SOUTH AFRICAN PORT AUTHORITY SELECTS AUTONOMY FOR INTELLIGENT BACKUP
Southern Africa's Largest Port Authority Protects Critical Data with Connected Backup
CAMBRIDGE, England, and SAN FRANCISCO – June 19, 2012 – Autonomy, an HP Company, today announced that Transnet National Ports Authority (TNPA) has selected Autonomy's intelligent mobile backup solution, Connected Backup, to protect vital information across the group.
TNPA is one of five operating divisions of Transnet SOC Ltd, a state-owned enterprise in South Africa, responsible for the safe, effective and efficient economic functioning of the national port system. It provides port infrastructure and marine services at all eight commercial seaports in South Africa and is the biggest port authority on the African continent in terms of the cargo volumes it handles.
TNPA selected Autonomy's Connected Backup solution from local Autonomy Data Protection partner, Altonet, to enable intelligent, automated and secure backup for more than 1,800 laptops and desktops across all eight of its port sites.
Autonomy Connected Backup automatically and securely saves vital data in the background while users work. It backs up incremental changes in data and new documents, reducing the time, size and complexity of backups.
According to TNPA, Connected Backup stood out in the selection process for its proven scalability and single-platform approach, as well as its unique deduplication and email optimization capabilities when backing up local Microsoft® Outlook PST files. TNPA chose Autonomy because of its leadership in the corporate PC backup market and its proven track record for protecting its customers' data worldwide.
"Autonomy Connected Backup lets us keep our critical information safe, helping to preserve productivity where previously we would have faced data loss," said Ian Du Preez, senior manager, Enterprise Architecture, TNPA. "As a logistics-driven organization, time is of the essence. We can't afford to waste time from files being lost, and Autonomy's solution gives us short, efficient, centrally managed backups that don't occupy our users and provide a robust set of tools and rich functions to recover data."
Prior to selecting Autonomy Connected Backup, TNPA's users were required to manually save their valuable data, an inefficient and unreliable process that presents risk of data loss if laptops are lost, hard drives fail, or a user inadvertently deletes a file. Connected Backup also offers extended capabilities for eDiscovery and data analytics with Connected Classify and Collect. This is offered on the same single platform, and would support TNPA for vital compliance and reporting functions. The ability to easily extend the deployment of Autonomy's technology in this way was another key reason TNPA selected the solution.
"As hardware gets smaller and employees are more mobile, devices can be more easily lost or stolen, and hardware can fail at any time," said David Jones, chief executive officer, Data Protection, Autonomy, an HP Company. "Autonomy's technology allows organizations to intelligently protect their critical information, with minimum impact on the user and IT infrastructure."
Autonomy's data protection solutions provide the marketplace with a unique offering, based on the ability to understand the context of unstructured, human information - such as social media, video, images, audio and email. Traditional data protection approaches are unable to understand the ideas and concepts expressed in the burgeoning volumes of big data. By contrast, once information is indexed by the Autonomy Intelligent Data Operating Layer (IDOL), the solutions can automatically identify and prioritize how information is protected, and the data can be accessed and applied to a wide array of cloud-based solutions, including archiving, eDiscovery, information governance and revenue optimization.
About Autonomy
Autonomy, an HP Company, is a global leader in software that processes human information, or unstructured data, including social media, email, video, audio, text and web pages, etc. Autonomy's powerful management and analytic tools for structured information together with its ability to extract meaning in real time from all forms of information, regardless of format, is a unique tool for companies seeking to get the most out of their data. Autonomy's product portfolio helps power companies through enterprise search analytics, business process management and OEM operations. Autonomy also offers information governance solutions in areas such as eDiscovery, content management and compliance, as well as marketing solutions that help companies grow revenue, such as web content management, online marketing optimization and rich media management.
HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. The world's largest technology company, HP brings together a portfolio that spans printing, personal computing, software, services and IT infrastructure to solve customer problems. More information about HP (NYSE: HPQ) is available at http://www.hp.com/.
Microsoft is a U.S. registered trademark of Microsoft Corporation.
Summary: ...times, regardless of its location. TNPA selected Autonomy’s Connected Backup solution from local Autonomy Data Protection partner, Altonet, to enable intelligent, automated and secure backup for more than 1,800 laptops and desktops across all eight of its port sites. Autonomy Connected Backup Autonomy...
