning (ERP), Microsoft SharePoint,
structured databases, social software (like Twitter and Google+) and document
authoring tools generate rich and varied application-specific metadata like keywords,
subject, versions, security attributes and linkage to other applications. Such
metadata can be regarded as ―application intelligence‖ at the level of the data item or
business object and not just at the file or block level.
Classification – made possible by combining storage and application intelligence –
helps organizations identify the importance and value of information. But classifying
everything all at once can be a daunting task. We suggest that customers do the
following:
   Identify the data sets that carry the most potential for exposure to regulatory,
    legal or eDiscovery risk and the associated costs. Some common examples
    include email, SharePoint, and networked file shares. Make these the initial
    sources for ―intelligence-gathering.‖
   Use automated tools for indexing, auto classification, text and content analytics,
    search and data mining to extract meaning and value from the data deluge.
Classifying information is a crucial element of a sound archiving strategy that drives
policies for long-term retention and defensible deletion.




Copyright © 2012 Contoural, Inc.                                                         7
Seven Essential Strategies for Effective Archiving


Strategy 5: Adopt Value-Based Retention Policies

Typical decisions about the long-term retention of information are based on IT
operational needs. Sure enough, holding on to content based on file system
metadata – such as age or file size – makes it possible to capture and migrate
content to lower-cost tiers of storage. But such a capacity-based approach makes
no allowance for the importance or confidentiality of such information. Perhaps
there’s no good reason to save it at all!
A better approach is to supplement capacity-based retention rules with policies
aligned with business value. For example, retention policies can be based on any or
all of the following:
   External regulations or legal mandates that define what kinds of information to
    save and for how long.
   The requirement of departments (e.g., finance, manufacturing, sales) or business
    units to save different information for varying lengths of time.
   Requirements to preserve certain historical information for operational continuity
    reasons.
The notion of value-based retention dovetails nicely with the concepts of records
series, file plans and legal holds that are essential to the discipline of ―records and
information management‖ (RIM). To make life easier, we recommend that IT
managers reach out to their RIM colleagues who have already dealt with issues
about value-based retention policies.

Strategy 6: Enable Enterprise-wide Defensible Deletion

While some organizations get in trouble for not saving documents for the required
retention period, most face the opposite problem: their de facto policy is to save
nearly all information forever.
A defensible deletion policy ensures that organizations do not delete documents they
need to retain or preserve. It provides some level of protection against litigants and
regulators who, in the future, may ask uncomfortable questions about why specific
documents have been deleted. Finally, it affords justification for the removal of
unneeded information that would otherwise drive up storage costs and increases the
risks and costs of eDiscovery.
To achieve defensible deletion, we recommend that customers:
   Put effort into determining what needs really needs to be saved. A good
    archiving system based on the value of information to be retained can greatly aid
    this process.
   Make sure that policies include both the business justification and process for
    deleting documents.
   Create a clear and consistent legal hold process that clearly identifies information
    being held, allowing for routine deletion of data not under hold.




Copyright © 2012 Contoural, Inc.                                                          8
Seven Essential Strategies for Effective Archiving


Strategy 7: Plan for Today and the Future

So far, we’ve only alluded to this important and sometimes overlooked aspect to the
archiving program: gaining early organizational agreement and maintaining it over
time. Decisions about long-term retention, defensible deletion and information
accessibility are important beyond the IT department. They should be made up-front
and with the agreement of major stakeholders.
We advise regular consultation with groups such as the legal and records
management teams as well as executives and end-users. Incorporate archiving into
the shared service plans for storage management, regardless of the topology of the
computing and storage network. Make sure that policies and service-level
agreements meet business needs and are realistic.
Carefully consider the direction and ―velocity‖ of technological changes. For
example, cloud storage today is mature and reliable; plans for backup and archival
should consider platforms that can support public and private cloud environments.
―Big data‖ means high volumes of very large (e.g., surveillance video) and very small
(e.g., Telco call detail records) file sizes, forcing organizations to determine the value
of information to be retained. And expectations of end users means that access to
active and archived information needs to be available to smartphones, tablets,
laptops and desktop systems. Make sure that what is put in place works today and
can accommodate the future.

Conclusion: Stay Ahead of the Curve with Archiving
Managing information seems to be getting harder to accomplish, but it doesn’t have
to be that way. An effective archiving strategy will help organizations retain,
manage, protect, and utilize their information assets effectively by:
   Centralizing views of retained information in a digital, online archive so that it is
    searchable and readily accessible by end-users, either in routine operations or in
    totally unexpected ways.
   Taking advantage of advances in object-based storage, deduplication and tiered
    storage topologies to direct both backup and archived information workloads to a
    common storage target.
   Leveraging storage and application intelligence to measure the value of
    information at the level of the data item or business object.
   Simplifying retention and defensible deletion policies based on information value,
    rather than driving toward a costly ―save everything forever‖ approach.
   Staying close to the needs of the business and trends in technology.
Challenged by growth in volume and variety of information, archiving has become an
essential IT activity. With a well-designed archiving strategy in place, organizations
need not be victims to rising costs, compliance challenges and legal risk.




Copyright © 2012 Contoural, Inc.                                                         9
Seven Essential Strategies for Effective Archiving



About EMC
EMC Corporation is a global leader in enabling businesses and service providers to
transform their operations and deliver IT as a service. Fundamental to this
transformation is cloud computing. Through innovative products and services, EMC
accelerates the journey to cloud computing, helping IT departments to store,
manage, protect and analyze their most valuable asset — information — in a more
agile, trusted and cost-efficient way. Additional information about EMC can be found
at www.EMC.com.




Copyright © 2012 Contoural, Inc.                                                  10
Seven Essential Strategies for Effective Archiving



About Contoural, Inc.
Contoural is the largest independent provider of Information Governance Consulting
Services with expertise in Records & Information Management, Litigation Readiness
and Sensitive Information Control. Having worked with more than 20% of the
Fortune 500, as well as a number of Federal agencies, they enable companies to
become proactive and defensible in controlling, managing and deleting their
business information to reduce risk, increase compliance and lower costs. Contoural
is independent and provides proactive consulting services; they do not sell any
products, provide ―reactive‖ discovery services, or warehouse any information, and
as such our clients truly view us as trusted advisors.
With an average of 14 years industry experience, Contoural's team is comprised of
attorneys, former compliance officers and records managers who have a deep
understanding of the legal, compliance and business requirements for retaining and
managing information -- as well as seasoned IT professionals with expertise in
document archiving, search, litigation management systems, data classification and
data storage, all focused on effective program execution.
Contoural services include:
      RIM and Litigation Readiness Assessment and Roadmap Development
       Services
      Records and Information Management Policy Development Services
      Data Classification Services
      Litigation Readiness Services
      Solution Design, Technology Evaluation and Vendor Selection Services
      Solution Implementation Services
      Change Management and Education Services
      Ongoing Program Management Services
With these services, Contoural helps enterprises ensure compliance and reduce risk,
while also achieving litigation readiness and reducing costs.


Contoural, Inc.
5150 El Camino Real, Ste D30
Los Altos, CA 94022
650-390-0800
www.Contoural.com
info@contoural.com




Copyright © 2012 Contoural, Inc.                                                 11

More Related Content

What's hot

Backup and recovery_redesign
Backup and recovery_redesignBackup and recovery_redesign
Backup and recovery_redesigngeorgegaudi
 
Archive First: An Intelligent Data Archival Strategy, Part 1 of 3
Archive First: An Intelligent Data Archival Strategy, Part 1 of 3Archive First: An Intelligent Data Archival Strategy, Part 1 of 3
Archive First: An Intelligent Data Archival Strategy, Part 1 of 3
Hitachi Vantara
 
Intelligent Information Management: Archive & eDiscovery
Intelligent Information Management: Archive & eDiscoveryIntelligent Information Management: Archive & eDiscovery
Intelligent Information Management: Archive & eDiscovery
Arrow ECS UK
 
AlanDrummer-GetYourMoneyOutofStorage
AlanDrummer-GetYourMoneyOutofStorageAlanDrummer-GetYourMoneyOutofStorage
AlanDrummer-GetYourMoneyOutofStorageAlan Drummer
 
RenewData Corporate Brochure
RenewData Corporate BrochureRenewData Corporate Brochure
RenewData Corporate BrochureAlan Brooks
 
A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storage
Preludedx
 
Smarter Management for Your Data Growth
Smarter Management for Your Data GrowthSmarter Management for Your Data Growth
Smarter Management for Your Data Growth
RainStor
 
Symantec Data Insight for Storage
Symantec Data Insight for StorageSymantec Data Insight for Storage
Symantec Data Insight for Storage
Symantec
 
Accenture hana-in-memory-pov
Accenture hana-in-memory-povAccenture hana-in-memory-pov
Accenture hana-in-memory-povK Thomas
 
Managing Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the EnvironmentManaging Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the Environment
Jon Collins
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup Protection
CrystaLink Inc.
 
Decision Forward Cloud Backup-guide
Decision Forward Cloud Backup-guideDecision Forward Cloud Backup-guide
Decision Forward Cloud Backup-guide
David Soden
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
Everteam
 
Cloud ERP Security: Guidelines for evaluation
Cloud ERP Security: Guidelines for evaluationCloud ERP Security: Guidelines for evaluation
Cloud ERP Security: Guidelines for evaluation
Nazli Sahin
 
Insiders Guide- Full Business Value of Storage Assets
Insiders Guide- Full Business Value of Storage AssetsInsiders Guide- Full Business Value of Storage Assets
Insiders Guide- Full Business Value of Storage AssetsDataCore Software
 
The economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your businessThe economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your businessServium
 
Managing Data Warehouse Growth in the New Era of Big Data
Managing Data Warehouse Growth in the New Era of Big DataManaging Data Warehouse Growth in the New Era of Big Data
Managing Data Warehouse Growth in the New Era of Big Data
Vineet
 

What's hot (20)

Backup and recovery_redesign
Backup and recovery_redesignBackup and recovery_redesign
Backup and recovery_redesign
 
Archive First: An Intelligent Data Archival Strategy, Part 1 of 3
Archive First: An Intelligent Data Archival Strategy, Part 1 of 3Archive First: An Intelligent Data Archival Strategy, Part 1 of 3
Archive First: An Intelligent Data Archival Strategy, Part 1 of 3
 
10 Archive and Compliance
10 Archive and Compliance10 Archive and Compliance
10 Archive and Compliance
 
Intelligent Information Management: Archive & eDiscovery
Intelligent Information Management: Archive & eDiscoveryIntelligent Information Management: Archive & eDiscovery
Intelligent Information Management: Archive & eDiscovery
 
