oyster ims information governance solutions

4
Information Governance Solutions powered by

Upload: simplex-consulting

Post on 09-Jan-2017

108 views

Category:

Business


0 download

TRANSCRIPT

Page 1: Oyster IMS Information Governance Solutions

Information Governance Solutionspowered by

Page 2: Oyster IMS Information Governance Solutions

What is Information Governance?Information Governance (IG) builds on the traditional Information Management (IM) activities of capture, storage, management, preservation and delivery. IG adds a set of disciplines that deal with more complex issues of information risk, value, control, privacy and security brought about through massive growth in data volumes, ongoing legislative and regulatory activity and the increasing challenges around cyber security and data protection.

Organisations that invest in IG benefit from secure, reliable, trusted data and information stored in the right location, available to the right audience at the right time, and kept no longer than necessary.

Page 3: Oyster IMS Information Governance Solutions

Information Governance SolutionsOyster IMS Information Governance solutions are built on the solid foundations of best in class software and expert advisory services.

provides detailed information content analysis and powerful auto-classification and policy application tools, working across multiple repositories. It differs from traditional storage reporting tools by providing detailed metadata and contextual information to enable better information governance and storage management actions. Analyse, index, search, track and report on file metadata and file content, then use auto classification tools to assist in taking action on files according to policy.

is a unique File Analysis tool to slash cost and simplify at the same time. Its advanced information optimisation will identify redundant, obsolete or trivial information (ROT) allowing you to take rapid measures to reduce your storage footprint.

It is a simpler, smarter way to manage storage across the enterprise.

Know what you have Know what you can defensibly dispose of

Have a complete audit trail

enforce policies for legacy data clean-up, defensible deletion and data migration

indexes metadata and content in File Systems, SharePoint, Exchange and many other sources

indexes over 1,000 different file types

auto-classifies information by training the system on sample documents

identify and secure sensitive information such as PII, PHI, and PCI data

identify redundant, obsolete or trivial information, then delete or migrate it

improve data quality and infrastructure usage and greater visibility into data

lower storage costs and make effective use of tiered storage, including cloud

increase application performance by reducing the volume of data stored

reduce backup times by up to 50%

Page 4: Oyster IMS Information Governance Solutions

Oyster IMS Limited

New Loom House, 101 Back Church Lane, London E1 1LU

Tel: +44(0)207 199 0620 [email protected] www.oyster-ims.com

Inde

x

Met

adat

a A

naly

sis

an

d M

anag

emt

Con

tent

Ana

lysi

san

d M

anag

emen

t

Contact Oyster IMS for a free, no obligation consultation to help plan your information governance strategy.

About Oyster IMS Oyster IMS are information governance specialists. We provide expert advice on information governance strategy, policy and process development. We assist clients in all sectors with requirements gathering, business case development, file analysis and product selection.

Established in 2003, we are information governance specialists and strategic partners with Hewlett Packard Enterprise software, with specialist expertise in technical implementation, training and on-going support .

Remote Storage Feature Analysis Optimizer ControlPoint

File System

SharePoint (2007+)

Exchange (2007+)

Lotus Notes

HP Records Manager/Trim

HP StoreAll

Hadoop

Analyse

Report

Identify Redundant, Obsolete, Trivial

Tag

Classify

Policy Driven management

Dispose

Archive

Export

Migrate

Eduction (content extraction)

Secure sensitive information

Auto-classify

Data remediation

Compliant repositories