CONQUERING THE CHALLENGE OF SEARCHING CORPORATE DATA

Size: px
Start display at page:

Download "CONQUERING THE CHALLENGE OF SEARCHING CORPORATE DATA"

Transcription

1 NUIX INFORMATION PAPER EV CONQUERING THE CHALLENGE OF SEARCHING CORPORATE DATA Authors: Stephen Stewart, Angela Bunting and Eddie Sheehy How Nuix s advanced ediscovery platform normalizes complex semi-structured and unstructured data sets to make them searchable for litigation, information management and information governance purposes.

2 INSIGHT PAPER: CONQUERING THE CHALLENGE OF SEARCHING CORPORATE DATA INTRODUCTION No-one likes to make critical decisions without knowing the facts. However, this is exactly what happens as an unintended consequence of the many ways organizations create, share and store their data. Organizations keep information in a wide variety of systems, each with its own file formats, retention policy and backup strategy. This mishmash of systems, combined with the proliferation of data, makes it a constant challenge to manage information throughout its lifecycle. It can also be difficult for organizations to answer seemingly simple questions such as:» How did client X receive client Y s intellectual property?» When did the product research department suspect that product Q was dangerous?» Can we delete all copies of this document stored in our system?» Where are all the relevant s and documents related to this contract?» How can we search 150 terabytes of random data? This paper will examine the difficulties organizations face when attempting to index and search a range of commonly used but problematic corporate data sets (see Structure is only part of the problem on page 3). These difficult data sets include:» Corporate archives» Encrypted or deleted items» Forensic collections» Lotus Notes and databases» Internet and instant messaging» Microsoft Exchange » Other Microsoft container formats» Microsoft SharePoint» Backup tapes containing any of the preceding data sets. These formats present multiple challenges for indexing and searching challenges that have real-world business implications. For organizations undergoing litigation, the race to find the relevant facts can shape an entire case strategy. An incomplete and inefficient ediscovery process can be costly, time-consuming and potentially destructive to a firm s reputation and value. It can put an organization at a tactical disadvantage, particularly if its opposition can turn up with full and detailed knowledge of the same evidence. Organizations have been known to accept outof-court settlements or fines because it would cost less than finding and producing relevant information that could prove their case. For information managers, auditors, investigators and security professionals, the initial challenge is to understand what information an organization possesses and where it resides. This situation is made worse because most organizations lack the capability to index and search systematically across their pools of unstructured and semi-structured data. The tools organizations commonly use to unlock information such as enterprise search, knowledge management and taxonomies generally cannot meet the requirements of regulatory actions, litigation or internal investigations. These tools are designed to provide rapid but shallow results, and are not completely thorough, accurate or consistent. In addition, they do not typically provide the results in formats or reports that are suitable for the purposes of ediscovery and information management. For example, the search engine Google can return results in seconds across a huge corpus of data: over one trillion web pages. However, it is designed to find the most frequently referenced data. For the purposes of investigations and litigation, the most relevant data can be sparse, single s that are often intentionally written to be obscure. This paper explains how Nuix s software and approach to ediscovery and information governance eliminates or alleviates many of these difficulties by indexing, normalizing and making searchable all of an organization s semi-structured and unstructured data, no matter how large or how complex the data sets. For ediscovery, this means acting from a position of strength, shortening the lifespan of investigations and empowering your legal teams to devise a winning case strategy early, based on knowledge rather than opinion or conjecture. For information managers, it means the ability to make strategic decisions about data by having a complete and thorough understanding of all data, important or otherwise, in their possession. Most organizations lack the capability to index and search systematically across their pools of unstructured and semi-structured data PAGE

3 THE DIFFICULTIES OF DATA If an IT administrator were asked to collect all available data an organization held about a particular person, what sources would he or she check? Most likely the administrator would make copies of user mailboxes on the organization s current system, and any documents from that user s home drive on corporate file shares and the SharePoint document management system. He or she might also copy files on that person s laptop or desktop computer; if that employee had already left the organization, this would likely be impossible. However, this search would only cover a fraction of the available data relating to this person. In a report published in 011, the McKinsey Global Institute estimated that by 009, companies in the United States with more than 1,000 employees stored an average of 00 terabytes of data or up to 00 gigabytes per user. A thorough search that captured all this data might also include files or s in an archive or a legacy system that the organization no longer used. The person may also have stored s on his or her computer hard drive, or used an online service such as Gmail or Hotmail. If the organization uses or used to use Lotus Notes, there could be information stored in Notes databases and personal folders as well as messages. Finally, if the person was trying to hide something, they may have deleted important information or attempted to obscure it in other ways. Searching through all this data is likely to include at least one retired system the administrator isn t familiar with accessing. For some legacy systems, it might even require setting up a server just to be able to read the data. Many older formats are difficult to decipher and require skills beyond those of the average IT administrator. This is especially the case if the documents are required for legal reasons, because they must be collected without altering critical metadata such as the time a file was last accessed or a message sent. It would also be a time-consuming exercise. Since these data sources must be opened in separate proprietary applications, the administrator would have to search through each data type individually. The more systems involved, the more difficult a search would become and the longer it would take. As you can imagine, this situation is not hypothetical. Organizations often need to gather all available information about a particular person or event for use as evidence in a court case, regulatory action, audit or investigation. Just as importantly, many businesses and government agencies also want to manage and draw insights from their data, including the unstructured data in s and documents. This is not possible until the data is normalized through an indexing process that enables organizations to search consistently across all data containers and file types. STRUCTURE IS ONLY PART OF THE PROBLEM Organizations store data in structured formats such as databases; unstructured formats such as documents; and semi-structured formats such as , where some information is held in database fields and some in plain text and attachments. A thorough search must encompass all these data types. Structured formats such as databases and enterprise applications present the least difficulty their main purpose is to allow organizations to search, sort and manipulate the data they contain. Unstructured data stored in document management systems is also easy to search, because these systems are designed to be searchable and to retain metadata. And file shares present no great challenge for searching because they require no special software to read. The most challenging data sets are those that use closed, proprietary formats. To search these formats, many organizations use the original vendor s built-in tools or data interfaces, or a labor-intensive process to convert files to a more readable format. However, neither of these techniques fully preserves information such as look and feel, metadata or custody chain, which can be essential for legal or information governance purposes. Organizations often need to gather all available information about a particular person or event for use as evidence in a court case, regulatory action, audit or investigation PAGE 3