AlanDrummer-GetYourMoneyOutofStorage
AlanDrummer-GetYourMoneyOutofStorageAlanDrummer-GetYourMoneyOutofStorage
AlanDrummer-GetYourMoneyOutofStorage
 
Webinar Win In Court V3
Webinar Win In Court V3Webinar Win In Court V3
Webinar Win In Court V3
 
RenewData Corporate Brochure
RenewData Corporate BrochureRenewData Corporate Brochure
RenewData Corporate Brochure
 
Generic RLM White Paper
Generic RLM White PaperGeneric RLM White Paper
Generic RLM White Paper
 
A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storage
 
Smarter Management for Your Data Growth
Smarter Management for Your Data GrowthSmarter Management for Your Data Growth
Smarter Management for Your Data Growth
 
Symantec Data Insight for Storage
Symantec Data Insight for StorageSymantec Data Insight for Storage
Symantec Data Insight for Storage
 
Accenture hana-in-memory-pov
Accenture hana-in-memory-povAccenture hana-in-memory-pov
Accenture hana-in-memory-pov
 
Managing Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the EnvironmentManaging Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the Environment
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup Protection
 
Decision Forward Cloud Backup-guide
Decision Forward Cloud Backup-guideDecision Forward Cloud Backup-guide
Decision Forward Cloud Backup-guide
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
 
Cloud ERP Security: Guidelines for evaluation
Cloud ERP Security: Guidelines for evaluationCloud ERP Security: Guidelines for evaluation
Cloud ERP Security: Guidelines for evaluation
 
Insiders Guide- Full Business Value of Storage Assets
Insiders Guide- Full Business Value of Storage AssetsInsiders Guide- Full Business Value of Storage Assets
Insiders Guide- Full Business Value of Storage Assets
 
The economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your businessThe economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your business
 
Managing Data Warehouse Growth in the New Era of Big Data
Managing Data Warehouse Growth in the New Era of Big DataManaging Data Warehouse Growth in the New Era of Big Data
Managing Data Warehouse Growth in the New Era of Big Data
 

Viewers also liked

20120827maru scaleout seminar
20120827maru scaleout seminar20120827maru scaleout seminar
20120827maru scaleout seminar
Maco Yoshioka
 
Grasphatch - Social Venture Captital
Grasphatch - Social Venture CaptitalGrasphatch - Social Venture Captital
Grasphatch - Social Venture Captital
grasphatch
 
Doe Meer met Minder
Doe Meer met MinderDoe Meer met Minder
Doe Meer met Minder
Netwerk Bewust Verbruiken
 
5 Tips for Great Social Media Research
5 Tips for Great Social Media Research5 Tips for Great Social Media Research
5 Tips for Great Social Media Research
Research Now
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
EMC
 
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
EMC
 
Animal ppt sarah burress
Animal ppt sarah burressAnimal ppt sarah burress
Animal ppt sarah burressSarah_Burress
 
Determinants of supply fri032814
Determinants of supply fri032814Determinants of supply fri032814
Determinants of supply fri032814Travis Klein
 
Mon trade how does our economy work
Mon trade how does our economy workMon trade how does our economy work
Mon trade how does our economy workTravis Klein
 
Jump start your application monitoring with APM
Jump start your application monitoring with APMJump start your application monitoring with APM
Jump start your application monitoring with APM
Microsoft TechNet - Belgium and Luxembourg
 
El correu electrònic imad
El correu electrònic imadEl correu electrònic imad
El correu electrònic imadmgonellgomez
 
Visibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized EnterpriseVisibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized Enterprise
EMC
 
Smartphone & Embedded Connectivity Vehicle Integration 2014 - Embedded System...
Smartphone & Embedded Connectivity Vehicle Integration 2014 - Embedded System...Smartphone & Embedded Connectivity Vehicle Integration 2014 - Embedded System...
Smartphone & Embedded Connectivity Vehicle Integration 2014 - Embedded System...
louisegosling
 
Ict policy for Networked Society - GCC Dec 2013
Ict policy for Networked Society - GCC Dec 2013Ict policy for Networked Society - GCC Dec 2013
Ict policy for Networked Society - GCC Dec 2013
Rene Summer
 
Econ questions from students
Econ questions from studentsEcon questions from students
Econ questions from studentsTravis Klein
 

Viewers also liked (20)

Wed mexico
Wed mexicoWed mexico
Wed mexico
 
20120827maru scaleout seminar
20120827maru scaleout seminar20120827maru scaleout seminar
20120827maru scaleout seminar
 
Grasphatch - Social Venture Captital
Grasphatch - Social Venture CaptitalGrasphatch - Social Venture Captital
Grasphatch - Social Venture Captital
 
Cost curves
Cost curvesCost curves
Cost curves
 
Doe Meer met Minder
Doe Meer met MinderDoe Meer met Minder
Doe Meer met Minder
 
Git glossary
Git glossaryGit glossary
Git glossary
 
5 Tips for Great Social Media Research
5 Tips for Great Social Media Research5 Tips for Great Social Media Research
5 Tips for Great Social Media Research
 
Tue law of demand
Tue law of demandTue law of demand
Tue law of demand
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
Achieving Flexible Scalability of Hadoop to Meet Enterprise Workload Requirem...
 
