Welcome!

@DXWorldExpo Authors: Elizabeth White, Yeshim Deniz, Liz McMillan, Pat Romanski, William Schmarzo

Related Topics: @DXWorldExpo, @CloudExpo, Cloud Security

@DXWorldExpo: Blog Post

What to Do with All of That Data By @LilyTeplow | @BigDataExpo #BigData

Most businesses don't have appropriate archiving and retention policies in place

What to Do with All of That Data: Retention Best Practices
by Lily Teplow

Imagine for a moment that you have three doors in front of you containing the data your clients have backed up. Behind door number one lies a complicated clutter of data, various files, and unidentifiable information. Behind door number two you have a data desert, with little or no available information. Finally, behind door number three is a perfectly organized system of saving exactly what is needed and disposing of what isn't. I'm guessing if you had the choice, you'd probably choose door number three, but unfortunately most businesses get stuck with doors one and two.

The challenge surrounding data retention today is that most businesses don't have appropriate archiving and retention policies in place. As an MSP, this means you can be your clients' strategic advisor and help them understand exactly what their retention requirements are for various business needs and data types. Get started, and use these tips to help ensure your clients' data is secure, replicated and accessible when needed.

What to Do with All of That Data: Retention Best Practices

When establishing data retention policies for your clients, here are some key points you should consider. Remember that not all data is created equal - the first step in establishing appropriate retention policies for your clients is to determine which data actually needs to be archived, and for how long.

Step 1: Classification
To strike a balance between what's optimal for your clients' business needs vs. cost effectiveness, ask these questions before classifying or deleting data.

  • Is the information in question critical for the clients' business operations?
  • Would the information be considered a permanent document of any kind?
  • Is the data considered proprietary intellectual property?
  • Is the data required for fulfilling any business service level agreements (SLAs)?
  • Does the data reflect current, legitimate and useful business information or needs?

Data that fits none of these criteria may be suitable for deletion.

Most data is generally retained for twelve months, with a very small percentage needing to be retained after that time period. Assess value and risk before deleting anything, and take into account cost and storage requirements when choosing to keep anything else. There should be no arbitrary or ambiguous data - everything must be accounted for.

Step 2: Compliance
There is a hierarchy to follow when determining which data must be stored. Ensure data retention policies align with any of the following compliance or regulatory restrictions:

Regulatory compliance - whether it's HIPAA, FINRA, PCI, or other regulatory concerns, know your customers' verticals, and know the law. What data must be kept (and for how long) can vary significantly from one industry to the next.

Legal concerns - retain any and all data that could be subject to legal discovery or would be needed in legal action should it arise.

Step 3: Deletion
Once you've identified data that no longer serves any useful purpose, there's more to do than simply emptying the desktop recycle bin. Set expiration dates for ALL client data when establishing retention policies (unless it is designated to be retained in perpetuity). When data has exceeded the retention limits, it should be deleted immediately.

Finally, data that is retained must be data that is accessible. Choose a fast and searchable archival method to access data and determine what frequently-used data (if any) should be kept "live" outside of archival applications.

Read the original blog entry...

More Stories By Continuum Blog

Continuum is the technology industry's only channel-exclusive provider of fully integrated managed IT services, allowing its Managed Services Provider (MSP) partners to maintain both on premise and cloud-based servers, desktops, mobile devices and other endpoints for small-and-medium-sized businesses. For more information, visit http://www.continuum.net/ or follow us on LinkedIn and Twitter @FollowContinuum.

DXWorldEXPO Digital Transformation Stories
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, will outline ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and...
Today, we have more data to manage than ever. We also have better algorithms that help us access our data faster. Cloud is the driving force behind many of the data warehouse advancements we have enjoyed in recent years. But what are the best practices for storing data in the cloud for machine learning and data science applications?
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
As Cybric's Chief Technology Officer, Mike D. Kail is responsible for the strategic vision and technical direction of the platform. Prior to founding Cybric, Mike was Yahoo's CIO and SVP of Infrastructure, where he led the IT and Data Center functions for the company. He has more than 24 years of IT Operations experience with a focus on highly-scalable architectures.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.