4 INSIGHT PAPER: CONQUERING THE CHALLENGE OF SEARCHING CORPORATE DATA NORMALIZING DATA Data held in corporate servers, databases, systems and file servers is stored in a variety of proprietary formats. The simplest way to think about this is to consider that Adobe Photoshop cannot open Microsoft Word documents and Word can t open Photoshop files. Similarly, Lotus Notes cannot easily access information stored in a Microsoft Exchange Server database and vice versa. To search through these systems, organizations must break down the data containers to smaller components and organize them with an indexing tool. This indexing tool must be able to process the major data containers organizations use regularly and scale to manage large quantities of data. Normalizing data requires an application that can interrogate each file format and proprietary system, and index all this data into a single location. Once data has been normalized, it can be searched faster, more accurately, more thoroughly and more reliably, and used to make informed decisions. rfevm_xz@eioe.com.au Xdkqmwh@Jeuxutko@smj.pnwt.com cnl-mzqy_vswmywaralt@cjj.com.au Fdjate.Zve@ufr.com.au Uwhilgr_Ihs@NrqnhznikeGqhloq.com.au Ukzza.Iuarfojoum@hio.com.au oivi@dxostel.com.au victorh@nuix.com.au AzmvY1@rhy.dbn.au jcakofq@eioe.com.au WLp@lekd.com.au sachin@nuix.com.au Fpojwum.Ly@touswkwej.com.au zidk.szctd@db.com Rajesh.Brown@bank.com.au Sindu.O Reilly@bank.com.au vik@nuix.com.au minh@nuix.com.au Figure 1: Nuix Network Map showing the distribution of relevant s and documents BUSINESS CHALLENGES Without the ability to holistically analyze, search and compare information from many difficult data sources, organizations face a number of business challenges. For ediscovery In-house teams or organizations such as consulting, litigation support and legal firms that offer ediscovery services need a complete, defensible, thorough and repeatable forensic discovery process that stands up to ever-increasing legal scrutiny. The ediscovery process has as much to do with tactics as it does equity or the law. The side with the most efficient and effective discovery process can often win a dispute based on its ability to investigate all the data in its possession and present evidence the other party cannot. If investigators cannot interrogate multiple systems for example a Microsoft Exchange database and a Symantec Enterprise Vault Archive at the same time, they will have to manually and individually break them down to their component pieces, such as messages and documents, which adds greatly to the time, labor and costs involved. It also limits their ability to compare information between the different data sets. For information management and governance Organizations conducting business intelligence, data deduplication or information governance exercises must deal with growing volumes of data and an increasing number of formats. Tools such as corporate archives and business intelligence applications do not allow information management specialists to search thoroughly or apply rules consistently across multiple unstructured data sets. As a consequence, organizations lack confidence that their information management and governance processes are addressing all the data in their possession, or that they are addressing it all with a consistent level of precision. This is particularly important in the case of archiving or deleting data, where organizations need to have a defensible process for deciding what data to keep and what to remove. In addition, if organizations choose to delete data, it is important to ensure they remove all copies of that information and have sufficient audit reporting to demonstrate how they determined what data to delete. Once data has been normalized, it can be searched faster, more accurately, more thoroughly and more reliably, and used to make informed decisions PAGE 4

5 DATA SET CHALLENGES AND SOLUTIONS Many of the formats organizations regularly use for storing data are difficult to index and search for a variety of technical reasons. In many cases, organizations have developed workarounds for their inability to index these formats, but these are often deficient. Direct (To) Indirect (Cc) Hidden (Bcc) Paul Smith <okxkkojm@frisco.com> Victor Vdoqup <victorh@nuix.com.au> 13/01/ /01/ /01/ /01/ For each of the following formats, this paper will discuss technical difficulties and alternative approaches, and examine how Nuix advanced ediscovery technology can address these problems. skhoo@cac.com.au Law, Mary [IT] <Mary.Law@bank.com> imh@substitution-z.com Corporate archives Corporate archives first emerged in the late 1990s as a way for organizations to manage their storage and regulatory compliance needs. Many organizations were required by law to retain data for long periods, but storage hardware was expensive. As these requirements mounted, organizations increased the scope of their archived data. Their goal was to have a single, easily searchable repository for all corporate information. However, most organizations archiving initiatives have failed to deliver this intended business value. By design, archives are intended to store tremendous volumes of information for many years. Because disk drives were once expensive, archiving vendors decided it was best to minimize the size and scope of their indexes. These early design decisions have become a major hindrance to using archives as ediscovery tools. Archives don t index all the necessary information, including a large proportion of the metadata and some data that may be necessary for a defensible legal search. In addition, archives reliance on a large number of small indexes translates to poor search performance. Nuix s advanced ediscovery technology directly indexes all data stored in popular archive formats such as Symantec Enterprise Vault and EMC Xtender. This allows Nuix users to search all data in an archive rather than relying on these products incomplete internal indexes. In fact, a Nuix index will be between 0 and 5 per cent the size of the original data set. Nuix tools collect all available information, including text from all files, s and attachments; all metadata; and information the original manufacturers never expected anyone to look at. Nuix s processing engine is fast and thorough. It can index terabytes of archive content per day from a single server. Hfqdh_Dy@smj.pnmt.com iksjj.nonptbklsj@cddweou.com Hudg Hdzep <zidk.szctd@db.com> Fpojwum.Ly@vouswkwej.com.au akas@jyandmnis.com Uwhilgr_Ihs@NrsnhznikeGbflop.com.au cnl-mzqy_vsmywaralt@cjj.com.au Xdmwh_Jeutcgko@smj.pnwt.com.au Figure : Nuix Event Map showing the distribution of a high-value document within and outside an organization. NUIX AND CORPORATE ARCHIVES» A global financial services group had eight terabytes of Microsoft Exchange databases in a Symantec Enterprise Vault archive. Symantec Enterprise Vault Discovery Accelerator could not interrogate this archive to the level of detail required for an ediscovery exercise. The company used Nuix software, which processed the archives directly and provided real-time ediscovery services. The Nuix application now runs weekly updates to index any new data added to the archive.» The regional branch of an international banking group needed to conduct an in-house review of executive communications, including archived content. The Nuix ediscovery solution was delivered and installed and the team of investigators trained to use it within 4 hours. At the end of the project, the organization retained a Nuix server for ongoing use. Nuix s advanced ediscovery technology directly indexes all data stored in popular archive formats such as Symantec Enterprise Vault and EMC Xtender PAGE 5

6 INSIGHT PAPER: CONQUERING THE CHALLENGE OF SEARCHING CORPORATE DATA Figure 3: Nuix decrypting a Lotus Notes.nsf file during processing. Lotus Notes and databases For many years, Lotus Notes was a market leader with organizations that needed secure internal communications and collaboration spaces. These attributes explain why Notes is still entrenched in a large number of pharmaceutical and financial services firms. The capabilities that made Lotus Notes so appealing its ability to be customized, to replicate from one server to another and to set multiple security levels also cause the greatest headaches for electronic investigations. For example, if users have set privileges on individual messages, these messages can sometimes still be retrieved even if a user believes he or she deleted them. Most ediscovery tools simply cannot extract Lotus Notes content and metadata in full fidelity. Often they do not index Lotus Notes databases, calendars and journal notes, which may contain important evidence. Many of these tools convert Lotus Notes databases to PST files, the personal store format used by the Microsoft Outlook client. This process destroys the original format by altering key metadata and the nature of the messages themselves. Lotus Notes databases are typically encrypted and most investigative tools individually decrypt each user mailbox. This approach is slow and inefficient, adding time to an investigation. If an organization has archived Lotus Notes data, either in a Notes Journal or a third-party archive, this adds another level of challenge, cost and delay for investigators. Nuix stands alone in its ability to provide full access and fidelity to all Lotus Notes content and metadata. This is because Nuix software uses IBM s recommended best practice for addressing Lotus Notes content in its native format: Domino extensible Language (DXL). This methodology gives Nuix indexing software full access to the contents of calendars, databases, discussion databases, document libraries, s, TeamRoom databases and all Notes system databases. Nuix also recognizes and itemizes all standard and user-created Notes folders so investigators can see exactly where a user filed an item. On a high-end server, Nuix can process up to one million Lotus Notes items per hour. On a high-end server, Nuix can process up to one million Lotus Notes items per hour PAGE 6

7 NUIX AND LOTUS NOTES A global financial services organization needed to investigate the Lotus Notes data of more than 50 custodians while ensuring all data remained behind its firewall. It engaged an advisory firm, which implemented a Nuix plug-and-play appliance. The Nuix appliance processed data from current and archived database formats at speeds of more than one terabyte per day. The Nuix tool allowed the investigators to review all available data while preparing for litigation. During the case, as witnesses were deposed, investigators could use the Nuix server to drill down into the most specific and pertinent information. Internet Investigators often find critical evidence in online services such as Gmail, Hotmail or Yahoo! Mail. This can happen when, for example, an employee uses a webmail service to leak confidential information. Being able to extract information from online mail services, provided the organization can access the user s login credentials, can be vital to ediscovery and information governance exercises. However, these services by their nature store information on servers located around the world and outside the control or access of organizations performing investigations. Nuix ediscovery solutions use typical internet protocols such as POP and IMAP to connect to remote servers and download a copy of the entire mailbox, which can then be indexed and searched like any other . A global cosmetics manufacturer engaged a Big Four consulting firm to provide forensic services for a US Foreign Corrupt Practices Act investigation spanning 11 countries. The consultant turned to Nuix because its existing tools couldn t handle the multiple terabytes of Lotus Notes data in various Asian languages. The Big Four firm now uses the Nuix platform as standard in its North American processing services. Figure 4: Nuix collecting internet-based . Most ediscovery tools simply cannot extract Lotus Notes content and metadata in full fidelity PAGE 7

8 INSIGHT PAPER: CONQUERING THE CHALLENGE OF SEARCHING CORPORATE DATA Encrypted or deleted items Deleted items can be the best evidence of wrongdoing. Investigators know the information someone has tried to hide is often the most relevant evidence. In addition to deleting data, people who have something to hide can use a variety of other techniques to obfuscate the truth. For example, they may change the file extensions so they appear to be another document type; some indexing tools skip a file where the content doesn t appear to match the extension. They may also attempt to obscure the location of items by embedding them many layers deep in attached files or compressed folders. Information hidden in these ways can be difficult to access using many common ediscovery and forensic investigation tools, especially those that rely on application programming interfaces (APIs) to retrieve data. Permanently deleted or encrypted s are usually impossible to retrieve using APIs. Figure 5: Nuix allows you to look inside forensic collection formats and choose which elements are required for processing. NUIX AND FORENSIC COLLECTIONS When organizations suspect criminal intent, a quick response is essential. Facing the prospect of criminal activity, organizations often create forensic images of large numbers of systems. However, the tools that create these collections were designed to perform deep analysis of single images, not to rapidly process large of numbers of images in parallel. Adding Nuix technology delivers the ultimate forensic triage. Nuix can index all active files across hundreds of images. After the initial indexing run, investigators can search the entire collection. If they smell smoke, they can use forensic tools to deeply analyze the most relevant images. Nuix technology takes a forensic approach. It can extract deleted messages from Microsoft Exchange databases and offline file storage formats, and index deleted files in a forensic image of a user s hard drive. It examines files at a binary level, rather than guessing at their content from the extension. Nuix can also extract and index information from embedded files more than 100 levels deep. These capabilities enable Nuix users to find s and documents that are hidden, encrypted, deleted or stored in other ways to conceal their identity. Forensic collections Forensic collection technologies generally create an image of every 0 and 1 on any given hard drive. This provides a complete picture of the data, but no meaningful information about the complex containers it may contain, such as servers, SharePoint databases and deleted files. Common forensic collection tools include Guidance s EnCase, Access Data s Forensic Toolkit, and a variety of hardware and software tools that acquire direct disk images. While these tools are very good at their intended purpose capturing a point-in-time image of data without modifying important metadata such as the date a file was accessed their indexing capabilities are limited and don t scale well to large data sets. With Nuix advanced ediscovery software, investigators can view the contents of a forensic collection and select which parts need to be indexed. If the entire collection needs indexing, Nuix can process terabytes per day using a single server. These capabilities enable Nuix users to find s and documents that are hidden, encrypted, deleted or stored in other ways to conceal their identity PAGE 8

9 Microsoft Exchange Microsoft Exchange has emerged as the world s dominant platform. Exchange presents significant challenges for investigators and IT administrators alike because its storage format was never designed to scale to the requirements of large organizations. Its original designers also gave little consideration to the potential need for effective ediscovery, although Microsoft has made improvements in recent years. Microsoft s proprietary file format makes it difficult for ediscovery software to process Exchange databases. As a result, many investigators use a range of laborintensive workarounds. For example, legal teams may ask IT administrators to extract the individual mailboxes of identified custodians into PST files. However, this approach only works well if the database is current and the discovery is confined to a small number of known people. The situation is much more complex when dealing with data from older versions of Microsoft Exchange. To extract information from these databases, IT teams must first recreate the original Microsoft Exchange environment. This process takes specialist expertise, time and money, and needs to be repeated each time investigators want to extract additional information. Nuix advanced ediscovery software can directly process current and legacy Microsoft Exchange databases including all s, attachments, metadata and images at rates of multiple terabytes per day. In the preprocessing stage, investigators can view the structure of an Exchange database and choose which mailboxes to extract and index. Nuix then extracts all relevant text, metadata and images, including permanently deleted or encrypted information. Nuix can extract and index information from embedded files more than 100 levels deep. Though it seems unlikely, important information could be held within an image, in a document embedded in a spreadsheet, attached to an message stored in a PST file, which was compressed and ed to someone else. Investigators can search on all communication fields from, to, carbon copy and blind carbon copy to examine the chain of custody. Nuix software can also identify identical documents in multiple users mailboxes and trace who sent what to whom either within the organization or to external recipients. Figure 6: Nuix can process an entire Microsoft Exchange database or just the mailboxes of custodians of interest. NUIX AND MICROSOFT EXCHANGE A regulator needed to conduct onsite investigations focused around . In some cases, multiple investigators needed to access the same case data simultaneously. It used a Nuix ediscovery solution to quickly process relevant Microsoft Exchange databases, disk images and other unstructured data. A leading advisory group was conducting an onsite fraud investigation for a large global organization, which needed to be completed as quickly as possible. Using Nuix, it directly indexed and searched across the organization s Microsoft Exchange system. It then extracted mailboxes for the relevant custodians and used Nuix to index and analyze forensic images of employees hard drives, which turned out to contain important evidence. A leading advisory group was working for a corporate client in Asia on a regulatory investigation that needed to search two terabytes of Microsoft Exchange databases and archives. The project team used Nuix software on high-specification laptop computers to collect, process, investigate and review data onsite. Nuix extracts all relevant text, metadata and images, including permanently deleted or encrypted information PAGE 9

10 INSIGHT PAPER: CONQUERING THE CHALLENGE OF SEARCHING CORPORATE DATA Microsoft SharePoint Microsoft SharePoint is a powerful framework for collaboration and document management, but can be a nightmare for investigators. While it is relatively simple to extract documents stored in a SharePoint database, some investigations can hinge on being able to demonstrate what a particular person could see on a particular day. Many ediscovery applications require software (an agent) to be installed on the SharePoint server to extract information from the database. IT managers are unlikely to be pleased about installing unknown software on their critical systems, because it may present a security risk or an unacceptable drain on server resources and performance. Requiring an agent makes it impossible to retrieve data from a hosted SharePoint service, because the third-party provider would be at least as wary of installing unknown software on their systems. Some ediscovery applications work with a backup of the SharePoint database. However, this approach does not capture the look and feel of the SharePoint site. It only extracts the raw data and does not enable investigators to present the content as it would have appeared in a user s web browser. In addition, most ediscovery tools only focus on documents and ignore dynamic content such as wikis, blogs, meetings, notifications, links and lists. Other tools are capable of indexing this content but do a bad job of representing it as the user would see it. Nuix advanced ediscovery applications can collect and index SharePoint databases without installing an agent on the server. Nuix s technology can also extract data from SharePoint Online data stored in the cloud. Nuix tools render SharePoint pages with 100 per cent fidelity, in context, producing an exact HTML representation of the page as the user would see it. It also extracts all metadata associated with a given page from the SharePoint database. In other words, Nuix allows investigators to see exactly what a specific custodian could access on a particular day. Figure 7: Nuix is able to collect all SharePoint information. Other Microsoft container formats When conducting investigations, many organizations simply examine the data stored in a central server. However, for organizations where staff members use Microsoft Outlook or Outlook Express to access their , important data can also be stored on users local hard disks. Microsoft Outlook stores data in PST (personal store) and OST (offline store) files; Microsoft Outlook Express stores data in DBX files. For example, it is not uncommon for users to copy or archive older messages to a PST folder on their local hard drive if their main mailbox runs out of space. Some ediscovery applications cannot open OST or DBX files. Others use the Microsoft Messaging Application Programming Interface (MAPI), which can extract text, attachments and a limited set of metadata. MAPI does not return permanently deleted data, which is often critical to an investigation. In addition, MAPI was designed to provide a single connection between a file and a mail server. By default, this limits the performance of extracting data using MAPI. Nuix software extracts all text, metadata and images from Microsoft container formats, including permanently deleted and encrypted information. Nuix extracts this information directly from the binary streams of the container files, rather than using MAPI, which means they can index any content much faster. Nuix tools render SharePoint pages with 100 per cent fidelity, in context, producing an exact HTML representation of the page as the user would see it PAGE 10

11 Backup tapes Information stored in backup tapes creates an ediscovery minefield. Because magnetic tapes deteriorate with age, courts and regulators now give organizations some wiggle room to declare backup tapes inaccessible. Nonetheless, an opposing party could build a compelling case to be allowed to sample these tapes, in case they still contained some readable data. The fear of this possibility has led many organizations to proactively search and analyze their tape repositories. To do so, they must first restore the tapes, then use whatever tools they have available to determine the contents of these tapes. For data in an older format, they may have to rebuild a server capable of reading it. Nuix s ability to index file formats including older Microsoft Exchange and Lotus Notes databases makes it well suited to indexing restored tapes for the purposes of searching or deduplication. This ability eliminates the need to preprocess restored files or rebuild old servers. With Nuix, an organization can simply restore old files or databases to disk, then point the indexing software at the files and allow it to completely index the content. With this index, an organization can search, analyze and deduplicate data. This can be a final step towards disposing of tapes and eliminating the associated liabilities. BUSINESS BENEFITS The ability to directly index difficult data types shortens litigation and investigative lifecycles saving time and costs and potentially avoiding corporate embarrassment. From an information management point of view, it allows mangers to interact with all the data in their care. These capabilities can help organizations improve operational efficiencies and eliminate risks. For ediscovery For organizations engaged in ediscovery exercises, Nuix s advanced capabilities can help them access the facts of the case as soon as possible. By indexing all available data in its original containers, investigators can search efficiently and interactively for key documents within hours or days of collection. This early case assessment in turn empowers legal teams to set a smart strategy based on facts rather than opinions or guesswork. Being able to review all available data and metadata enables investigators to find evidence quickly, Shortening the timeframe of investigations. The ability to process and interrogate all data types from a single tool simplifies workflows. Faster investigations and simplified workflows translate to lower costs for ediscovery teams and their clients. ediscovery teams can use Nuix to export data to any of the most commonly used litigation formats. Nuix tools also enable them to export a sub-case of only the relevant data. They can pass on a Nuix sub-case to investigators, law firms, advisory firms and regulatory authorities, many of which use Nuix as their preferred tool. For information management and governance Organizations gain the ability to make strategic decisions by having a complete and thorough understanding of all important data in their possession. With this understanding, they can:» Extract patterns and insights from semi-structured and unstructured data, such as identifying fraud by searching for trigger words in staff s» Remove redundant data, such as multiple copies of the same stored across numerous daily backups» Delete spam, irrelevant content or valueless items from data stores; in this case Nuix provides a defensible and repeatable process for deleting unneeded data» Ensure information remains where it is supposed to be, for example by testing if employees are storing confidential documents in lesssecure locations, or ing them outside the organization» Conduct company-wide sentiment analysis, alerting managers early to potential problem areas or individuals in the organization» Automatically search for words or phrases that indicate unprofessional behavior or conduct that does not comply with company policies. Nuix also offers storage and processor-efficient indexing that won t disrupt business as usual. These capabilities can help organizations improve operational efficiencies and eliminate risks PAGE 11

12 NUIX INFORMATION PAPER HOW THOROUGH IS NUIX? Nuix s advanced ediscovery and information governance platform:» Interrogates all metadata, text and binary data to forensically identify all relevant information» Keeps intact the chain of custody of each document or message indexed» Stores and analyzes images, extracting text from files such as faxes and Adobe Acrobat PDF documents that contain scanned text» Breaks open the internal structure of file formats, allowing investigators to choose which files, mailboxes or databases they want to look at» Can dig up to more than 100 levels deep into embedded, attached and compressed files. Further reading: The Truth About Indexing: Why fast, powerful and forensically sound indexing is the only way organizations can fully and efficiently manage and search their electronic communications and data stores Lotus Notes Information Paper: How Nuix mitigates the unique challenges posed by Lotus Notes for ediscovery and electronic investigation ABOUT NUIX Nuix is a worldwide provider of information management technologies, including ediscovery, electronic investigation and information governance software. Nuix solutions scale to meet the needs of the smallest or largest organizations, making it faster and easier to undertake investigations and data management activities, no matter the size or complexity of the data sets.nuix customers include the world s leading advisory firms, litigation support providers, enterprises, government departments, law enforcement agencies and all of the world s major corporate regulatory bodies. Asia Pacific EMEA North America sales@nuix.com // nuix.com // twitter.com/nuix Copyright 011 Nuix. All rights reserved.

