Pointe of View Blog

9 Evaluation Points to Assess Your Information Strength

By |September 26th, 2016|

 

Information Strength is a state of advantage achieved through, both strategic and tactical implementation of archiving best-practices, security protocols and governance policies that protect the value of your enterprise content and uphold the power and promise of information governance.  But why is it important?  It provides feedback to drive an understanding of your information […]

Build a Great IG Program on Small Successes @ ARMA Live!

By |September 23rd, 2016|

At Viewpointe our approach to information governance is consultative in nature so I invest in detailed discussion with both prospective customers and existing clients about the maturity and ongoing improvement of their IG programs.  There are a few progressive organizations but for the most part organizations are either beginning their program, restarting their program […]

Power Up Your Information Strength @ ARMA Live! 2016

By |September 22nd, 2016|

Connect with Viewpointe at ARMA Live! 2016 in San Antonio, TX. Plugin your device and relax in our charging lounge while you learn now to drive the power and promise of information strength with Viewpointe’s governance platform.  Stop by one of our sessions, our booth or our charging lounge at the San Antonio Convention […]

Future Proofing for the Check-pocalypse

By |September 8th, 2016|

I recently read yet another article predicting the end of the check. As a twist on this recurring topic, the author was trying to accurately calculate when the last check will process. The recurring and entertaining press coverage of the “check-pocalypse” is encouraged by our casual observation of individual consumer transactions. During a recent […]

Schedule a meeting with Viewpointe at MER

By |May 11th, 2016|

It’s that time of year again and we’ll be returning to The MER Conference in Chicago. Taking place May 23-25, MER is known as the premier conference that focuses on the complexities, key operational, technical and legal issues associated with managing the lifecycle of electronic records and information.

Attendees will have the opportunity to schedule private […]

ILTA 2016 Information Governance Survey

By |March 22nd, 2016|

Information governance is BIG.

And, not just in the sense of “big data” – it’s a big concept.  It’s such a broad concept, that it means many things to many people depending on the nature of the organization, the organization’s main business drivers, and a person’s role within the organization.

While “big” may be a simple […]

Trust in a Cyber World

By |January 20th, 2016|

The word “trust” is thrown around a lot in business. We trust our colleagues; we have partnerships built on mutual trust; vendors ask you to trust their products; and, you entrust critical business information to cloud service providers (CSPs).

So how do you decide who to trust? Well, the answer to that question is not […]

Does BYOL Exist and How Does it Help You?

By |November 10th, 2015|

Everyone is talking about moving to the cloud. It is safe to say that for most organizations it is no longer an option in this data driven world of ours.  What we’ve found working with our clients here at Viewpointe  is that the move to the cloud can make life a lot easier for […]

6 Monsters Hiding in Your Content…

By |October 30th, 2015|

Redundant, Out-of-date, Trash (ROT) content haunts your enterprise all year, not just in October.  That’s why it’s important to have defined policies that are applied to your content stores consistently 365 days a year, but Halloween is a great reminder to make sure any new content sources are properly governed and that policies are […]

5 Steps for Cybersecurity Success

By |October 27th, 2015|

Well-coordinated cyber attacks against American interests are increasing in number, frequency and sophistication, as are the costs to businesses related to such attacks. Sony Pictures, Home Depot, Anthem, Target Corp. and the U.S. Office of Personnel, to name just a few, have all been the target of recent cyberattacks.  The authority to regulate corporate […]