Animal ppt sarah burress
Animal ppt sarah burressAnimal ppt sarah burress
Animal ppt sarah burress
 
Determinants of supply fri032814
Determinants of supply fri032814Determinants of supply fri032814
Determinants of supply fri032814
 
Mon trade how does our economy work
Mon trade how does our economy workMon trade how does our economy work
Mon trade how does our economy work
 
Jump start your application monitoring with APM
Jump start your application monitoring with APMJump start your application monitoring with APM
Jump start your application monitoring with APM
 
El correu electrònic imad
El correu electrònic imadEl correu electrònic imad
El correu electrònic imad
 
Visibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized EnterpriseVisibility & Security for the Virtualized Enterprise
Visibility & Security for the Virtualized Enterprise
 
Smartphone & Embedded Connectivity Vehicle Integration 2014 - Embedded System...
Smartphone & Embedded Connectivity Vehicle Integration 2014 - Embedded System...Smartphone & Embedded Connectivity Vehicle Integration 2014 - Embedded System...
Smartphone & Embedded Connectivity Vehicle Integration 2014 - Embedded System...
 
Carmen y. benavides deber
Carmen y. benavides deberCarmen y. benavides deber
Carmen y. benavides deber
 
Ict policy for Networked Society - GCC Dec 2013
Ict policy for Networked Society - GCC Dec 2013Ict policy for Networked Society - GCC Dec 2013
Ict policy for Networked Society - GCC Dec 2013
 
Econ questions from students
Econ questions from studentsEcon questions from students
Econ questions from students
 

Similar to Seven Essential Strategies for Effective Archiving

Difference Between Data Archiving and Data Backup.pdf
Difference Between Data Archiving and Data Backup.pdfDifference Between Data Archiving and Data Backup.pdf
Difference Between Data Archiving and Data Backup.pdf
ACS Networks & Technologies
 
TDWI Checklist Report: Active Data Archiving
TDWI Checklist Report:  Active Data ArchivingTDWI Checklist Report:  Active Data Archiving
TDWI Checklist Report: Active Data ArchivingRainStor
 
Safeguarding Your Data: Best Practices for Secure Cloud Storage
Safeguarding Your Data: Best Practices for Secure Cloud StorageSafeguarding Your Data: Best Practices for Secure Cloud Storage
Safeguarding Your Data: Best Practices for Secure Cloud Storage
MaryJWilliams2
 
EMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed ReviewEMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed Review
EMC
 
Data Warehousing.pdf
Data Warehousing.pdfData Warehousing.pdf
Data Warehousing.pdf
Xlogia Tech
 
Case Studies in Improving Application Performance With Solix Database Archivi...
Case Studies in Improving Application Performance With Solix Database Archivi...Case Studies in Improving Application Performance With Solix Database Archivi...
Case Studies in Improving Application Performance With Solix Database Archivi...
LindaWatson19
 
In the Age of Unstructured Data, Enterprise-Class Unified Storage Gives IT a ...
In the Age of Unstructured Data, Enterprise-Class Unified Storage Gives IT a ...In the Age of Unstructured Data, Enterprise-Class Unified Storage Gives IT a ...
In the Age of Unstructured Data, Enterprise-Class Unified Storage Gives IT a ...
Hitachi Vantara
 
Research Data Management, Challenges and Tools - Per Öster
Research Data Management, Challenges and Tools - Per Öster Research Data Management, Challenges and Tools - Per Öster
Research Data Management, Challenges and Tools - Per Öster
LEARN Project
 
10 Reasons Why Your Healthcare Organization Should Select a Cloud-Based Archi...
10 Reasons Why Your Healthcare Organization Should Select a Cloud-Based Archi...10 Reasons Why Your Healthcare Organization Should Select a Cloud-Based Archi...
10 Reasons Why Your Healthcare Organization Should Select a Cloud-Based Archi...
Triyam Inc
 
Data warehouse
Data warehouseData warehouse
Data warehouse
RajThakuri
 
Data warehouse-dimensional-modeling-and-design
Data warehouse-dimensional-modeling-and-designData warehouse-dimensional-modeling-and-design
Data warehouse-dimensional-modeling-and-design
Sarita Kataria
 
Data Warehouse
Data WarehouseData Warehouse
Data Warehouse
VijayaLakshmi514
 
Scale-Out Architectures for Secondary Storage
Scale-Out Architectures for Secondary StorageScale-Out Architectures for Secondary Storage
Scale-Out Architectures for Secondary Storage
InteractiveNEC
 
Smarter Data Protection And Storage Management Solutions
Smarter Data Protection And Storage Management SolutionsSmarter Data Protection And Storage Management Solutions
Smarter Data Protection And Storage Management Solutions
aejaz7
 
Hitachi white-paper-storage-virtualization
Hitachi white-paper-storage-virtualizationHitachi white-paper-storage-virtualization
Hitachi white-paper-storage-virtualizationHitachi Vantara
 
Database Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention PeriodsDatabase Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention Periods
Craig Mullins
 
Benefits of Data Archiving in Data Warehouses
Benefits of Data Archiving in Data WarehousesBenefits of Data Archiving in Data Warehouses
Benefits of Data Archiving in Data Warehouses
Vineet
 
1.Types of Computer Information SystemsThere are four basic type.pdf
1.Types of Computer Information SystemsThere are four basic type.pdf1.Types of Computer Information SystemsThere are four basic type.pdf
1.Types of Computer Information SystemsThere are four basic type.pdf
arccreation001
 

Similar to Seven Essential Strategies for Effective Archiving (20)

Data Archiving white paper
Data Archiving white paperData Archiving white paper
Data Archiving white paper
 