The evolution of data archiving

The evolution of data archiving The evolution of data archiving 1 1 How archiving needs to change for the modern enterprise Today s enterprises are buried by data, and this problem is being exacerbated by the unfettered growth of unstructured

More information

How ediscovery Technology Can Accelerate Information Governance for Corporations

How ediscovery Technology Can Accelerate Information Governance for Corporations Nuix Insight Paper How ediscovery Technology Can Accelerate Information Governance for Corporations With risk management and operational efficiencies becoming strategic priorities for both private and

More information

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Better store, manage, and discover business-critical information Solution Overview: Archiving Introduction The data explosion that has burdened

More information

Are Mailboxes Enough?

Are Mailboxes Enough? Forensically Sound Preservation and Processing of Exchange Databases Microsoft Exchange server is the communication hub for most organizations. Crucial email flows through this database continually, day

More information

Veritas Enterprise Vault.cloud for Microsoft Office 365

Veritas Enterprise Vault.cloud for Microsoft Office 365 TM Veritas Enterprise Vault.cloud for Microsoft Office 365 Assume control over your information ecosystem Benefits at a glance Satisfies email retention requirements by journaling an immutable copy of

More information

ILM et Archivage Les solutions IBM

ILM et Archivage Les solutions IBM Information Management ILM et Archivage Les solutions IBM Dr. Christian ARNOUX Consultant Information Management IBM Suisse, Software Group 2007 IBM Corporation IBM Strategy for Enterprise Content Compliance

More information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Trusted and Proven Email Archiving Symantec Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage,

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables

More information

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services EnCase Enterprise/ ediscovery Strategic Consulting EnCase customers now have a trusted expert advisor to meet their discovery goals. NightOwl Discovery offers complete support for the EnCase Enterprise

More information

Symantec Enterprise Vault.cloud Overview

Symantec Enterprise Vault.cloud Overview Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult

More information

W H I T E P A P E R. Symantec Enterprise Vault and Exchange Server 2010. November 2011

W H I T E P A P E R. Symantec Enterprise Vault and Exchange Server 2010. November 2011 W H I T E P A P E R Symantec Enterprise Vault and Exchange Server 2010 November 2011 Introduction... 3 Enterprise Vault Support and Compatibility for Exchange Server 2010... 3 So What Is New In Exchange

More information

Forensic Triage in a Multi-TB Era Ady Cassidy, Nuix

Forensic Triage in a Multi-TB Era Ady Cassidy, Nuix Forensic Triage in a Multi-TB Era Ady Cassidy, Nuix Ady Cassidy Systems Consultant Nuix Ady is a computer forensic investigator and ediscovery consultant with more than 10 years experience as a Computer

More information

TO BE OR NOT TO BE (Archiving), That is the question!

TO BE OR NOT TO BE (Archiving), That is the question! Why SourceOne Series TO BE OR NOT TO BE (Archiving), That is the question! The Business Value of SourceOne TM for Archive and E-discovery Why you should take the time to read this paper Get control of

More information

Addressing Legal Discovery & Compliance Requirements

Addressing Legal Discovery & Compliance Requirements Addressing Legal Discovery & Compliance Requirements A Comparison of and Archiving In today s digital landscape, the legal, regulatory and business requirements for email archiving continue to grow in

More information

Enterprise Email Archive Managed Archiving & ediscovery Services User Manual

Enterprise Email Archive Managed Archiving & ediscovery Services User Manual Enterprise Email Archive Managed Archiving & ediscovery Services User Manual Copyright (C) 2012 MessageSolution Inc. All Rights Reserved Table of Contents Chapter 1: Introduction... 3 1.1 About MessageSolution

More information

EMAIL ARCHIVING. What it is, what it isn t, and how it can improve your business operations

EMAIL ARCHIVING. What it is, what it isn t, and how it can improve your business operations EMAIL ARCHIVING What it is, what it isn t, and how it can improve your business operations OVERVIEW: Why businesses are turning to email archiving As your business grows, communication between you and

More information

Symantec Enterprise Vault for Microsoft Exchange Server

Symantec Enterprise Vault for Microsoft Exchange Server Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy

More information

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review Accelerate e-discovery and simplify review Overview provides IT/Legal liaisons, investigators, lawyers, paralegals and HR professionals the ability to search, preserve and review information across the

More information

Document Storage Tips: Inside the Email Vault

Document Storage Tips: Inside the Email Vault Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Document Storage Tips: Inside the Email Vault Law360,

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

# Is ediscovery eating a hole in your companies wallet?

# Is ediscovery eating a hole in your companies wallet? 1. ediscovery # Is ediscovery eating a hole in your companies wallet? 90% Of New Records are Created Electronically Only 50% Of Electronic Documents are Printed The Number of GB processed per year is growing

More information

Director, Value Engineering

Director, Value Engineering Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software

More information

Addressing E-mail Archiving and Discovery with Microsoft Exchange Server 2010

Addressing E-mail Archiving and Discovery with Microsoft Exchange Server 2010 WHITE PAPER Addressing E-mail Archiving and Discovery with Microsoft Exchange Server 2010 Introduction With businesses generating and sharing an ever-increasing volume of information through e-mail, the

More information

Email Archiving E-mail Compliance Storage Management Electronic Discovery

Email Archiving E-mail Compliance Storage Management Electronic Discovery Email Archiving E-mail Compliance Storage Management Electronic Discovery archiver Athena www.athenaarchiver.com Athena Archiver is a next-generation email and instant message archiving system which enables

More information

E-Discovery for Backup Tapes. How Technology Is Easing the Burden

E-Discovery for Backup Tapes. How Technology Is Easing the Burden E-Discovery for Backup Tapes How Technology Is Easing the Burden TABLE OF CONTENTS Introduction...3 The Importance and Challenge of Backup Tapes for Electronic Discovery...3 TAPES AS A SOURCE OF ESI...

More information

10 Steps to Establishing an Effective Email Retention Policy

10 Steps to Establishing an Effective Email Retention Policy WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION

More information

EMC SourceOne Email Management and ediscovery Overview

EMC SourceOne Email Management and ediscovery Overview EMC SourceOne Email Management and ediscovery Overview Deanna Hoover EMC SourceOne Systems Engineer 1 Agenda Value of Good Information Governance Introduction to EMC SourceOne Information Governance Email

More information

Veritas Enterprise Vault for Microsoft Exchange Server

Veritas Enterprise Vault for Microsoft Exchange Server Veritas Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Trusted and proven email archiving Veritas Enterprise Vault, the industry leader in email

More information

The Inevitable Extinction of PSTs

The Inevitable Extinction of PSTs WHITE PAPER: THE INEVITABLE EXTINCTION OF PSTS........................................ The Inevitable Extinction of PSTs Who should read this paper Microsoft Exchange administrators are responsible for

More information

Intelligent Archiving for Managing Unstructured Information. Victor Law Director, Specialist Sales, Asia Pacific & Japan Information Management Group

Intelligent Archiving for Managing Unstructured Information. Victor Law Director, Specialist Sales, Asia Pacific & Japan Information Management Group Intelligent Archiving for Managing Unstructured Information Victor Law Director, Specialist Sales, Asia Pacific & Japan Information Management Group Today s Information Challenges Unstructured information

More information

Simplify the e-discovery process by learning which tools to use and when to use them. CHAPTER 7. Proactive. Review tools. litigation hold tools.

