Thursday, July 21, 2011

Data Archiving: If it is worth saving, it is worth protecting.

IBM Smart Archive Strategy utilizes tiers of security.  One of the more important features of the information archive is the three levels of information protection, which coincide with the collections architecture. 


As reported in IBM System’s Magazine (July 2011), One of the benefits of this collection architecture is you can assign the protection level for each collection according to your information protection requirements.

Basic protection level:
·         Documents can be deleted before the expire.
·         Retention periods can be increased and decreased.
·         Documents with an extended retention period due to a retention hold can be deleted.
·         IT administrators can change the document protection level at any time.

Intermediate protection level:
·         Documents with an extended retention period due to a retention hold can’t be deleted.
·         Administrators can change the document protection option to maximum at any time, but can’t lower it to basic.
·         After the retention period expires, elements within the collection can be deleted, but the collection itself is permanent so new documents adhering to the same requirements can be added.

Maximum protection level:
·         Documents can’t be deleted until the end of their retention period.
·         Documents with an extended retention period due to a retention hold can’t be deleted.
·         Document retention periods can be lengthened but not shortened.
·         After enabling maximum protection, administrators can’t modify the document protection option to another level.
·         The collection can never be deleted.

IBM information archive also offers and enhanced tamper protection feature, which is important for customers with very strict retention requirements.  With this technology the administrator can remove root access so nobody, with malicious or non-malicious intent, can affect archived information.  This optional feature can be enabled at the customer’s discretion, but once enabled, it remains for the duration of the system’s life.


Why is all this important?  Because, if it is worth saving, it is worth protecting.  Dolvin works with enterprises to help them define and implement the right solution for their challenges.  Contact us today for an evaluation.

No comments:

Post a Comment