The market is saturated with out-of-the-box indexing tools that can search and classify networks in order to clean up aged data or migrate data with little business value to the cloud. However, when managing large enterprise class environments, these basic tools fail to scale and carry out needed functions and often utilize a flawed approach that results in corrupt metadata and failed results.
Index Engines is architected for large petabyte-class data center environments. Only Index Engines delvers true enterprise class indexing to support reporting, management and governance of large scale data centers.
Here is a comparison of the Index Engines platform versus other common file management tools..
|FILE MANAGEMENT TOOLS||INDEX ENGINES|
|SPEED||Slow network crawling using a single indexing stream. Indexing lOO's of TBs can take months.||Multi-stream approach can reach indexing speeds up to 1 TB/hour/node.|
|SCALABILITY||Cannot support data envirorunents larger tha11 50TB.||Supports data environments that scale to multipetabytes.|
|INTEGRATED ARCHIVING||No archiving capabilities, or limited to adding files to zip container.||Integrated archive of files allowing secure retention and access to native data as needed.|
|FEDERATION||No federated capabilities.||Federation nodes allows support for large scale, distributed environments.|
|PRIMARY & SECONDARY DATA||Supports network file system data only.||Supports all classes of enterprise data, from primary storage to backup and disaster recovery data sources.|
|ACTIVE DIRECTORY INTEGRATION||Does not integrate with Active Directo1y.||Integrates with Active Directory enabling search and reporting by group membership (i.e. All users in the legal department)|
|METADATA OR FULL CONTENT INDEXING||High level metadata indexing only.||Supports detailed metadata. as well as full text search to find sensitive content.|
|Pll AND PATTERN SEARCH||Does not support pattern search and reporting.||Find sensitive content containing social security, credit card or bank routing numbers and manage it based on policies.|
|MANAGING DUPLICATE CONTENT||Uses metadata such as location, file size/name and owner to define duplicates.||Customisable deduplication parameters that include MD5 hash/document signature technology to manage redundant content.|
|ACLS SECURITY||No support for document security.||Allows searc.h a11d reporting on file read/wiite/browse permissions (ACLs) to perfo1m security assessments.|
|EXTENSIVE SEARCH AND REPORTING||Limited search options and static repo1iil1g capabilities.||Comprehensive search an.d dynamic reporting for detailed classification and analysis.|
|DEFENSIBLE DISPOSITION||Co11upts metadata as data is migrated, often cha11ging owner to adrnin and modifying last accessed date.||Logs all activity including deletions and ensures all metadata is maintained and not corrupted or changed.|