Simplify the e-discovery process by learning which tools to use and when to use them. CHAPTER 7. Proactive. Review tools. litigation hold tools. THE WINDOWS MANAGER S GUIDE TO INSIDE: Reactive litigation hold tools Proactive litigation hold tools Review tools Enterprise search tools Archive systems CHAPTER Exploring e-discovery tools Simplify the

More information

Symantec Enterprise Vault.cloud Overview

Symantec Enterprise Vault.cloud Overview Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult

More information

ARCHIVING FOR EXCHANGE 2013

ARCHIVING FOR EXCHANGE 2013 White Paper ARCHIVING FOR EXCHANGE 2013 A Comparison with EMC SourceOne Email Management Abstract Exchange 2013 is the latest release of Microsoft s flagship email application and as such promises to deliver

More information

Integrated email archiving: streamlining compliance and discovery through content and business process management

Integrated email archiving: streamlining compliance and discovery through content and business process management Make better decisions, faster March 2008 Integrated email archiving: streamlining compliance and discovery through content and business process management 2 Table of Contents Executive summary.........

More information

Viewpoint ediscovery Services

Viewpoint ediscovery Services Xerox Legal Services Viewpoint ediscovery Platform Technical Brief Viewpoint ediscovery Services Viewpoint by Xerox delivers a flexible approach to ediscovery designed to help you manage your litigation,

More information

Discovery of Electronically Stored Information ECBA conference Tallinn October 2012

Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Jan Balatka, Deloitte Czech Republic, Analytic & Forensic Technology unit Agenda Introduction ediscovery investigation

More information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Trusted and proven email archiving Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage, and

More information

Symantec Document Retention and Discovery Symantec Enterprise Vault Symantec Enterprise Vault Discovery Accelerator

Symantec Document Retention and Discovery Symantec Enterprise Vault Symantec Enterprise Vault Discovery Accelerator Symantec Document Retention and Discovery Symantec Enterprise Vault Symantec Enterprise Vault Discovery Accelerator Enforceable Email Retention Accelerated Electronic Discovery Aligns Legal, IT, and Business

More information

Using EMC SourceOne Email Management in IBM Lotus Notes/Domino Environments

Using EMC SourceOne Email Management in IBM Lotus Notes/Domino Environments Using EMC SourceOne Email Management in IBM Lotus Notes/Domino Environments Technology Concepts and Business Considerations Abstract EMC SourceOne Email Management enables customers to mitigate risk, reduce

More information

hite Paper A Step-By-Step Guide to Effective

hite Paper A Step-By-Step Guide to Effective Nuix White Paper A Step-By-Step Guide to Effective Early Case Assessment (ECA) How companies can use investigative review techniques to achieve the best ediscovery results for your clients» Leading edge

More information

Recovering Microsoft Exchange Server Data

Recovering Microsoft Exchange Server Data Recovering Microsoft Exchange Server Data An Altegrity Company 1 Why Recovering and Searching Email Archives Is Important 3 Why Recovering and Searching Email Archives Is Difficult 5 How Ontrack PowerControls

More information

Miguel Ortiz, Sr. Systems Engineer. Globanet

Miguel Ortiz, Sr. Systems Engineer. Globanet Miguel Ortiz, Sr. Systems Engineer Globanet Agenda Who is Globanet? Archiving Processes and Standards How Does Data Archiving Help Data Management? Data Archiving to Meet Downstream ediscovery Needs Timely

More information

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY 2016 CLM Annual Conference April 6-8, 2016 Orlando, FL Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY Understanding e-discovery definitions and concepts is critical to working with vendors,

More information

Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data

Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data Nuix And EDRM Case Study: Removing PII from Nuix the and EDRM EDRM Enron Case Data Study Set Removing PII from the EDRM Enron Data Set Investigating the prevalence of unsecured financial, health and personally

More information

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents WhitePaper Concise Guide to E-discovery Contents i. Overview ii. Importance of e-discovery iii. How to prepare for e-discovery? iv. Key processes & issues v. The next step vi. Conclusion Overview E-discovery

More information

68% Meet compliance needs with Microsoft Exchange. of companies send sensitive data via email.

68% Meet compliance needs with Microsoft Exchange. of companies send sensitive data via email. Meet compliance needs with Microsoft Exchange As the volume and importance of digital information grows, regulatory compliance schemas are broadening to encompass an ever-larger share of data that companies

More information

The Disconnect Between Legal and IT Teams

The Disconnect Between Legal and IT Teams WHEPAPER The Disconnect Between and Teams Examples of what each side doesn t know #2 in a series of 4 whitepapers. Circulate this document to,, and company management. It can be used to start a dialog,

More information

Email Archiving Whitepaper. Why Email Archiving is Essential (and Not the Same as Backup) www.fusemail.com

Email Archiving Whitepaper. Why Email Archiving is Essential (and Not the Same as Backup) www.fusemail.com Why Email Archiving is Essential (and Not the Same as Backup) Why Email Archiving is Essential (and Not the Same as Backup) If your job depended on it, could you clearly explain right this moment the principal

More information

MIGRATING YOUR EMC SOURCEONE EMAIL ARCHIVE

MIGRATING YOUR EMC SOURCEONE EMAIL ARCHIVE SOLUTION BRIEF MIGRATING YOUR EMC SOURCEONE EMAIL ARCHIVE Obsolete Email Archives Pose a Regulatory and Legal Risk As far back as the late 1990 s, organizations began to realize the need to incorporate

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information The pressure on organizations to protect and manage data has intensified with the recent growth in unstructured data and the reliance on email

More information

3 Tips for Your Email Woes: Streamline. Simplify. Cloud.

3 Tips for Your Email Woes: Streamline. Simplify. Cloud. Singtel Business Product Factsheet Email Archiving 3 Tips for Your Email Woes: Streamline. Simplify. Cloud. Secure and flexible email archival and e-discovery with Singtel Email Archiving Services. Email

More information

A White Paper. Email Archiving Implementation. Five Costly Mistakes to Avoid. By Bob Spurzem. May 2008. Mimosa Systems, Inc.

A White Paper. Email Archiving Implementation. Five Costly Mistakes to Avoid. By Bob Spurzem. May 2008. Mimosa Systems, Inc. A White Paper By Bob Spurzem Mimosa Systems, Inc. May 2008 Email Archiving Implementation Five Costly Mistakes to Avoid INFORMATION IMMEDIACY, DISCOVERY & CONTINUITY CONTENTS Introduction...3 1. Server

More information

EXECUTIVE BRIEF SPON. Third-Party Archiving Solutions Are Still Needed in Exchange 2013 Environments. Published April 2015

EXECUTIVE BRIEF SPON. Third-Party Archiving Solutions Are Still Needed in Exchange 2013 Environments. Published April 2015 EXECUTIVE BRIEF Third-Party Archiving Solutions Are Still Needed in Exchange Environments An Osterman Research Executive Brief sponsored by Published April 2015 SPON sponsored by Osterman Research, Inc.

