manage analyze govern

New personal data regulations. Threats of cyberattacks. Support for retention and archiving policies. Cost of storing files in the data center. New cloud migration strategies. How organizations manage and protect user data is fundamentally changing.

Index Engines tackles these challenges with the only enterprise class solution that supports user data across both primary and backup storage with petabyte-class scalability and performance. Index Engines’ clients are empowered to manage, analyze and govern data, controlling costs and supporting regulatory requirements. 

Power Over Information®

Intelligent Data Disposition
Policy based archiving, defensible deletion, migration

As data ages or becomes sensitive, Index Engines can easily find it and manage it based on the appropriate data center polices.

Index Engines maintains logs of all disposition activity, including data deletion that details the date and disposition of the file and the user who executed the action. This supports defensible and reliable data dispositions including archiving, deletion, migration and extraction.

Bundle ad

Based on an organization's policy, specific files or email can be archived and preserved through the intuitive user interface. Custom retention policies can then be defined and the disposition of relevant data-including native files and email-can be automated to support the organization's governance initiative.

As disposition of the data is performed, logs will be maintained that detail the date and disposition of the document, including the user who executed the disposition, enabling secure execution of defensible deletion, migration and archiving policies.

Disposition Options:

  • Copy/Migrate: Migrate or tier data to any network share or cloud storage. Data is copied and stored on a less expensive or more appropriate location and all metadata remains unchanged.
  • Archive: Based on any search parameters, sensitive content can be found and preserved within the Index Engines integrated archive for long-term retention.
  • Extraction: Data that is contained within a repository such as an email database or a backup image can be extracted to disk in its native format.
  • Defensible Deletion: Find and manage aged or abandoned data that no longer has business value and purge it from the data center. Validation checks the modified date or optionally the signature of the document to ensure deletion occurs on documents that have not been changed.
  • Output Listings for 3rd Party Tools: Full path and filename listings are available through a downloadable text file, allowing the use of third party tools and utilities to manage disposition. This includes options to encrypt or secure data.

Manage thin small

Management Edition

Understand what data exists on your network and manage it more effectively. The Management Edition gives you an affordable, quick and intuitive way to execute your data policies.

Analysis sma

Analysis Edition

The Analysis Edition combines the indexing, reporting and tiering of the Management Edition and adds advanced capabilities including pattern and sensitive data search.

Governance small

Governance Edition

The Governance Edition provides comprehensive indexing, search and management of sensitive and personal data across primary storage and backup data to support critical initiatives.

cybersense small thin

Cyber Threat Detection & Recovery

Adds a layer of protection to real-time cyber security solutions with CyberSense's analytics, machine learning and forensic tools to quickly detect and recover from cyberattacks.

backup small

Backup Data Management

Direct access to legacy backup data and management of catalogs, eliminating the dependence on the original software vendor and supporting transition to a new vendor.

Request a Quote 1150x500