It’s undeniable, data is growing, in leaps and bounds, andat an alarming rate – most customers are seeing a 60% or greater growth rate year over year. To put it in perspective -- every 60 seconds there are 98,000 new tweets on Twitter, 23,000 new apps download from the appstore, and 400,000 ad requests online. This barrage of information leads to the creation of data, it begs the question -- how do we intend to address the data protection new data when we can’t keep up with the old data? And data is not only growing, but it’s everywhere, in fact to address the data management issue -- most CIOs have the cloud as a key initiative on their business plan for 2012 and beyond. For many, it’s in their top 5 list of key areas of IT improvement. A move to cloud means that IT can lower CAPEX while it reduces OPEX by leveraging the capabilities of providers like yourselves to stream line their operation, lower overhead and improve their service levels.And for many companies -- mobility has emerged as a key business enabler, today over 80% of the Fortune 100 are deploying or planning to deploy tablet based computing platforms, and most key employees have already been operating as mobile users for years.As a result of this disruptive change in the way we access and create information, new issues related to how we handle data protection and security have surfaced as well, recognizing that laptops, smartphones and tablets are susceptible to threats such as data loss, viruses and hacking.The typical IT organization is mandated to comply with very strict security regulations to ensure that the data accessed by these devices is protected. This is in addition to the traditional needs of the IT enterprise, related to managing the growth of information within the corporate data center. Many IT organizations are seeking better ways to manage information while they lower the total cost of ownership. With the advent of cloud based data protection, IT can reduce their management burdens, while they provide the highest levels of data protection possible. In addition, advanced services such as archiving, eDiscovery and Legal Hold can be leveraged within this data estate to provide greater accountability to the business. Bottom line, IT needs your help, they can no longer go it alone, and the job is just too big. That is why customers have turned to Autonomy. The net net is that your customers are experiencing a growing IT burden and their data is potentially at risk.
To begin, let’s look at ControlPointMain point: As a potential first step into information governance, ControlPoint helps organizations meet these core goals. Leveraging IDOL and Autonomy connectors, ControlPoint will allow your organization to know exactly what information you have, where it is located, ensure security of that information and enforce policy against it.