An end-user data strategy for most organizations begins and ends with data protection. Certainly the ability to backup and recover user devices is critical and the most high profile component of the strategy, but retention of end-user data may be more important to the organization. Most organizations have specific requirements placed on them by the government, their industry or even the corporation itself to retain certain types of data. Unfortunately the organizations do not consider the data outside of the data center when they try to fulfill those those requirements.
End user data is not only a prime target of cyber-attacks, it is also a prime target of auditors and lawyers looking for information. If the data on these laptops is not understood and, when needed, placed on legal hold then the organization is in danger of penalties and fines.
How to Create an End-User Data Retention Strategy
Retaining data consolidated inside the data center is challenging enough. Retaining data that is outside of the data center, spread across hundreds if not thousands of laptops, can seem overwhelming. One of the challenges is how to consolidate of all this data so it can be classified and have retention policies applied to the specific data that needs retaining.
Ideally the solution is to leverage the existing end-user data protection solution, which should, as part of the backup process, centralize all end-user data into a single storage location. A centralized cloud is an ideal location to store all of these backups. If the software can then scan those backups to identify data with sensitive information, as well as provide generalized federated search, the battle is halfway won. The only aspect that remains is the ability to provide a policy-based retention strategy that will enable the organization to retain the right data for the right period of time.
Another aspect of organizational protection beyond retention is to make sure data on end the users’ devices is not sensitive. The solution should as part of the search capability have the ability to identify documents that contain sensitive information like credit card numbers and social security numbers.
With these tools in place IT is able to respond quickly and completely to eDiscovery Requests as well as place sensitive documents on legal hold. When end user data management is coupled with an end user data protection and end user file sync and share the organization has the three pillars of an end user data strategy. To learn more about developing an end-user data strategy join us for our on demand webinar, “Endpoint Backup is not Enough – You Need an End-user Data Strategy”.