Webinar banner

Defensible Deletion of User Data
Purge obsolete data, recoup capacity and manage long-term risk

IT organizations have been stockpiling unstructured user data for decades. Massive servers of unmanaged user data, network filers and even legacy backup tapes all contain many copies of aged data that no longer have business value. Industry analysts claim that anywhere from 40-70 percent of what exists on corporate networks can be defensibly purged. Not only is this content taking up valuable space, but it can also become a liability if not properly managed.

Defensible deletion manages long-term liability of this content and enables sensitive user data to be discovered and either archived or remediated according to data governance policies. This is a proactive strategy done in advance of litigation by systematically deleting what has no value before it can be exposed, misinterpreted or breached outside the firewall. At the same time, sensitive documents that have business value are secured according to compliance policies.

Index Engines maintains logs of all disposition activity - including data deletion - that detail the date and disposition of the file including the user that executed the disposition. This enables secure and auditable execution of defensible deletion policy.


  • Purge Sensitive Copies: Aged contracts and research languish on networks and have not been accessed in many years.
  • Restrict Access: Sensitive working documents that are no longer required for business purposes often end up in the wrong person’s hands creating a corporate liability and media frenzy.
  • Mitigate Risk: Files and email from ex-employees easily become a burden to any firm if kept online for anyone to discover.