Pointe of View Blog

Keeping Up With The Changing Digital Economy

By |June 7th, 2017|

Core. Collaborate. Delegate. (Part 1 of 3)

By Elizabeth Albee

Is Your Enterprise Data Strategy Keeping Up with the Changing Digital Economy?

Pop quiz: A researcher—or maybe an analyst or a paralegal—approaches your department with 2 TB of data they need to house for immediate access. What do you do?

We’ve all been there. The options are often not […]

Modernization – Is your legacy foundation crumbling?

By |April 3rd, 2017|

As the latest enterprise initiatives strive for improved user experience, cohesive mobile interactions, virtual assistants and advanced automation, most large enterprise organizations today are forced to paint a thin shiny coat of veneer over underlying legacy systems in an effort to keep pace.  The effort and expense of addressing the age and girth of […]

9 Evaluation Points to Assess Your Information Strength

By |September 26th, 2016|

Information Strength is a state of advantage achieved through, both strategic and tactical implementation of archiving best-practices, security protocols and governance policies that protect the value of your enterprise content and uphold the power and promise of information governance.  But why is it important?  It provides feedback to drive an understanding of your information […]

How to Build a Great Information Governance Program

By |September 23rd, 2016|

At Viewpointe, we like to advise our customers to build their information governance (IG) program on small successes. Our approach to information governance is consultative in nature so I invest in detailed discussion with both prospective customers and existing clients about the maturity and ongoing improvement of their IG programs.  There are a few […]

Future Proofing for the Check-pocalypse

By |September 8th, 2016|

I recently read yet another article predicting the end of the check. As a twist on this recurring topic, the author was trying to accurately calculate when the last check will process. The recurring and entertaining press coverage of the “check-pocalypse” is encouraged by our casual observation of individual consumer transactions. During a recent […]

ILTA 2016 Information Governance Survey

By |March 22nd, 2016|

Information governance is BIG.

And, not just in the sense of “big data” – it’s a big concept.  It’s such a broad concept, that it means many things to many people depending on the nature of the organization, the organization’s main business drivers, and a person’s role within the organization.

While “big” may be a simple […]

Trust in a Cyber World

By |January 20th, 2016|

The word “trust” is thrown around a lot in business. We trust our colleagues; we have partnerships built on mutual trust; vendors ask you to trust their products; and, you entrust critical business information to cloud service providers (CSPs).

So how do you decide who to trust? Well, the answer to that question is not […]

Does BYOL Exist and How Does it Help You?

By |November 10th, 2015|

Everyone is talking about moving to the cloud. It is safe to say that for most organizations it is no longer an option in this data driven world of ours.  What we’ve found working with our clients here at Viewpointe  is that the move to the cloud can make life a lot easier for […]

6 Monsters Hiding in Your Content…

By |October 30th, 2015|

Redundant, Out-of-date, Trash (ROT) content haunts your enterprise all year, not just in October.  That’s why it’s important to have defined policies that are applied to your content stores consistently 365 days a year, but Halloween is a great reminder to make sure any new content sources are properly governed and that policies are […]

5 Steps for Cybersecurity Success

By |October 27th, 2015|

Well-coordinated cyber attacks against American interests are increasing in number, frequency and sophistication, as are the costs to businesses related to such attacks. Sony Pictures, Home Depot, Anthem, Target Corp. and the U.S. Office of Personnel, to name just a few, have all been the target of recent cyberattacks.  The authority to regulate corporate […]