More information

Litigation Support. Learn How to Talk the Talk. solutions. Document management

Litigation Support. Learn How to Talk the Talk. solutions. Document management Document management solutions Litigation Support glossary of Terms Learn How to Talk the Talk Covering litigation support from A to Z. Designed to help you come up to speed quickly on key terms and concepts,

More information

Information Governance in the Cloud

Information Governance in the Cloud Information Governance in the Cloud TABLE OF CONTENTS Executive Summary...3 Information Governance: Building a Trusted Foundation for Business Content...5 The Challenge...5 The Solution....5 Content and

More information

NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER

NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER CONTENTS Executive summary...2 The digital forensic investigation impasse...3 Lessons from

More information

Introduction Thanks Survey of attendees Questions at the end

Introduction Thanks Survey of attendees Questions at the end Introduction Thanks Survey of attendees Questions at the end 1 Electronic records come in a variety of shapes and sizes and are stored in a multitude of ways. Just what are you managing? Video Cloud computing

More information

Beyond Data Migration Best Practices

Beyond Data Migration Best Practices Beyond Data Migration Best Practices Table of Contents Executive Summary...2 Planning -Before Migration...2 Migration Sizing...4 Data Volumes...5 Item Counts...5 Effective Performance...8 Calculating Migration

More information

Product Overview Archive2Anywhere Message Stub Management

Product Overview Archive2Anywhere Message Stub Management Product Overview Archive2Anywhere Message Stub Management From Archive360 Introduction to Stubs and Shortcuts One of the many benefits that legacy archives provide is the ability to manage the size of

More information

W H I T E P A P E R E X E C U T I V E S U M M AR Y S I T U AT I O N O V E R V I E W. Sponsored by: EMC Corporation. Laura DuBois May 2010

W H I T E P A P E R E X E C U T I V E S U M M AR Y S I T U AT I O N O V E R V I E W. Sponsored by: EMC Corporation. Laura DuBois May 2010 W H I T E P A P E R E n a b l i n g S h a r e P o i n t O p e r a t i o n a l E f f i c i e n c y a n d I n f o r m a t i o n G o v e r n a n c e w i t h E M C S o u r c e O n e Sponsored by: EMC Corporation

More information

Solving.PST Management Problems in Microsoft Exchange Environments

Solving.PST Management Problems in Microsoft Exchange Environments Solving.PST Management Problems in Microsoft Exchange Environments An Osterman Research White Paper sponsored by Published April 2007 sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington

More information

Enhancing Microsoft Exchange & Office 365 Email Archiving, Retention, and Discovery with Netmail

Enhancing Microsoft Exchange & Office 365 Email Archiving, Retention, and Discovery with Netmail Netmail Platform White Paper Enhancing Microsoft Exchange & Office 365 Email Archiving, Retention, and Discovery with Netmail With organizations creating and sharing more and more information over email,

More information

Do You Know Where Your Messages Are?

Do You Know Where Your Messages Are? Do You Know Where Your Messages Are? By Jason Sherry The need for message archiving In most organizations, an estimated 83 percent of all communications are electronic, with the vast majority of those

More information

Intelligent Information Management: Archive & ediscovery

Intelligent Information Management: Archive & ediscovery Intelligent Information Management: Archive & ediscovery Byron Chang Senior Systems Engineer / Symantec Hong Kong Agenda 1 Today s Information Management Challenges 2 Why Information Management? 3 The

More information

Archiving, Backup, and Recovery for Complete the Promise of Virtualization

Archiving, Backup, and Recovery for Complete the Promise of Virtualization Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that

More information

Preservation and Production of Electronic Records

Preservation and Production of Electronic Records Policy No: 3008 Title of Policy: Preservation and Production of Electronic Records Applies to (check all that apply): Faculty Staff Students Division/Department College _X Topic/Issue: This policy enforces

More information

Protezione dei dati. Luca Bin. EMEA Sales Engineer Lbin@Barracuda.com. Version 6.1 July 2015

Protezione dei dati. Luca Bin. EMEA Sales Engineer Lbin@Barracuda.com. Version 6.1 July 2015 Protezione dei dati Luca Bin EMEA Sales Engineer Lbin@Barracuda.com Version 6.1 July 2015 Barracuda Backup Easy Cloud-Connected Backup Version 6.1 July 2015 Traditional Backup is Complicated Highly diverse

More information

Archiving and The Federal Rules of Civil Procedure: Understanding the Issues

Archiving and The Federal Rules of Civil Procedure: Understanding the Issues Archiving and The Federal Rules of Civil Procedure: Understanding the Issues An ArcMail Technology Research Paper ArcMail Technology, Inc. 401 Edwards Street, Suite 1620 Shreveport, Louisiana 71101 www.arcmailtech.com

More information

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) University of California, Merced Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI) Responsible Officials: Executive Vice Chancellor and Provost Vice Chancellor

More information

Email Archiving, Retrieval and Analysis The Key Issues

Email Archiving, Retrieval and Analysis The Key Issues Email Archiving, Retrieval and Analysis The "If you are going to find a smoking gun, you will find it in email." Abstract Organisations are increasingly dependent on email for conducting business, internally

More information

Death to PST Files. The Hidden Costs of Email

Death to PST Files. The Hidden Costs of Email WHITE PAPER: EMAIL MANAGEMENT........................................ Death to PST Files Who should read this paper IT professionals looking for an easy storage, search and retrieval system for email that

More information

11 ways to migrate Lotus Notes applications to SharePoint and Office 365

11 ways to migrate Lotus Notes applications to SharePoint and Office 365 11 ways to migrate Lotus Notes applications to SharePoint and Office 365 Written By Steve Walch, Senior Product Manager, Dell, Inc. Abstract Migrating your Lotus Notes applications to Microsoft SharePoint

More information

ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery. ZL TECHNOLOGIES White Paper

ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery. ZL TECHNOLOGIES White Paper ZL UNIFIED ARCHIVE A Project Manager s Guide to E-Discovery ZL TECHNOLOGIES White Paper PAGE 1 A project manager s guide to e-discovery In civil litigation, the parties in a dispute are required to provide

More information

Archiving A Dell Point of View

Archiving A Dell Point of View Archiving A Dell Point of View Dell Product Group 1 THIS POINT OF VIEW PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED

More information

Only 1% of that data has preservation requirements Only 5% has regulatory requirements Only 34% is active and useful

Only 1% of that data has preservation requirements Only 5% has regulatory requirements Only 34% is active and useful Page 1 LMG GROUP vs. THE BIG DATA TIDAL WAVE Recognizing that corporations, law firms and government entities are faced with tough questions in today s business climate, LMG Group LLC ( LMG Group ) has

More information

Building an ROI Business Case for Email Archiving. Redgrave Daley Ragan & Wagner LLP

Building an ROI Business Case for Email Archiving. Redgrave Daley Ragan & Wagner LLP Redgrave Daley Ragan & Wagner LLP 1 Introduction Over the past several years, the reliance that organizations place on e-mail as their primary form of business communication has grown exponentially. The

More information

Capstone for Records Management

Capstone for Records Management Capstone for Records Management Patrick Bland, Esq. ediscovery & Information Governance Specialist DLT Solutions Capstone for Records Management 1 DLT Solutions Company Background Provider of best of breed

More information

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management Exponential

More information

COMPLIANCE BENEFITS OF SAP ARCHIVING

COMPLIANCE BENEFITS OF SAP ARCHIVING O P E R AT I O NA L A N D COMPLIANCE BENEFITS OF SAP ARCHIVING A article sponsored by EMC Author: Jarad Carleton, Senior Consultant ICT Practice Partnering with clients to create innovative growth strategies

More information

CA Message Manager. Benefits. Overview. CA Advantage

CA Message Manager. Benefits. Overview. CA Advantage PRODUCT BRIEF: CA MESSAGE MANAGER CA Message Manager THE PROACTIVE MANAGEMENT OF EMAIL AND INSTANT MESSAGES IS INTEGRAL TO THE OVERALL STRATEGY OF INFORMATION GOVERNANCE. THERE ARE MANY COMPLEX CHALLENGES

More information

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments Unified Information Management for Complex Windows Environments The Explosion of Unstructured Information It is estimated that email, documents, presentations, and other types of unstructured information

More information

IBM Information Archive for Email, Files and ediscovery

IBM Information Archive for Email, Files and ediscovery IBM Information Archive for Email, Files and ediscovery Simplify and accelerate the implementation of an end-to-end archiving and ediscovery solution Highlights Take control of your content with an integrated,

More information

WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity

WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity Sponsored by: EMC Corporation Laura DuBois August 2010 Vivian Tero EXECUTIVE SUMMARY Global Headquarters: 5 Speen Street

More information

Capstone Compliance Using Symantec Archiving and ediscovery Solutions

Capstone Compliance Using Symantec Archiving and ediscovery Solutions WHITE PAPER: CAPSTONE COMPLIANCE........................................ Capstone Compliance Using Symantec Archiving and ediscovery Solutions Who should read this paper IT decision-makers, architects,

More information

Four Things You Must Do Before Migrating Archive Data to the Cloud

Four Things You Must Do Before Migrating Archive Data to the Cloud Four Things You Must Do Before Migrating Archive Data to the Cloud The amount of archive data that organizations are retaining has expanded rapidly in the last ten years. Since the 2006 amended Federal

More information

IBM CommonStore email Archiving Preload Solution

IBM CommonStore email Archiving Preload Solution Designed to simplify e-mail archiving to help support data protection, governance and compliance IBM CommonStore email Archiving Preload Solution Highlights This solution can help small to This end-to-end

More information

A Modern Approach for Corporations Facing the Demands of Litigation

A Modern Approach for Corporations Facing the Demands of Litigation A Modern Approach for Corporations Facing the Demands of Litigation The first pure Software-as-a-Service (SaaS) e-discovery technology designed to help in-house legal teams face the increased risk and

More information

Archive Attender. Version 3.2. White Paper. Archive Attender is a member of the Attender Utilities family. www.re-soft.

Archive Attender. Version 3.2. White Paper. Archive Attender is a member of the Attender Utilities family. www.re-soft. Archive Attender Version 3.2 White Paper Archive Attender is a member of the Attender Utilities family Under the copyright laws, neither the documentation nor the software can be copied, photocopied, reproduced,

More information

SearchWinIT.com SearchExchange.com SearchSQLServer.com

SearchWinIT.com SearchExchange.com SearchSQLServer.com TechTarget Windows Media SearchWinIT.com SearchExchange.com SearchSQLServer.com SearchEnterpriseDesktop.com SearchWindowsServer.com SearchDomino.com LabMice.net Pocket E-Guide Expert Guide: Selecting the

More information

Veritas Enterprise Vault Overview

Veritas Enterprise Vault Overview TM Veritas Enterprise Vault Overview Store, manage, and discover critical business information Overview As an IT professional, you are challenged with identifying business critical information and determining

More information

ELECTRONIC DISCOVERY & LITIGATION SUPPORT

ELECTRONIC DISCOVERY & LITIGATION SUPPORT ELECTRONIC DISCOVERY & LITIGATION SUPPORT A Primer by MessageSolution, Inc. The recent influx of federal and industry email regulations combined with the increased use of electronic discovery in court

More information

Email Archiving: the definitive checklist - 33 crucial questions you must get answered before selecting a solution.

Email Archiving: the definitive checklist - 33 crucial questions you must get answered before selecting a solution. Email Archiving: the definitive checklist - 33 crucial questions you must get answered before selecting a solution. www.re-soft.com 203 972 8462 info@re-soft.com This page left intentionally blank ReSoft

More information

WHITE PAPER ONTRACK POWERCONTROLS. Recovering Microsoft Exchange Server Data

WHITE PAPER ONTRACK POWERCONTROLS. Recovering Microsoft Exchange Server Data WHITE PAPER ONTRACK POWERCONTROLS Recovering Microsoft Exchange Server Data MARCH 2015 2 KROLL ONTRACK ONTRACK POWERCONTROLS Table of Contents pg 3 / Why Recovering and Searching Email Archives Is Important

More information

Electronic documents questionnaire

Electronic documents questionnaire Electronic documents questionnaire (Civil Procedure Rules Practice Direction 31B) WARNING: Unless the court makes some other order, the answers given in this document may only be used for the purposes

More information

White Paper. Mimosa NearPoint for Microsoft Exchange Server. Next Generation Email Archiving for Exchange Server 2007. By Bob Spurzem and Martin Tuip

White Paper. Mimosa NearPoint for Microsoft Exchange Server. Next Generation Email Archiving for Exchange Server 2007. By Bob Spurzem and Martin Tuip White Paper By Bob Spurzem and Martin Tuip Mimosa Systems, Inc. January 2008 Mimosa NearPoint for Microsoft Exchange Server Next Generation Email Archiving for Exchange Server 2007 CONTENTS Email has become

More information

Backup and Archiving Explained. White Paper

Backup and Archiving Explained. White Paper Backup and Archiving Explained White Paper Backup vs. Archiving The terms backup and archiving are often referenced together and sometimes incorrectly used interchangeably. While both technologies are

More information

Why Data Management Matters Right Now

Why Data Management Matters Right Now Why Data Management Matters Right Now Why Data Management Matters Right Now Chapter 1: The Exponential Growth of Data Chapter 2: Data Retention Policies and Compliance Chapter 3: Accessing your Data Chapter

More information

IBM ediscovery Identification and Collection

IBM ediscovery Identification and Collection IBM ediscovery Identification and Collection Turning unstructured data into relevant data for intelligent ediscovery Highlights Analyze data in-place with detailed data explorers to gain insight into data

More information

e-discovery Forensic Services kpmg.ch Advisory

e-discovery Forensic Services kpmg.ch Advisory e-discovery Advisory Forensic Services kpmg.ch e-discovery You or your client are involved in a dispute, investigation, regulatory or internal review. You need to review evidence and may need to disclose

More information