Difference Between Data Archiving and Data Backup.pdf
Difference Between Data Archiving and Data Backup.pdfDifference Between Data Archiving and Data Backup.pdf
Difference Between Data Archiving and Data Backup.pdf
 
TDWI Checklist Report: Active Data Archiving
TDWI Checklist Report:  Active Data ArchivingTDWI Checklist Report:  Active Data Archiving
TDWI Checklist Report: Active Data Archiving
 
Safeguarding Your Data: Best Practices for Secure Cloud Storage
Safeguarding Your Data: Best Practices for Secure Cloud StorageSafeguarding Your Data: Best Practices for Secure Cloud Storage
Safeguarding Your Data: Best Practices for Secure Cloud Storage
 
EMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed ReviewEMC Data Domain Retention Lock Software: Detailed Review
EMC Data Domain Retention Lock Software: Detailed Review
 
Data Warehousing.pdf
Data Warehousing.pdfData Warehousing.pdf
Data Warehousing.pdf
 
Case Studies in Improving Application Performance With Solix Database Archivi...
Case Studies in Improving Application Performance With Solix Database Archivi...Case Studies in Improving Application Performance With Solix Database Archivi...
Case Studies in Improving Application Performance With Solix Database Archivi...
 
In the Age of Unstructured Data, Enterprise-Class Unified Storage Gives IT a ...
In the Age of Unstructured Data, Enterprise-Class Unified Storage Gives IT a ...In the Age of Unstructured Data, Enterprise-Class Unified Storage Gives IT a ...
In the Age of Unstructured Data, Enterprise-Class Unified Storage Gives IT a ...
 
Research Data Management, Challenges and Tools - Per Öster
Research Data Management, Challenges and Tools - Per Öster Research Data Management, Challenges and Tools - Per Öster
Research Data Management, Challenges and Tools - Per Öster
 
Abstract
AbstractAbstract
Abstract
 
10 Reasons Why Your Healthcare Organization Should Select a Cloud-Based Archi...
10 Reasons Why Your Healthcare Organization Should Select a Cloud-Based Archi...10 Reasons Why Your Healthcare Organization Should Select a Cloud-Based Archi...
10 Reasons Why Your Healthcare Organization Should Select a Cloud-Based Archi...
 
Data warehouse
Data warehouseData warehouse
Data warehouse
 
Data warehouse-dimensional-modeling-and-design
Data warehouse-dimensional-modeling-and-designData warehouse-dimensional-modeling-and-design
Data warehouse-dimensional-modeling-and-design
 
Data Warehouse
Data WarehouseData Warehouse
Data Warehouse
 
Scale-Out Architectures for Secondary Storage
Scale-Out Architectures for Secondary StorageScale-Out Architectures for Secondary Storage
Scale-Out Architectures for Secondary Storage
 
Smarter Data Protection And Storage Management Solutions
Smarter Data Protection And Storage Management SolutionsSmarter Data Protection And Storage Management Solutions
Smarter Data Protection And Storage Management Solutions
 
Hitachi white-paper-storage-virtualization
Hitachi white-paper-storage-virtualizationHitachi white-paper-storage-virtualization
Hitachi white-paper-storage-virtualization
 
Database Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention PeriodsDatabase Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention Periods
 
Benefits of Data Archiving in Data Warehouses
Benefits of Data Archiving in Data WarehousesBenefits of Data Archiving in Data Warehouses
Benefits of Data Archiving in Data Warehouses
 
1.Types of Computer Information SystemsThere are four basic type.pdf
1.Types of Computer Information SystemsThere are four basic type.pdf1.Types of Computer Information SystemsThere are four basic type.pdf
1.Types of Computer Information SystemsThere are four basic type.pdf
 

More from EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
EMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
EMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
EMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
EMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
EMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
EMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
EMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
EMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
EMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
EMC
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
EMC
 

More from EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Seven Essential Strategies for Effective Archiving

