Data Insight

Unstructured data governance

Download the Data Sheet

Unstructured data analytics

Holding users accountable for file usage and security.

You see a growing sense of urgency to gain control of costs associated with storing and maintaining information along with a need to reduce the compliance and security risks. But where do you start? Most of the information is dark data,—no one really knows who the owner is and whether it’s business relevant or not.

Veritas Data Insight helps organizations improve unstructured data governance to reduce costs, reduce risk, and achieve compliance through actionable intelligence into data ownership, usage, and access controls. The reporting, analytics, and visualization capabilities in Data Insight give organizations an understanding of what data exists, how it is being used, who owns it, and has access to it. With Data Insight you can: 

  • Automate governance through workflows and customization
  • Drive efficiencies and cost savings in your unstructured data environment
  • Maintain regulatory compliance for information access, use and retention
  • Protect confidential information from unauthorized use and exposure

Manage Dark Data

Curbing unstructured data growth

Gartner discusses how information managers can effectively manage data growth and security

According to Gartner, organizations are realizing that 30% of their data is redundant, outdated, or trivial, yet they continue to store, maintain, and manage this information in perpetuity. This behavior is costly, risky, and time-consuming.  If you’re thinking about changing your data hoarding behavior, Gartner has some recommendations for you in this paper. 

Read the Paper

File security and governance are synonymous

Veritas Data Insight and Symantec Data Loss Prevention

Protecting unstructured data against loss and misuse is a vital component to a data governance program. With the intuitive web-based interface in Data Insight, you can understand who is accessing data and how often they are accessing it for the purpose of investigations. The Data Insight data use policy alerts help identify anomalous user activity or irregular activity on sensitive data.

Data Insight integrates with Data Loss Prevention to discover sensitive data, identify data owners, and understand permissions and detailed access history to enable an effective data protection process. Data Loss Prevention can assess which folders are at greatest risk and supports automated user notifications to facilitate data cleanup.

Download the Data Sheet

Monitor access compliance

Not everyone should access everything

Organizations need to remain compliance on data use and entitlement policies driven by external regulation as well as internal audit.

Data Insight creates a detailed audit trail of who accessed which data and when changes were made to help organizations document confidentiality and integrity of data access for compliance. Data Insight identifies data owners and custodians that need to be engaged for policy and compliance efforts. Leveraging the data ownership identification and access permissions visibility, Data Insight can automate the process of user access or entitlements review—a requirement for regulatory compliance. Its flexible query interface can be used for business process integration and third-party application and workflow support.

Data governance effort nets customer ISE Award

Data governance effort nets customer ISE Award BNY Mellon Wins with Data Insight Project

BNY Mellon won a prestigious industry award, the Information Security Executive (ISE) North America Project of the Year in the Commercial Category, with the use of Data Insight for their unstructured data governance project. By implementing Data Insight, BNY Mellon’s Risk and Compliance Group was able to develop a governance process to provide security and user access certifications over high risk data stored in network shared drives, which are scrutinized by regulatory agencies, as well as external and internal auditors. 

Read the Story

Defining information risk

Expose the risk hidden in your data

Organizations move application workloads from one operating system platform to another for multiple reasons, including lower costs and better operating system performance. However, an operating system migration is often a tedious and time-consuming project that typically requires an application outage, which could result in lost revenue or employee productivity. InfoScale Storage addresses these challenges by making the same set of data accessible to UNIX and Linux operating systems while keeping applications available. With Portable Data Containers, administrators can export data from one operating system and import it on another in minutes, without ever creating a copy or moving the data, resulting in less downtime.

Download the White Paper

Targeting user risk

Data Insight 5.0 focuses on users

The latest version of Data Insight introduces features that enable data governance by giving you greater insight and control over your data.  It focuses on a user-centric lens for unstructured data—enabling administrators to monitor and track the file activity, access, and behavior trends of particular employees. In addition, access permissions search and tracking provide insights for access risks and compliance.  

Download the Data Sheet

Investigate behavioral risk

What if you knew that on average your employees read 10 files a day and then noticed a particular employee suddenly read 10,000?  That might be cause for concern. Anomalous behavior can often be benign, but in some cases it is an indication of employees, vendors, or contractors acting in a malicious—or at the very least suspicious—manner. Big data analytics in Data Insight provide the power and process for advanced anomaly detection on a big-data cluster.  Administrators can capture file and user activity for billions of actions and use big data capabilities to create trend lines and identify strange 

Automated file governance

Don’t let information risk destroy your company

Simplify the decision-making process associated with growing unstructured data. Veritas provides an integrated File Governance solution to help organizations assess the value of their information assets and execute decisions regarding information protection and deletion. 

Veritas delivers File Governance through native integration of Data Insight and Enterprise Vault File System Archiving (i.e., EV FSA).  You can realize the most value from this solution by leveraging Data Insight to classify your information based on ownership, age, and access.  Upon classification, you are able to analyze your file system characteristics and develop policies for eliminating waste and reducing risk through multiple use cases. 

  • Data Classification for Retention and Retrieval: Identify what should be kept, for how long, and what should be defensibly deleted
  • Data Center Migration: Locate sensitive data and provide additional protection during migrations
  • Backup Window Remediation: Eliminate stale data to reduce overall volume for backup
  • File System Discovery: Cull outdated files from discoverable sources and improve review speeds 
  • User Access Permissions: Identify permissive shares and lock down sensitive information   
  • Establish Departmental Chargeback: Evaluate departmental storage spend and drive accountability

Download the White Paper

Govern unstructured data chaos into clarity

Introducing the InfoScale family of solutions

Of all data that organizations store, 69% contains no legal, regulatory, or business value, and 52% of corporate information that requires protection is not currently protected.

Without a proactive approach to understanding what you have, where it is and what kind of value is associated with it, the risk that is hiding in your data could destroy your company.  Watch the video to see what we mean. 

Learn more about Data Insight


Looking for more information? See our library of data sheets, white papers or videos.

Learn More


Trying to decide if this product fits your needs? Read system requirement details before installation.

Learn More


Wondering how agents can help? Learn how agents can optimize for application or database workloads.

Learn More