How IT Can Shine a Light on Dark Data

How IT Can Shine a Light on Dark Data
It’s time to bring the security issues of dark data into the light.
Today’s IT managers are facing increasing pressure to manage a growing stockpile of “dark,” unstructured data. Comprised of human-generated files (think spreadsheets, presentations, PDFs, Word documents, etc.), dark data is often where an organization’s most sensitive information resides.

How can your business protect its unstructured data? It starts with IT leadership that puts a priority on unstructured data.

Examples of Dark Data
Jonathan Sander, Strategy & Research Officer for STEALTHbits, shared in a recent CIO article that 80 percent of all data in any organization is unstructured. Within that unstructured data, nearly 100 percent of an organization’s sensitive information is contained.

The low-hanging fruit of the dark data world is most often the terabytes of personal .PST files from employees’ email applications. These files can consume massive amounts of storage resources—and often contain secure information. IT should be responsible for putting processes in place for monitoring and deleting .PST files and personal archives.

Leveraging more sophisticated analytics and data tools and processes can improve (and minimize when necessary) legacy data use cases. Clustering techniques, for example, can help visualize dark data content patterns and identify application and policy development groupings.

Data Mapping: The Importance of Visibility
In order to monitor the security of your network, IT departments need to gain visibility into all of the enterprise’s current data repositories and systems. This process usually begins with creating a data map, which outlines all of the existing repositories within the network. This initial mapping is key when IT is identifying the right levels of security, and the mapping exercise can save weeks of lost time, costs and productivity.

Process Makes Perfect
Once an accurate view of the network is established, IT should set up ongoing processes that allow secure management of the data inventory and other information assets. There are plenty of analytics and business intelligence tools available to extract value from the data, once you’re down that path. But with regard to security, this stage is when access control plays a big role. Ensure that the right team is in place to delegate controlled access across the company. This process not only helps all parts of the organization minimize compliance risks, but may also help departments gain more insight from data they didn’t know they had under their jurisdiction.

Learning to Manage Dark Data
Dark data management is still a newer discipline in the IT world, and the technology is moving fast. But IT professionals need to work across departments within the business to prioritize security and recognize that today’s enterprises require a unified view of structured and unstructured data. Putting the right processes in place to streamline workflows and keep information secure is where the real ROI lies.

Is your business ready to start optimizing its information? We can help. Learn more at www.stratixsystems.com or call us toll-free 1-800-444-2943

About Stratix Systems
With offices in Reading, Lehigh Valley, Philadelphia and Central and Northern New Jersey, Stratix Systems is one of the region’s leading technology solutions partners —with the people, resources and experience to deliver the IT, content/document management and imaging support you need: where, when and how you need it. In fact, very few providers in the region can match the vast array of total business solutions and responsive service available from Stratix Systems. It’s no wonder why we are the partner-of-choice for over 4,500 organizations throughout Eastern Pennsylvania and New Jersey.

Have a question? Get an answer. Our experienced systems experts would be happy to answer your questions, help you explore your options and develop a customized plan for you. Learn more at www.stratixsystems.com or call us toll-free 1-800-444-2943.

This post originally appeared on WorkIntelligent.ly, authored by Ricoh USA’s George Dearing.

Scroll to Top