  • 1. White Paper Seven Essential Strategies for Effective Archiving Sponsored by: Abstract Archiving helps organizations effectively retain, manage, and leverage their information assets. It is also complimentary to backup and broader data protection activities. This paper outlines seven essential strategies for archiving that drive cost savings, risk reduction and IT transformation. Disclaimer Contoural provides information regarding business, compliance and litigation trends and issues for educational and planning purposes. However, legal information is not the same as legal advice – the application of law to an individual's or organization's specific circumstances. Contoural and its consultants do not provide legal advice. Organizations should consult with competent legal counsel for professional assurance that our information, and any interpretation of it, is appropriate to each organization’s particular situation. Copyright 2012 Contoural, Inc.
  • 2. Seven Essential Strategies for Effective Archiving Table of Contents Introduction ................................................................................................................3 The Importance of Archiving .......................................................................................3 To Improve Data Storage Efficiency ....................................................................................3 To Promote “Information Transformation” .........................................................................3 To Cope with eDiscovery and Regulatory Requirements ......................................................4 Seven Essential Strategies for Effective Archiving ........................................................4 Strategy 1: Clearly Define the Roles of Backup and Archiving...............................................4 Strategy 2: Adopt a Disk-Based Archive...............................................................................5 Strategy 3: Converge Backup and Archive Storage ...............................................................6 Strategy 4: Use Storage and Application Intelligence to Classify Information........................7 Strategy 5: Adopt Value-Based Retention Policies ...............................................................8 Strategy 6: Enable Enterprise-wide Defensible Deletion ......................................................8 Strategy 7: Plan for Today and the Future ...........................................................................9 Conclusion: Stay Ahead of the Curve with Archiving ....................................................9 About EMC................................................................................................................ 10 About Contoural, Inc. ................................................................................................ 11 Copyright © 2012 Contoural, Inc. 2
  • 3. Seven Essential Strategies for Effective Archiving Introduction IDC have recently estimated the size of the digital universe at 1.8 zettabytes (1.8 trillion gigabytes in 500 quadrillion files), a volume that is more than doubling every two years. In the face of such growth, managing information seems to be getting harder to accomplish. The difficulty is exacerbated by:  The need to retain larger volumes of data for longer periods of time to meet governance and compliance requirements.  The need to maintain accessibility to data for business intelligence and eDiscovery requirements.  Limited information technology (IT) budget dollars. Organizations and vendors have responded with technologies based on magnetic tape, specialized storage platforms, optical media, automated storage tiering and deduplication. Each of these can play a role in managing retention and controlling costs, but given today’s explosive growth of information, some are better than others. This paper outlines seven critical strategies for effective archiving that drive cost savings, reduce risk and enable ―information transformation.‖ The Importance of Archiving When customers are asked what ―archiving‖ means to them, the answers depend on the perspective of the respondent. To IT managers, archiving often means the placement of electronically stored information (ESI) on the most cost-effective media throughout the information’s lifecycle. Compliance officers want archives to contain ESI that can be indexed, located and controlled, is stored authentically, and has retention policies applied. And attorneys require historical data stores that can be quickly searched for information to support an immediate legal challenge. We believe there are three key drivers for archiving. To Improve Data Storage Efficiency Typically, organizations have implemented formal archiving processes Definition of an archive: ―…a specialized and technologies to improve IT cost repository…used to…preserve, protect, control. With archiving, capacity on control, maintain authenticity and expensive primary storage can be integrity, accommodate physical and reclaimed by moving infrequently- logical migration, and guarantee access accessed information to lower-cost tiers. to information and data objects over their Reducing the size of primary data stores required retention period.‖ can reduce backup and recovery times (Source: SNIA) and boost database and application performance. To Promote “Information Transformation” Archiving can help organizations use growing volumes of information in potentially new and unanticipated ways. For example, new product innovation can be fostered Copyright © 2012 Contoural, Inc. 3
  • 4. Seven Essential Strategies for Effective Archiving if engineers can access archived project materials such as designs, test results, and requirement documents. Customer service can be improved by providing ready access to historical customer records, email, and correspondence. Healthcare records can be used as reference material for new research. Archiving such information with secure data retention capabilities keeps it secure, accessible and ready to provide business value today and in the future. To Cope with eDiscovery and Regulatory Requirements Regulations force organizations to secure certain types of data and make them accessible. It’s important for companies to know where that information resides so that they can protect it, and to eliminate stale data so that it doesn’t get them in trouble. eDiscovery – the requirement that customers collect, preserve, review and produce information for legal proceedings and investigations – remains a big concern because of its urgency and expense, both of which can disrupt IT operations. Capabilities for efficient retention and searching of data stores – enabled by archiving – can substantially reduce risk and cut the cost of compliance and eDiscovery. Seven Essential Strategies for Effective Archiving Archiving helps organizations more effectively retain, manage, protect, and utilize their information assets. It should be considered as an essential element of an overall data protection and storage management strategy. Strategy 1: Clearly Define the Roles of Backup and Archiving Many organizations depend on backup tapes for long-term retention. For such organizations, they are considered to be an ―archive.‖ We believe that this is misguided. Backups are secondary copies of active production data. Since backups deal with constantly changing business information, they are generally short-term focused and often overwritten. This makes them a poor choice for retaining data for compliance reasons. Further, retrieval of fine-grained information (for example, a single email or SharePoint document) from backups can be time-consuming and expensive, especially if the tapes need to be brought back from off-site storage. Archive Backup Primary information Copy of information Used for compliance and efficiency: Used for recovery: – data retained in original form – improves availability, allowing – enables response to legal or applications to be restored to a regulatory action point in time – offloads information from production systems and storage Typically long-term: Typically short-term: – months, years or even decades – information held for days or weeks Copyright © 2012 Contoural, Inc. 4
  • 5. Seven Essential Strategies for Effective Archiving By contrast, archives focus on information retrieval, usually at the level of a file, e- mail or other individual piece of content. When a piece of information stops changing or is no longer frequently used and long-term retention must be applied, it is best to move it to a searchable archive, from where it can be retrieved in less time and at lower cost compared to backups. If magnetic tapes are still in widespread use, formal archiving procedures can be a ―bridge‖ technology to help eliminate or at least reduce their role. In fairness, the dynamics of tape usage for backup have changed in recent years. Leading IT departments have embarked on conscious tape elimination efforts that have yielded significant benefits. For example, Virtual Tape Libraries (VTLs) use disks to emulate industry standard tape libraries. VTLs can help IT departments reduce Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) significantly, consolidate storage and keep backup information readily accessible. But the sheer increase of information volume means that this approach fills the capacity of storage arrays in many organizations. Our advice is to move away from the paradigm of “backup as archive” for long-term retention. Backups – especially magnetic tapes, because of the cost of physical storage and the latency involved in retrieving information – are a poor choice for managing data to enable eDiscovery, to comply with regulatory requirements and to promote information transformation as we’ve defined it. Strategy 2: Adopt a Disk-Based Archive In addition to meeting governance and compliance requirements, organizations retain data for business intelligence and competitive advantage. A data set's present minimal or unknown value might become apparent in some future and unforeseen context; just consider what’s happening with ―big data‖ and predictive analytics. Both active and archived information can help data scientists – and rank-and-file employees – drive new innovations or help to improve current business processes. In this way, archiving can help organizations ―expect the unexpected‖. Furthermore, with a robust archiving system in place, employees will be less likely to engage in ―underground archiving‖, whereby documents are saved in private repositories, laptops or USB drives, all of which are outside of the control of the organization. To make sure that information is readily accessible, archived information needs to be available online. Organizations relying upon traditional tape-based archiving will be challenged to address business needs due to the inherent performance and accessibility characteristics of tape. It might also be tempting simply to devote high- capacity arrays of inexpensive drives (or ―just a bunch of disks,‖ also known as JBOD) to the archiving task. But ―cheap disk‖ is only inexpensive to buy. A far greater operational cost comes from the management of such resources – provisioning, backup/protection, replication, etc. A better approach is to deploy a disk-based solution to address the needs of archival workloads. Some of the characteristics of such a solution include, but are not limited to: Copyright © 2012 Contoural, Inc. 5
  • 6. Seven Essential Strategies for Effective Archiving  Employs deduplication to maximize storage efficiency.  Ensures data integrity, protection and security.  Guarantees that data can be restored, even after a lengthy time period, taking into account changing drive technology, software versions, etc.  Enables administrators to enforce multiple retention periods for different archive data sets stored on the same system. Customers and industry observers seem to agree that an online approach to archiving is gaining momentum: ―The growth of digital archive capacity stored on external disk systems will also exceed the overall market growth rate, increasing at a 62% CAGR between 2010 and 2015…rapid growth in the use of external disk- based storage systems for digital archiving means that the share of all archive capacity stored on external disk will increase from 29% in 2010 to 35% in 2015.‖ (Source: Enterprise Strategy Group, June 2010) Strategy 3: Converge Backup and Archive Storage Backup is driven by the need for recoverability and disaster protection while archiving is driven by the need for improved efficiency, information re-purposing and to address compliance and eDiscovery challenges. Real cost savings can be realized by adopting a strategy for the physical storage of both backup and archiving workloads. To accomplish this, a common storage target must be able to handle the throughput and inline deduplication requirements of backup workloads and secure and long-term retention requirements of archive workloads. In addition, the storage target should provide built-in capabilities for network-efficient replication for disaster recovery needs, enterprise features such as encryption, and allow for easy integration with existing application infrastructure. Primary Storage for PRODUCTION APPLICATIONS Backup and Recovery for Archiving for DATA PROTECTION AND COMPLIANCE AND RECOVERABILITY eDISCOVERY Common Storage for Both Workloads for EFFICIENCY Copyright © 2012 Contoural, Inc. 6
  • 7. Seven Essential Strategies for Effective Archiving Backup and archiving are necessary and complimentary IT procedures. By leveraging a common infrastructure for both, organizations can greatly ease the burden of eDiscovery, data recovery, business continuity, and compliance and achieve these goals in the most cost-efficient manner. Strategy 4: Use Storage and Application Intelligence to Classify Information Organizations must know much more about the information that they possess than they did just a few years ago. Of course, it is important to know how many petabytes are in place and where they reside, but to stay relevant and competitive; organizations must understand why they have them. Clearly, information has intrinsic value. Otherwise, it wouldn’t be captured and retained. But the value of most data sets is subjective; deciding how much effort and resources should be spent on keeping, expunging or archiving them can be a confusing and contentious issue. The good news is that determining the value of information can be made easier by taking a good inventory of what’s in place and classifying it effectively. As the volume of information grows, so does the amount of metadata – ―data about the data‖ – which makes value judgments about information stores possible. Metadata includes things like file and block size, date of last access, location and many other storage-related parameters that enable ―storage intelligence‖ about what exists, what resources it is consuming and whether it should be moved to lower-cost storage tiers. Core applications like Enterprise Resource Planning (ERP), Microsoft SharePoint, structured databases, social software (like Twitter and Google+) and document authoring tools generate rich and varied application-specific metadata like keywords, subject, versions, security attributes and linkage to other applications. Such metadata can be regarded as ―application intelligence‖ at the level of the data item or business object and not just at the file or block level. Classification – made possible by combining storage and application intelligence – helps organizations identify the importance and value of information. But classifying everything all at once can be a daunting task. We suggest that customers do the following:  Identify the data sets that carry the most potential for exposure to regulatory, legal or eDiscovery risk and the associated costs. Some common examples include email, SharePoint, and networked file shares. Make these the initial sources for ―intelligence-gathering.‖  Use automated tools for indexing, auto classification, text and content analytics, search and data mining to extract meaning and value from the data deluge. Classifying information is a crucial element of a sound archiving strategy that drives policies for long-term retention and defensible deletion. Copyright © 2012 Contoural, Inc. 7
