Gå til hovedinnhold

GDPR & PST Flight Deck

Quadrotech Solutions (Fargo)

With GDPR now in place, can your organization afford to continue ignoring PST files?

Our PST migration solution helps you upgrade your PST files and achieve GDPR compliance. The tool finds PST files throughout your environment, accurately reports where they are and who owns them, and securely moves their contents to Office 365 archives – so that your organizational retention and data management policies can be applied. As part of the upgrade process, you can even filter which data items are imported, to avoid moving unwanted junk content into your managed environment.

PST files are a business-wide problem. While the following issues are not necessarily exclusive to a particular area of the business, these roles are often directly impacted by the use of PSTs:

IT Team

  • PST files can be located in many places within your IT infrastructure, e.g., local hard disk, removable storage (USB drive) – this makes them difficult to back up or restore.
  • PST files can be very difficult to identify and collect during e-Discovery – especially in a user-friendly manner.
  • PST files can easily become corrupted, locked, or lost leading to IT intervention – which is a difficult process, wasting time and resources.
  • There is no automated way to easily or effectively determine the owner of a PST file located on a shared network drive

    HR or Legal Department

  • PST files are not discoverable in an online system during e-Discovery. This means that they have to be collected every time, delaying or obstructing requests or procedures of this kind.
  • Sensitive or confidential data that may be stored in PSTs is extremely problematic. These files can be shared, deleted or moved from one network to another, with little to no visibility.
  • PST files are a significant risk to your GDPR compliance effort, as the data is usually unmanaged, unaudited, and is not under retention policy control.
  • No one is ever confident that all of a user’s PST files have been found. There could always be more on the network, in an unknown location, or an area of the local PC/MAC not scanned.

    Security and Compliance roles

  • As PST files cannot be managed or governed centrally, it is almost impossible to meet governance or compliance regulations – like GDPR.
  • These files are not visible, or easily discoverable on central IT systems. It is very difficult to find out how many PST files exist across the organization.
  • PSTs can be password protected, but it doesn’t mean they’re secure or encrypted. The file type is extremely vulnerable to hackers, malware, and ransomware. Remember the Sony hack in 2014? Yep, you guessed it – PSTs were the source.
  • They’re highly portable and can be copied without the owner (or IT) realizing, which presents a huge data leakage risk.

    For additional information please visit our website

  • http://store-images.s-microsoft.com/image/apps.20540.db4e1d93-46e2-49b9-8c2e-3b8cd4f39a23.c66c4a8d-5f4d-4542-b685-c7fb8e7d3b9d.bf2e6b84-ed66-449c-b7bc-a1a9265a640f
    /images/videoOverlay.png
    http://store-images.s-microsoft.com/image/apps.20540.db4e1d93-46e2-49b9-8c2e-3b8cd4f39a23.c66c4a8d-5f4d-4542-b685-c7fb8e7d3b9d.bf2e6b84-ed66-449c-b7bc-a1a9265a640f
    /images/videoOverlay.png
    http://store-images.s-microsoft.com/image/apps.22346.db4e1d93-46e2-49b9-8c2e-3b8cd4f39a23.c66c4a8d-5f4d-4542-b685-c7fb8e7d3b9d.49d28ba6-6909-4ca2-8637-437a63cd6d76
    /images/videoOverlay.png
    http://store-images.s-microsoft.com/image/apps.45622.db4e1d93-46e2-49b9-8c2e-3b8cd4f39a23.c66c4a8d-5f4d-4542-b685-c7fb8e7d3b9d.1a034926-f113-42b7-acaa-8f8785584af0
    /images/videoOverlay.png
    http://store-images.s-microsoft.com/image/apps.29217.db4e1d93-46e2-49b9-8c2e-3b8cd4f39a23.c66c4a8d-5f4d-4542-b685-c7fb8e7d3b9d.28163af2-743d-4864-8296-c748e706c4b9
    /images/videoOverlay.png
    http://store-images.s-microsoft.com/image/apps.37681.db4e1d93-46e2-49b9-8c2e-3b8cd4f39a23.c66c4a8d-5f4d-4542-b685-c7fb8e7d3b9d.b05bfe1c-f6c6-4b41-91d4-6e451a6a7009