Summary: ...tape backup solution. The company is also able to centrally manage distributed PC data and assure automated efficient backups without user intervention with Connected Backup. This has resulted in a reduction of storage needs by up to 90%. In addition, end-users can now retrieve their own lost or damaged...
Summary: ...by more than 80% after implementing Connected Backup. “The solution support provided by Autonomy has been extremely effective, with the company adhering to agreed SLAs and responding to any queries very promptly” said the IT Manager. “As an organization, we did not like relying on laptops, due to...
Summary: ...them with finding a better backup solution. “We preferred a solution that allowed central administration of all backups, while sending the data off-site for security,” says Sami Karachi, Technology Consultant Manager. Ideally, the backup solution would allow users to save their data quickly whenever...
Summary: ...backup solution that could manage Roundarch’s data protection process and eliminate on-premise infrastructure costs. The Solution After a quick proof of concept, Roundarch selected Autonomy Connected® Backup and LiveVault® solutions for cloud-based data protection. Marshall had worked with these solutions...
Summary: ...to its operations, product development, or services delivery Approach Implement a centralized data backup solution that automates the backup of production systems every 30 minutes, along with less-frequent backups of less-critical data IT improvements • Company has never once lost data due to failed...
Summary: ...including social media, email, video, audio, text and web pages, etc. Autonomy's powerful management and analytic tools for structured information together with its ability to extract meaning in real time from all forms of information, regardless of format, is a unique tool for companies seeking to get...
Summary: ...CSO Benefits from Autonomy Capture Intelligent Documents - Case Study. So, there’s quite a saving and we’ve eliminated the need to outsource data entry or deploy additional CSO staff.” said O’Reilly. Inpute’s implementation of Teleform has also meant significant time savings in terms of staff...
Summary: ...social media, email, video, audio, text and web pages, etc. Autonomy's powerful management and analytic tools for structured information together with its ability to extract meaning in real time from all forms of information, regardless of format, is a unique tool for companies seeking to get the most...
Summary: ...be impacted if we lost data. It is critical that backups occur regularly.” CPS Energy follows industry best practices for its backup processes, using HP Data Protector to perform backups to tape of the utility’s production systems up to eight times per day—more often for large production systems...
Summary: ...officers have the same access to vital data while on the beat. This has created huge efficiency savings across the force in the region of £4-5 million. These massive savings have helped fund new crime fighting initiatives, enabling South Yorkshire Police to reduce burglaries by 21.7%, and bring robberies...
Summary: ...needs. For example, it must ensure the integrity of its systems through continuous data back-up of its ERP and enterprise portal data. It needs to enable continuous operation of its business systems through high fault tolerance. Dongkuk addressed these needs through a dual back-up architecture using HP...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...backup allows organizations to apply intelligent legal hold policies against an enterprise’s full corpus of data, whether it lives on the network server or an employee’s remote laptop. Meaning Based Data Protection dramatically reduces the time and faults traditionally associated with executing legal...
Summary: ...backup allows organizations to apply intelligent legal hold policies against an enterprise’s full corpus of data, whether it lives on the network server or an employee’s remote laptop. Meaning Based Data Protection dramatically reduces the time and faults traditionally associated with executing legal...
Summary: ...custodian data on mobile, laptop, and desktop systems in an efficient, repeatable, and auditable manner. Access, Protect, and Manage Mobile Data Autonomy Connected Backup® Mobility brings the key capabilities of Autonomy Connected Backup, the number one endpoint data protection product, to popular mobile...
Summary: ...associated with executing legal hold on laptops and desktops. Autonomy Connected Backup® solution’s ability to create and maintain a centralized backup that is representative of data stored on large numbers of mobile laptops and distributed workstations data can be extremely powerful when leveraged...
Summary: ...routine preservation efforts. Autonomy’s unique approach ensures data is preserved even when the machine is not connected to the network, reducing the risk of spoliation. Laptop and desktop collections utilize a compact agent that runs transparently and applies legal hold policies against relevant data...
Summary: ...Web Management Portal, organizations can manage and monitor the entire data protection workflow including backup, offsite storage, and recovery anytime, anywhere. Organizations can create customized easy to use, yet powerful, backup policies, check status, delegate responsibilities across the enterprise,...
Summary: ...centers are Safe Harbor-certified, and audited to Statement of Accounting Standard number 70 (SAS 70 Type II). All protected data is mirrored across multiple data center locations and resides in a secure multitenant scalable data protection cloud service. With Cloud Backup, you get freedom and flexibility...
Summary: ...and recovery, Autonomy Connected® Backup ensures secure, fast, efficient, automatic backups without IT intervention. Mission-critical information is protected—no matter where it resides in the enterprise. Today over four million corporate users rely on Connected Backup to protect and provide access...
Summary: ...email, text messages, documents, voicemail, social media content, audio recordings and video. Leveraging petabyte scalability and intelligent clustering, information is analyzed to identify patterns between seemingly unrelated information, enabling attorneys and compliance officers to conduct investigations...
Summary: ...daily backup chore, LiveVault enables organizations to save time on backup and recovery in virtual and physical environments. Additional advantages include: • Selective backup and restore of specific files • No Impact from migrations of virtual machines from one physical host to another • Get up...
Summary: ...applications in smaller organizations or at the edge of the enterprise. In this case, the applications and the backup are contained on a single server. A portion of the disk is partitioned for the software store. Data Protector then delivers deduplication, policy-based backup, and automation for very...
Summary: ...to disable a remote Active Folder if authentication is not received, for example, in the case of a stolen or lost laptop. About Autonomy Autonomy, an HP Company, is a global leader in software that processes human information, or unstructured data, including social media, email, video, audio, text and...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...that must be met for social media compliance. The use of social media sites to communicate, market and conduct business has heightened governance and eDiscovery for many organizations. Best Practices for Cloud-Based Information Governance 5 Data Protection in the Cloud Autonomy Connected Backup – Organizations...
Summary: ...data sources. Collected data is sent to a tamper-proof container with a complete audit trail to manage hash values, file path information, and document authenticity. The ALH Remote Forensics feature is able to search at the sector level, offering protection against lost data with an ability to retrieve...
Summary: ...protection requirements—and better align their selection criteria with their productivity and strategic business goals. Introduction Increasingly, the information required to run a business resides on the hard drives of desktops, laptops and other mobile devices, not just on servers in data centers....
Summary: ...LiveVault 1 Executive Summary Today, more companies than ever recognize the value and convenience of using cloud backup to protect their server data. However, enterprises considering cloud backup for protecting their vital data face these security concerns: • Could an unauthorized individual gain access...
Summary: ...data protection for critical file data, which allows you to gain access to a scalable pool of cloud-based backup storage resources. These capabilities help you to meet both backup and recovery requirements for offsite protection, as well as disaster recovery for file data residing on the HP StoreEasy...
Summary: ...define the annual cost of the time spent supporting a distributed workforce. This should include tasks such as tracking missing backup windows, troubleshooting failed backup jobs, monitoring performance and tape utilization, and compressing recovery requirements. The following support cost categories...
Summary: ...email volumes – redundant data storage, rising mail server costs, excessive backup activity, high administration costs, out-of-control discovery expenses, and lost end-user productivity. Most important, they deliver clear savings to organizations that deploy this software. Here’s how these solutions...
Summary: ...metadata to ensure document authenticity. • Secure, password-protected collection: Autonomy extracts preserved data via a secure, encrypted connection from desktops, laptops, and almost all enterprise data sources. Collected data is sent to a tamper-proof repository, the drop-zone, where it is indexed...
Summary: ...With cloud backup, you can stay ahead of the game. Cloud server backup services enable you to automatically move your data off-site to a secure facility — a requirement for many industries. As privacy and records retention regulations take effect, cloud backup offers protection that traditional onsite...
Summary: ...from seaports and inland container terminals to rail container terminals. Automation within Virage CSM removes the need for costly additional manual input and makes the identification, tracking, control and management of logistic processes highly efficient. A unique combination of core technologies and...
Summary: ...Leveraging the scalability, connectivity, search and analytics capabilities of IDOL, ACA provides an infrastructure capable of ingesting terabyte volumes of information. IDOL Connector Framework for a Unified View With the IDOL Connector Framework, ACA allows organizations to form a unified view of all...
Summary: ...Unchecked growth from duplicates • Backup expenses • Data conversion to ensure data is readable over time Key Regulations Rules and regulations drive the need for sound information governance practices. Here are a few examples: • Dodd–Frank Wall Street Reform and Consumer Protection Act • FINRA...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.