Items Tagged: Privacy
Brains for Storage: Information Classification and Management (ICM) - Technology Brief
Information Classification and Management is both a new product category and another step in the evolution of the storage discipline. Controlling content based on its own attributes and associated metadata constitutes a transition from a world of opaque data management towards transparent information management.
StoredIQ: Intelligent Classification - Product Profile
Taneja Group has tracked the emergence of the Information Classification and Management (ICM) space over the past 24 months. During that time, StoredIQ has continually demonstrated first mover product and thought leadership in this category. With its focus on a broad range of classification functionality for compliance, information security and IT issues, we believe that StoredIQ represents one of the best examples of what is possible with ICM technologies.
Kazeon’s eDiscovery Solution Dramatically Reduces Costs and Improves Access to Information-Sol. Prof
Without question, enterprises today struggle with a range of electronic discovery challenges. Recent studies expect Electronically Stored Information (ESI) to grow from 161 Exabyte’s in 2006 to 988 Exabyte’s in 2010, representing a compounded annual growth rate (CAGR) of 57%. The average organization now has hundreds of Terabytes of ESI stored online and many organizations are now passing the 1 Petabyte mark. Much of this ESI is in the form of emails, word processing documents, spreadsheets, presentations and other business-critical, unstructured formats. Not only is the volume of ESI increasing, litigation is also increasing, and 2006 revisions to the Federal Rules for Civil Procedure (FRCP) are obligating organizations to both better understand and present their data earlier in the litigation process. Sanctions associated with these changes are escalating the costs for non-performance, while every lost moment also equates to a disadvantage in litigation preparation.
Securing IoT data should become a priority as more companies manipulate the volumes produced by these devices. Seemingly innocuous information could allow privacy invasions.