  • 8. Seven Essential Strategies for Effective Archiving Strategy 5: Adopt Value-Based Retention Policies Typical decisions about the long-term retention of information are based on IT operational needs. Sure enough, holding on to content based on file system metadata – such as age or file size – makes it possible to capture and migrate content to lower-cost tiers of storage. But such a capacity-based approach makes no allowance for the importance or confidentiality of such information. Perhaps there’s no good reason to save it at all! A better approach is to supplement capacity-based retention rules with policies aligned with business value. For example, retention policies can be based on any or all of the following:  External regulations or legal mandates that define what kinds of information to save and for how long.  The requirement of departments (e.g., finance, manufacturing, sales) or business units to save different information for varying lengths of time.  Requirements to preserve certain historical information for operational continuity reasons. The notion of value-based retention dovetails nicely with the concepts of records series, file plans and legal holds that are essential to the discipline of ―records and information management‖ (RIM). To make life easier, we recommend that IT managers reach out to their RIM colleagues who have already dealt with issues about value-based retention policies. Strategy 6: Enable Enterprise-wide Defensible Deletion While some organizations get in trouble for not saving documents for the required retention period, most face the opposite problem: their de facto policy is to save nearly all information forever. A defensible deletion policy ensures that organizations do not delete documents they need to retain or preserve. It provides some level of protection against litigants and regulators who, in the future, may ask uncomfortable questions about why specific documents have been deleted. Finally, it affords justification for the removal of unneeded information that would otherwise drive up storage costs and increases the risks and costs of eDiscovery. To achieve defensible deletion, we recommend that customers:  Put effort into determining what needs really needs to be saved. A good archiving system based on the value of information to be retained can greatly aid this process.  Make sure that policies include both the business justification and process for deleting documents.  Create a clear and consistent legal hold process that clearly identifies information being held, allowing for routine deletion of data not under hold. Copyright © 2012 Contoural, Inc. 8
  • 9. Seven Essential Strategies for Effective Archiving Strategy 7: Plan for Today and the Future So far, we’ve only alluded to this important and sometimes overlooked aspect to the archiving program: gaining early organizational agreement and maintaining it over time. Decisions about long-term retention, defensible deletion and information accessibility are important beyond the IT department. They should be made up-front and with the agreement of major stakeholders. We advise regular consultation with groups such as the legal and records management teams as well as executives and end-users. Incorporate archiving into the shared service plans for storage management, regardless of the topology of the computing and storage network. Make sure that policies and service-level agreements meet business needs and are realistic. Carefully consider the direction and ―velocity‖ of technological changes. For example, cloud storage today is mature and reliable; plans for backup and archival should consider platforms that can support public and private cloud environments. ―Big data‖ means high volumes of very large (e.g., surveillance video) and very small (e.g., Telco call detail records) file sizes, forcing organizations to determine the value of information to be retained. And expectations of end users means that access to active and archived information needs to be available to smartphones, tablets, laptops and desktop systems. Make sure that what is put in place works today and can accommodate the future. Conclusion: Stay Ahead of the Curve with Archiving Managing information seems to be getting harder to accomplish, but it doesn’t have to be that way. An effective archiving strategy will help organizations retain, manage, protect, and utilize their information assets effectively by:  Centralizing views of retained information in a digital, online archive so that it is searchable and readily accessible by end-users, either in routine operations or in totally unexpected ways.  Taking advantage of advances in object-based storage, deduplication and tiered storage topologies to direct both backup and archived information workloads to a common storage target.  Leveraging storage and application intelligence to measure the value of information at the level of the data item or business object.  Simplifying retention and defensible deletion policies based on information value, rather than driving toward a costly ―save everything forever‖ approach.  Staying close to the needs of the business and trends in technology. Challenged by growth in volume and variety of information, archiving has become an essential IT activity. With a well-designed archiving strategy in place, organizations need not be victims to rising costs, compliance challenges and legal risk. Copyright © 2012 Contoural, Inc. 9
  • 10. Seven Essential Strategies for Effective Archiving About EMC EMC Corporation is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyze their most valuable asset — information — in a more agile, trusted and cost-efficient way. Additional information about EMC can be found at www.EMC.com. Copyright © 2012 Contoural, Inc. 10
  • 11. Seven Essential Strategies for Effective Archiving About Contoural, Inc. Contoural is the largest independent provider of Information Governance Consulting Services with expertise in Records & Information Management, Litigation Readiness and Sensitive Information Control. Having worked with more than 20% of the Fortune 500, as well as a number of Federal agencies, they enable companies to become proactive and defensible in controlling, managing and deleting their business information to reduce risk, increase compliance and lower costs. Contoural is independent and provides proactive consulting services; they do not sell any products, provide ―reactive‖ discovery services, or warehouse any information, and as such our clients truly view us as trusted advisors. With an average of 14 years industry experience, Contoural's team is comprised of attorneys, former compliance officers and records managers who have a deep understanding of the legal, compliance and business requirements for retaining and managing information -- as well as seasoned IT professionals with expertise in document archiving, search, litigation management systems, data classification and data storage, all focused on effective program execution. Contoural services include:  RIM and Litigation Readiness Assessment and Roadmap Development Services  Records and Information Management Policy Development Services  Data Classification Services  Litigation Readiness Services  Solution Design, Technology Evaluation and Vendor Selection Services  Solution Implementation Services  Change Management and Education Services  Ongoing Program Management Services With these services, Contoural helps enterprises ensure compliance and reduce risk, while also achieving litigation readiness and reducing costs. Contoural, Inc. 5150 El Camino Real, Ste D30 Los Altos, CA 94022 650-390-0800 www.Contoural.com info@contoural.com Copyright © 2012 Contoural, Inc. 11