Feature

Deploying Intelligent Information Management applications

Ezine

This article can also be found in the Premium Editorial Download "Storage magazine: Big 3 backup apps adapt to disk."

Download it now to read this article plus other related content.

In some cases, products may perform both the information preparation and management processes. For example, e-mail content-filtering software scans and analyzes all messages entering an organization, and produces a spam score that's compared to spam categories. If the spam score matches the criteria, the e-mails are filtered and not delivered. Similar to anti-spam software, MessageGate and Orchestria offer products that classify and act on messages. Actions include setting retention periods, blocking messages that violate regulatory policies from being sent and establishing legal hold groups if messages need to be reviewed by counsel.

IIM is possible because of the available products that can quickly analyze, classify and take actions with data. Other parts of the IT infrastructure, especially data protection software and storage systems, can use the attributes to further increase the availability and accessibility of data. New storage systems can store data attributes in the same device as the data. In addition, data protection software can increase the frequency of backups or serve as management software that moves the data to an online secondary storage system that facilitates quicker restores. Data protection software can also preserve the attributes along with the data, ensuring that all information and indexes can be restored.

When archiving files, information prep is handled by the file archiving software which, via integration with an intelligent storage

Requires Free Membership to View

system, establishes/enforces a retention period.

It's all context
By deploying IIM applications, organizations can improve resource management by eliminating the storage of duplicate data, reduce risk by quickly responding to discovery requests, comply with record-retention and privacy regulations, and restore the right data faster.

IIM provides the context to manage data efficiently. Data without context leads to unmanageable risks and significantly strains IT resources, both human and capital.

This was first published in April 2006

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: