was successfully added to your cart.




Four New Features that Will Keep Backup Software “Sticky”

By | Buyer's Guides, Cloud, Cloud Storage, Data Protection, Disk Based Backup, Managed Service Provider, Online Backup, Replication, Search, Security | No Comments

Backup software has traditionally been one of the “stickiest” products in organizations of all sizes in art because it has been so painful to deploy and maintain that, once installed and sort of working, no organization wanted to subject itself to that process again. But in recent years as backup has become easier to install and maintain, swapping it out for another or consolidating multiple backup software solutions down to single one becomes much more plausible. This puts new impetus on backup software providers to introduce new features into their products to keep them relevant and “sticky” in their customer environments longer term.

Read More

Synchronizing Archival Data Stores in the Cloud; Interview with C2C Systems CTO Ken Hughes Part V

By | DCIG, eMail Archive, Governance Risk and Compliance, Information Management, Litigation Readiness, Search | No Comments

One of the most common initial use cases for cloud storage is for the storage of archival data. However that does not mean every organization is quite ready to move all of their archival data to the cloud or, what they do move to the cloud, trust the cloud to be available to provide access to the data when they need it. In this fifth blog entry in my interview series with C2C Systems’ CTO Ken Hughes, he talks about the importance of having access to cloud storage repositories for archival data and the advantages of keeping on-premise and data in the cloud synchronized.

Read More

Tips to Doing Search and Establishing Data Ownership; Executive Interview with C2C Systems CTO Ken Hughes Part IV

By | DCIG, Electronic Discovery, eMail Archive, Search | No Comments

Doing searches across unstructured data stores and understanding who owns this data are emerging as higher priorities in today’s Big Data era. However archiving software can vary greatly in how it performs these tasks of search and assigning data ownership. In this fourth blog entry in my interview series with C2C Systems’ CTO Ken Hughes, he examines how C2C performs search across distributed email and file systems and what techniques it employs to establish data ownership.

Read More

Legal Precedents Put Computer Assisted eDiscovery on Course to Broader Enterprise Acceptance

By | DCIG, Early Case Assessment, Governance Risk and Compliance, Information Governance, Litigation Readiness, Search | No Comments

Faced with the accelerating increase in the volume of Electronically Stored Information (ESI) and the emergence of the concept of Big Data, enterprises worldwide need next generation IT systems to fulfill their corporate compliance, information governance and eDiscovery requirements to process and analyze all of this data. It is in response to this demand and the result of recent legal precendents that Technology Assisted Review (TAR), also known as Predictive Coding or Computer Assisted eDiscovery, is emerging as a legally viable and court-recognized option.

Read More

Today’s Backup Software: Smarter, More Agile and Doing a Lot More than Backup; Interview with Quest Software Sr VP Walter Angerer Part III

By | Data Protection, Search, Uncategorized | No Comments

Server virtualization has effectively broken the one-to-one relationship between servers and applications, enabling more efficient use of the host’s physical resources. But this is not without its drawbacks, as applications like backup software that took advantage of these idle resources no longer have access to them.

Read More

Four Prerequisites for eDiscovery/Early Case Assessment Products

By | Application Delivery, DCIG, Early Case Assessment, Electronic Discovery, Information Governance, Legal Hold, Litigation Readiness, Search | No Comments

Companies who execute Information Governance plans are looking for eDiscovery products supporting Early Case Assessment (ECA). ECA is a combination of search, workflow management, information processing, and multilingual user interfaces. ECA requires a cohesive set of technology, business and data science stakeholders to select products.
ECA is powerful business process, but identifying ECA products is a beleaguering task. ECA mashes together eDiscovery and technology requirements. The “mashing of requirements” creates a broad matrix of products and functionality. Without question, eDiscovery has significantly evolved within the last few years.

Read More

CommVault Hints at Coming Dell-CommVault Cloud Storage Offering; Tyco Electronics Finds CommVault’s Real Advantage

By | Archiving, DCIG, Search, Virtualization | No Comments

This week I am going to hearken back to a conference call that took place a couple of weeks ago on the morning of November 3, 2009. This is a new quarterly conference call that CommVault is sponsoring. This particular call was hosted by its Vice President of Marketing and Business Development, David West and was intended to provide some insight into CommVault’s Q209 successes. But, to my surprise, Tyco Electronics’ Scott Zeiders who heads its UNIX Tech Support, also joined the call and commented on Tyco’s experiences with implementing CommVault® Simpana®.

Read More

Symantec doesn’t have an electronic discovery strategy

By | DCIG, Electronic Discovery, eMail Archive, Litigation Readiness, Search | No Comments

Business processes, like electronic discovery, offer defined metrics and quantitative impacts on organizations. Historically speaking, electronic discovery review budgets have been rising steadily; creating the need to improve review (better crushing power) or reduce data going into review (refined selection process). Moreover, the team at KVS/Symantec knew in 2005 that “Discovery Accelerator 1.0” was a stifled product; primarily designed to return email results for people, according to dates and keywords. At the time all the talk was around better “improving review,” but the market has been saying “early case assessment” since early 2007.

Read More

EMC content archiving group still talks about possibility, not reality

By | Archiving, DCIG, Electronic Discovery, Information Management, Litigation Readiness, Search | No Comments

Carl Frappaolo, AIIM Vice President, Market Intelligence says “Unstructured information drives numerous business processes…” The logical option here would be to deploy a business process management suite (BPMS) of tools. Step one is to identify what departments, project groups and individuals are involved in the business processes. Step two; identify the information that results from those individuals, groups and departments. Step three, once the business process is mapped to the information you simply associate it with a retention management product and policies.

Read More

Enterprise Exclusive: CommVault® shores up Microsoft® and Sun™ 64-bit Computing platform with 64-bit data management

By | Archiving, DCIG, Microsoft Exchange, Search, Single Instance Store | No Comments

Microsoft (NASDAQ:MSFT) and Sun (NASDAQ:JAVA). If Microsoft and Sun were collaborating on a charity picnic this time last year, it would have been a shock. Now these companies are coming together to provide a combined software and hardware solution and going forward arm-in-arm with CommVault (NASDAQ:CVLT) to help companies address their most pressing application data management needs. No where is this challenge more acutely felt by businesses than in supporting Microsoft Exchange Server 2007 and Microsoft Office SharePoint Server 2007. Putting the right infrastructure in place to meet the needs of those mission-critical applications requires a new generation of hardware and software support. Organizations must do more than just select the right combination of hardware and software but deploy and support it. “Turnkey” is the new operative word no matter what size a company is and companies need turnkey solutions when implementing and supporting today’s mission critical applications. Today’s announcement that CommVault® has entered into a collaborative alliance with Microsoft…

Read More