End-to-End Solutions
01
The Solutions
Collect data about current footprint
Scanning data in place (on-prem NAS, SharePoint, Exchange Online, OneDrive, etc.).
- Share/Mailbox/Site enumeration
- Scanning at single or multiple levels
- Analysis
- Permissions analyses
- File Owner (SID) analyses
- Queries to Active Directory
- Integration with third-party tools
- Combinations/hybrid strategies
- Meta-data
- Extended meta-data
- Duplication (binary-level)
- Hidden streams
- True file-type (binary-level)
- Permissions configuration
- Content analysis (text-mining)
- String and pattern matching
- Wordlists and Standard Patterns
- Proximity of multiple matches
Present analysis of the ongoing situation
Challenges and opportunities identified.
- Summary-level and file lists
- Aggregations without re-scanning
- Drill-down interface
- Sorting and filtering
- Integrate data (REST, Excel Data Source)
- Authenticate with Domain Account
- Roles for different groups and needs
- Dashboards tuned to roles
- Full audit log for usage
Take Action on analyses
Remediate the current situation, implement workflows to avoid return.
- Manage files that meet criteria
- Delete, Quarantine, Workflow
- Tag File system permissions enforced
- Full audit trail
- Services for stakeholder groups
- Services for data owners
- Highlight policy infringement to direct actions
- Hard/soft limits on file share size
- Policies for file types that can be saved
- Act on primary challenges first
- Achieve results and progress
Measure success and effects of the actions taken
Compare against past and target state, show change achieved, measure value realized.
- Establish KPIs and KRIs
- View change over time
- Use KPIs and KRIs as Controls
- Trigger action when Controls are broken
- Communicate progress to sponsors

Let’s take control over your data management
We accelerate the goals of growth stage companies by providing the expertise and experience they need to hit their next stage of growth faster.