Overview


Phoenix provides a better approach to digital asset management. Instead of managing separate storage and archiving solutions for videos, backup data, reference data, regulatory data, archive data, and others, Phoenix presents a federated secondary tier of data storage that can comprise the Windows, Mac, and Linux computers already implemented in your network.

Phoenix Components

Phoenix comprises several components. Ingest & Video Capture Tools identify eligible data and videos, and send them to the Information Repository. Context and content metadata is also extracted and captured. Once ingested, policies that manage the stored information throughout its lifecycle are deployed. Search & eDiscovery Tools are used to locate specific data objects, or to discover all information relevant to a particular subject, and make them available for retrieval. The Application Program Interface (API) is a set of tools that enable Phoenix to be tightly integrated with an OEM's product set. At the heart of the solution is the Information Repository, a federated tier of managed storage.

Federated Architecture

Phoenix components are flexible constituent units that have the ability to pursue autonomous strategies and independent processes. However, the centralized management console enables Phoenix to be monitored and maintained from any accessible location. Furthermore, every aspect of the system, from adding media to deploying policies, is managed through intuitive graphical interfaces with innovative system monitoring consoles that provide, at a glance, a real-time view of system activity and performance.

Security

Phoenix preserves all security information and special attributes on the data being managed. Everything from permissions to access control lists, Windows file stream attributes to Macintosh file resource forks, are preserved with the data and utilized by the system.

Phoenix Provides These Features and More

  • Enterprise-wide Search and eDiscovery (context and content based)
  • Unlimited Data Retention
  • Data Protection
  • File System Space Management (FSM)
  • Single Instance Storage (De-duplication)
  • Digital Fingerprinting
  • Data Classification
  • Data Consolidation
  • Tiered, Hierarchical Information Storage
  • Data Retention and Elimination Handling
  • File-Level Security Preservation
  • Remote System Management
  • Self Healing, Load Balanced, Dynamically Monitored Federated Information Repository