Get out the Mops, Brooms, and Garbage Cans, It’s Early Spring Cleaning!

News Upcoming Webinars Trade Shows and Events Press Releases Newsletters Blog
Content Optimization - Concept Searching

Get out the Mops, Brooms, and Garbage Cans, It’s Early Spring Cleaning!

Our prospects have become increasingly concerned about burgeoning content in file shares that remains unmanaged. Add to that the fact that siloed systems such as enterprise content management (ECM) are past their prime, and that migration to the cloud is becoming a regular occurrence. Transferring garbage is not a logical approach, and many organizations are now worried about what unknown data is being placed in the cloud.

Rarely do I applaud the US government for anything. In fact, I can’t think of when I did. Well, there is a first time for everything. The US Department of Transportation (DOT) decided to launch a bug hunt on its headquarters computers. It has already been the recipient of three ransomware attacks in 2017 and 2018. Sort of run of the mill attacks that didn’t do much harm. Vicki Hildebrand, CIO and formerly of Hewlett-Packard, initiated the bug hunt and decided to start with headquarters computer systems because she thought they were more secure than many of the systems in DOT component agencies.

“We started with software we thought was rock solid,” said Hildebrand. But that confidence turned out to be unjustified. “There were vulnerabilities we didn’t realize,” she said. Not only were there previously unknown vulnerabilities inside the headquarters systems, but there wasn’t an easy fix for them.

Once vulnerabilities were found, what to do with them? Hildebrand’s solution was to dedicate a team to “whacking these things when they’re identified” rather than relying on regular patching schedules. I hope they have good documentation. Now that headquarters systems have been vetted, Hildebrand plans to launch a “cleansing program” through the entire department that will include crowdsourced bug hunting at select agencies.

What unknown vulnerabilities are you harboring, even if you think your software or data is safe? Bet you don’t know. What is in your file shares? Our content optimization solution provides the information you need to make informed decisions on the disposition of data, whether to archive, delete, process, or protect it. eDiscovery can be greatly improved, noncompliance instances found and corrected, undeclared records processed, and intellectual and confidential information protected.

Our insight engine can identify multi-term metadata that represents meaning, and will also identify similar topics and subjects, even if the exact search terms aren’t used. You will be surprised how much redundant, obsolete, and trivial (ROT) information floats to the surface, along with content that still has value.

Let’s get going. Embrace migration, get a good night’s sleep knowing your data is safe. The outcome is all good, and the solution is easy to use and rapidly deployed. Let us show you how it works at Ignite, Booth #212. Not going to Ignite? Then just contact us for a customized demo.