• Join our Communities!

  • Twitter Updates

    Error: Twitter did not respond. Please wait a few minutes and refresh this page.

  • Disclaimer:

    The information in this weblog is provided "AS IS" with no warranties, and confers no rights. The opinions and interests expressed on this employee blog are the employees' own and don't necessarily represent EMC's positions, strategies or views. Inappropriate comments will be deleted at the authors discretion.
  • Advertisements

Where does Archiving Rank in Your List of Critical IT Applications?

Not a year goes by that a major scandal involving email does not rock the worldwide news.  And 2012 is no exception.

Recall the major story that broke the week of the United States Presidential elections involving General David Petraeus, General John Allen and a civilian Jill Kelley.  Can you believe that this scandal involved 20,000 to 30,000 documents, mostly emails that spanned a two year period beginning in 2010?

Scandals involving email are not isolated to government scandals.

Take for example the high profile patent law suit between Apple and Samsung.  When the case concluded in July 2012, it was revealed that an email from Google to Samsung had much to do with the final outcome.

National security, loss of intellectual property and general leaks of confidential information are a constant threat to organizations of all sizes, public or private.

Which brings us back to our original question:  Where does archiving stand on your IT priority list?

That answer likely depends on whether your organization has had to face a major security breach or law suit involving email, documents or similar forms of electronic information.

Archiving is the application responsible for managing sensitive information.  Archiving collects and preserves electronic information allowing for fast search and retrieval of electronic records as required by government, a court of law or an internal investigation.

Organizations that maintain an archive repository are able to manage and preserve sensitive information according to organization policy and avoid the risk of losing control of sensitive information that rests in the hands of end users.

If you are interested to learn more about archiving and managing sensitive email and other forms of electronic information, go to http://www.emc.com/archiving/ .


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: