Scroll to Top
  • Solutions Solutions
    • Digital Transformation

    • Accelerate Application Delivery
    • Simplify Your IT Transformation
    • Strengthen Your Cyber Resilience
    • Analyze in Time to Act

    • Software as a Service (SaaS)
    • Industry Solutions › 
      • Industry Solutions

      • Airline 
      • Cyber Resilient Industries 
      • Education 
      • Financial 
      • Government Solutions 
      • Health & Life Sciences 
      • Healthcare 
      • SAP Modernization 
  • Products Products
    • Analytics & Big Data › 
      • Analytics & Big Data

        Analytics for business insights in a data driven world


      • Vertica Advanced Analytics Platform 

        The fastest, open, infrastructure-independent, advanced analytics SQL database

      • Cognitive Search & Knowledge Discovery › 
        • Cognitive Search & Knowledge Discovery

          Quickly attain key information with best-in-class cognitive search and discovery


          • IDOL 

            Securely access and analyze enterprise (and public) text, audio & video data

      • Security Analytics › 
        • Security Analytics

          Search and analysis to reduce the time to identify security threats


          • ArcSight Investigate 

            An intuitive hunt and investigation solution that decreases security incidents

          • ArcSight Interset 

            User and entity behavioral analytics that augments existing security tools and empowers security operations teams to identify and respond to the threats that matter before data is stolen

      • IT Operations Analytics › 
        • IT Operations Analytics

          Leverage big data to optimize and make your IT processes more efficient


          • Operations Bridge Suite 

            Autonomous operations through a business lens

          • IT Service Management Automation Suite 

            Intelligent automation for service desk, configuration, and asset management

      • Big Data Platform › 
        • Big Data Platform

          Open, secure, high-performance platforms to build Big Data analytics stacks


          • Vertica 

            SQL analytics solution handling large amounts of data for big data analytics

          • Voltage SecureData for Hadoop 

            High-scale protection of sensitive data at rest, in motion, and in use across systems

    • Application Delivery Management › 
      • Application Delivery Management

        Increase velocity, remove bottlenecks and continuously improve software delivery


      • Agile & DevOps Management › 
        • Agile & DevOps Management

          Scale Enterprise Agile transformations from planning to a progression supporting full DevOps demands while creating a “quality everywhere” culture


          • ALM Octane 

            Agile/DevOps management for continuous quality and delivery

          • Dimensions RM 

            Manage and track requirements from idea to deployment

          • Release Control 

            Plan, track, orchestrate, and release complex applications across any environment

          • Dimensions CM 

            Enable all aspects of SCCM with enterprise grade scalability, security, and compliance

          • Deployment Automation 

            Automate deployments for continuous delivery with drag-and-drop simplicity

      • Quality & Test Management › 
        • Quality & Test Management

          Improve application quality and gain real-time insights into the health and risks associated with every release


          • ALM/Quality Center 

            Govern application lifecycle activities to achieve higher quality

          • Silk Central 

            Unify test management to drive efficiency and reuse

          • Business Process Testing 

            Integrated, component-based test framework that accelerates functional test automation

      • Functional Testing › 
        • Functional Testing 

          Multi-platform functional test automation, combining extensive technology support with AI-driven capabilities


          • UFT One 

            Accelerate functional test automation across web, mobile, API, and enterprise apps

          • Service Virtualization 

            Discover, design, and simulate services and APIs to remove dependencies and bottlenecks

          • UFT Developer 

            Shift-left functional testing using the IDE, language, and testing frameworks of choice

          • Silk Test 

            Reliable and efficient test automation for functional and regression testing

          • UFT Mobile 

            Centralized, omnipresent lab to develop, debug, test, monitor, and optimize mobile apps

      • Performance Engineering › 
        • Performance Engineering

          Engineer performance early in the lifecycle through the end-user experience


          • LoadRunner Family 

            Learn more about the LoadRunner Family of solutions

          • LoadRunner Cloud 

            Cloud-based solution to easily plan, run and scale performance tests

          • LoadRunner Professional 

            Project-based performance testing to identify performance issues

          • Silk Performer 

            Easy-to-use performance testing solution for optimizing application performance

          • LoadRunner Enterprise 

            Collaborative performance testing platform for globally distributed teams

          • Service Virtualization 

            Discover, design, and simulate services and APIs to remove dependencies and bottlenecks

      • Project & Portfolio Management (PPM) 
      • Application Security Testing › 
        • Application Security Testing 

          Keep your applications secure with powerful security testing


          • Fortify Static Code Analyzer 

            Identifies security vulnerabilities in software throughout development

          • Fortify Software Security Center 

            Gain valuable insight with a centralized management repository for scan results

          • Fortify on Demand 

            Manage your entire application security program from one interface

          • Fortify WebInspect 

            Provides comprehensive dynamic analysis of complex web applications and services

      • Mainframe Development › 
        • Mainframe Development 

          DevOps tools provide more efficiency and flexibility needed to meet business needs


          • ChangeMan ZMF 

            Builds packages of change artifacts to speed up mainframe application development

          • Enterprise Sync 

            Enable faster, efficient parallel development at scale

          • Enterprise Developer 

            A development environment that streamlines mainframe COBOL and PL/I activities

          • Enterprise Analyzer 

            Intelligence and analysis technology that provides insight into core processes

          • Verastream 

            Fuel mobile apps, cloud initiatives, process automation, and more

    • Application Modernization & Connectivity › 
      • Application Modernization & Connectivity

        Modernize Core Business Systems to Drive Business Transformation


      • COBOL › 
        • COBOL 

          Build and modernize business applications using contemporary technology


          • Develop & Deploy › 
            • Develop & Deploy

              Modernize COBOL and PL/I business applications using state-of-the-art tools


            • Visual COBOL 

              Future-proof core COBOL business applications

            • Extend / AcuCOBOL-GT 

              Maintain and enhance ACUCOBOL-based applications

            • AcuToWeb 

              Deliver application access—anywhere

            • NetExpress / Server Express 

              Maintain and enhance COBOL systems

            • RM/COBOL 

              Maintain and enhance RM/COBOL applications

          • Data Modernization › 
            • Data Modernization 

              Unlock the value of business application data


            • Database Connectors 

              Connect COBOL applications to relational database management systems

            • Relativity 

              Derive incremental value with real-time, relational access to COBOL data

            • Acu-XDBC 

              Unlock business value with real-time, relational access to ACUCOBOL data

            • Acu-4GL 

              Connect ACUCOBOL applications to relational database management systems

          • Application Analysis › 
            • Application Analysis

            • COBOL Analyzer 

              Automatically understand and analyze Micro Focus COBOL applications

          • Agile & DevOps 

            Build COBOL applications using Agile and DevOps practices

          • Linux, Cloud & Containers 

            Deploy COBOL applications across distributed, containerized or cloud platforms

          • Application Rehosting 

            Modernize core business system infrastructure to support future innovation

      • Visual COBOL 
      • Mainframe › 
        • Mainframe 

          Modernize IBM mainframe applications, delivery processes, access and infrastructure


          • Plan & Manage › 
            • Plan & Manage

              Plan, manage and deliver Enterprise software with compliance and certainty


            • Atlas 

              Manage agile projects using a collaborative, flexible, requirements and delivery platform

            • Dimensions RM 

              Manage requirements with full end-to-end traceability of processes

          • Analyze › 
            • Analyze

              Understand, analyze, and extract critical mainframe COBOL application value


            • Enterprise Analyzer 

              Automatically understand and analyze IBM mainframe applications

            • Enterprise View 

              Capture, analyze, and measure the value, cost and risk of application portfolios

            • Business Rule Manager 

              Build packages of change artifacts to speed up mainframe application development

          • Control › 
            • Control

              Manage all aspects of change for robust, automated mainframe application delivery


            • ChangeMan ZMF 

              Build and manage packages of change artifacts to speed up mainframe application development

            • (ChangeMan ZMF) Client Pack 

              Provide multiple change management interfaces to maintain mainframe apps

          • Develop › 
            • Develop

              Build, modernize, and extend critical IBM mainframe systems


            • Enterprise Developer 

              Build and modernize IBM mainframe COBOL and PL/I applications

            • Enterprise Sync 

              Enable faster, efficient parallel development at scale

            • Verastream 

              Fuel mobile apps, cloud initiatives, process automation, and more

            • StarTool FDM 

              Manage mainframe files for fast problem resolution

          • Test › 
            • Test

              Accelerate IBM mainframe application testing cycles with a scalable, low-cost solution


            • Enterprise Test Server 

              Easily test mainframe application changes using flexible infrastructure

            • Comparex 

              Compare and manage mainframe data, text, and directory files

          • Release › 
            • Release

              Automate deployments and orchestrate the application release process to join teams


            • Deployment Automation 

              Connect Dev and Ops by automating the deployment pipeline and reduce feedback time

            • Release Control 

              Centralize planning and control for the entire software release lifecycle

            • Solutions Business Manager 

              Orchestrate and integrate processes for faster software development and delivery

            • ChangeMan SSM 

              Detect changes, synchronizes multiple environments, and restores failed systems

          • Deploy › 
            • Deploy

              Leverage modern Hybrid IT infrastructure to execute application workload in a fit-for-purpose model


            • Enterprise Server 

              Execute IBM mainframe COBOL and PL/I workload on Windows, Linux and the Cloud

            • Enterprise Server for .NET 

              Execute modernized IBM mainframe workloads under Microsoft .NET and Azure

      • Host Connectivity › 
        • Host Connectivity 

          Modernize host application access: easier to use, easier to integrate, easier to manage, more secure


          • Access › 
            • Access

              Modernize application access across desktop, web, and mobile devices


            • Reflection 

              Modernize IBM, HP, and Unix application access across desktop and mobile devices

            • Host Access for the Cloud 

              Web-enable IBM and VT application desktop access, Java free

            • InfoConnect 

              Modernize Unisys mainframe application desktop access

            • Rumba 

              Modernize IBM, HP, and Unix application desktop access

            • Extra!  

              Automate IBM, HP, and Unix application desktop access

          • Integrate › 
            • Integrate

              Bring the value of host applications to new digital platforms with no-code/low-code modernization


            • Verastream 

              Create new applications and workflows with Web services and APIs for IBM, HP, and UNIX applications

            • Databridge 

              Fuel analytics platforms and BI applications with Unisys MCP DMSII data in real time

          • Secure › 
            • Secure

              Respond to new regulatory requirements for host application access and data protection


            • Host Access Management & Security Server 

              Centralize host access management with identity-powered access control and data security

            • Reflection for Secure IT 

              Modernize file transfer with security, encryption and automation, within and across the firewall

            • Advanced Authentication Connector for z/OS 

              Learn how Advanced Authentication Connector for z/OS is a multi-factor authentication for all your IBM z/OS end points

          • Manage › 
            • Manage

              Improve governance for host access software and infrastructure


            • Host Access Analyzer 

              Measure and manage terminal-based software deployment and usage

            • Host Access Management & Security Server 

              Centralize host access management with identity-powered access control and data security

      • CORBA › 
        • CORBA 

          Attain interoperability of systems across the enterprise


          • VisiBroker 

            Develop and deploy applications with a comprehensive suite of CORBA products

          • Orbix 

            Build distributed applications at enterprise scale

          • Orbacus 

            Develop, deploy, and support CORBA 2.6 compliant middleware in C++ or Java

          • OpenFusion 

            Connect applications on diverse operating environments

    • Team Collaboration and Endpoint Management › 
      • Team Collaboration and Endpoint Management

      • Collaboration › 
        • Collaboration 

          Build a productive, mobile workforce.


          • Enterprise Messaging 

            Email, IM, chat-based teamwork, anti-virus, anti-spam, disaster recovery, and more

          • Filr 

            Provides secure file access and sharing from any device

          • GroupWise 

            Provides secure email, calendaring, and task management for today's mobile world

          • GroupWise Disaster Recovery 

            Backup and disaster recovery solution that ensures critical email is always available

          • Open Workgroup Suite 

            Seven essential tools to build IT infrastructures, including secure file sharing

          • Vibe 

            Provides secure team collaboration with document management and workflow features

      • File and Print › 
        • File and Print

          Delivering critical file, storage and print services to enterprises of all sizes


          • Access Manager 

            Provides single sign-on for enterprises and federation for cloud applications

          • Advanced Authentication 

            Protect your sensitive information more securely with multi-factor authentication

          • File Management Suite for OES 

            File Reporter and Storage Manager solution suite bundle

          • File Reporter for OES 

            File Reporter for OES examines OES network file systems and delivers intelligent file insights so you can make the most intelligent business decisions.

          • Filr 

            Provides secure file access and sharing from any device

          • OES Business Continuity Clustering 

            Protects your key business systems against downtime and disaster

          • OES Cluster Services 

            Simplifies resource management on a Storage Area Network and increases availability

          • Open Enterprise Server 

            File, print, and storage services perfect for mixed IT environments

      • Unified Endpoint Management and Protection (UEMP) › 
        • Unified Endpoint Management and Protection (UEMP)

          • Connected MX 

            Cloud-based endpoint backup solution with file sync and share, and analytics

          • Desktop Containers 

            Package, test, and deploy containerized Windows apps quickly and easily

          • ZENworks Suite 

            Seven integrated products to help track, manage and protect endpoint devices

          • ZENworks Asset Management 

            Provides reports that integrate licensing, installation and usage data

          • ZENworks Configuration Management 

            Provides automated endpoint management, software distribution, support, and more

          • ZENworks Endpoint Security Management 

            Delivers identity-based protection for devices and features total protection

          • ZENworks Full Disk Encryption 

            Proactive laptop and desktop data protection to automatically lock out threats

          • ZENworks Patch Management 

            Automates patch assessment and monitors patch compliance for security vulnerabilities

          • ZENworks Service Desk 

            Streamlines and automates the way you provide IT services to your business

    • Information Management & Governance › 
      • Information Management & Governance

        Trusted, proven legal, compliance and privacy solutions


      • Information Archiving › 
        • Information Archiving 

          Consolidate and govern information for legal, compliance, and mailbox management


          • Digital Safe 

            Cloud-based, scalable archiving for regulatory, legal, and investigative needs

          • Retain Unified Archiving 

            Archive all business communication for case assessment, search, and eDiscovery

          • Supervisor 

            Automate employee data and communication monitoring to meet regulatory compliance and internal initiatives

          • Social Media Governance 

            Mitigate risk across social media channels to meet regulatory compliance obligations

      • Secure Content Management › 
        • Secure Content Management 

          Securely meet regulatory, privacy, and jurisdictional retention requirements


          • Content Manager 

            Helping organizations meet data privacy regulatory guidelines through the management & disposition of data.

          • File Dynamics 

            Address the ever-changing needs of network data management

          • ControlPoint 

            File analysis to discover, classify and automate policy on unstructured data

          • File Reporter 

            Discover what is being stored and who has access

          • Structured Data Manager 

            Structured data archiving to retire outdated applications and reduce data footprint

          • File Governance Suite 

            Identity-driven governance of data & access

          • Data Discovery 

            SaaS-based file analysis on all of your unstructured data

      • eDiscovery › 
        • eDiscovery 

          Identify, lock down, analyze, and prepare data for litigation and investigations


          • eDiscovery 

            Respond to litigation and investigations quickly, accurately, & cost-effectively

      • File Analysis Suite › 
        • File Analysis Suite 

          Find, protect and secure your sensitive and high-value data


          • Cloud › 
            • Cloud

              Saas-based data discovery, data access, data governance and data preservation


            • Data Discovery 

              SaaS-based file analysis on all of your unstructured data

            • Data Management 

              Identify, analyze, and manage your data; then establish policies to protect your data properly and efficiently, in use and throughout its lifecycle, and ensure data preservation.

          • On-premises › 
            • On-premises

              Automate data discovery, classification, and management of unstructured and structured data


            • ControlPoint 

              File analysis to discover, classify and automate policy on unstructured data

            • File Reporter 

              Discover what is being stored and who has access

            • File Dynamics 

              Address the ever-changing needs of network data management

            • Structured Data Manager 

              Structured data archiving to retire outdated applications and reduce data footprint

            • Content Manager 

              Helping organizations meet data privacy regulatory guidelines through the management & disposition of data.

      • Search & Analytics › 
        • Search & Analytics 

          Deliver information faster organization-wide with cognitive search and analytics


          • IDOL 

            Securely access and analyze enterprise (and public) text, audio & video data

      • Data Backup and Restore › 
        • Data Backup and Restore

          Secure backup and rapid restores for all structured and unstructured data to ensure business continuity


          • Data Protector 

            Backup and disaster recovery for diverse, dynamic, and distributed enterprise

    • IT Operations Management › 
      • IT Operations Management

        Accelerate your IT Operations to the speed of DevOps


      • Data Center Automation 

        Automate provisioning, patching, and compliance across the data center

      • Universal Discovery & UCMDB 

        Discover and manage configuration items (CIs) in Hybrid IT environments.

      • Hybrid Cloud Management X 

        Simplify fulfillment automation and enforce governance

      • Network Operations Management 

        Automate and manage traditional, virtual, and software-defined networks

      • Operations Bridge 

        The first containerized, autonomous monitoring solution for hybrid IT

      • Operations Orchestration 

        Automate IT processes end-to-end

      • Robotic Process Automation 

        Build, secure, and scale automated business processes across the enterprise

      • Service Management Automation 

        Engaging end-user experience and efficient service desk based on machine learning

    • Security › 
      • Security

        Security at the core to everything you do; Operations, Applications, Identity and Data


      • Security Operations › 
        • Security Operations 

          Detect known and unknown threats through correlation, data ingestion and analytics


          • ArcSight Enterprise Security Manager (ESM) 

            A comprehensive threat detection, analysis, and compliance management SIEM solution

          • ArcSight Recon 

            An intelligent log management solution that eases compliance burdens and accelerates forensic investigation for security professionals

          • ArcSight Logger 

            A comprehensive log management solution for easier compliance, efficient log search, and secure cost-effective storage.

          • ArcSight Marketplace 

            Download and deploy pre-packaged content to dramatically save time and management

          • Security Open Data Platform 

            A future-ready data platform that transforms data chaos into security insight.

          • ArcSight Intelligence 

            User and entity behavioral analytics that augments existing security tools and empowers security operations teams to identify and respond to the threats that matter before data is stolen

          • Sentinel 

            A fully-featured, adaptable solution that simplifies the day-to-day use of SIEM

          • ArcSight SOAR 

            A comprehensive Security Orchestration Automation Response platform with cognitive automation, investigation service desk, process orchestration and SOC analytics.

      • Data Security › 
        • Data Security 

          Encryption, tokenization and key management for data de-identification and privacy


          • Voltage SmartCipher 

            Persistent file encryption, complete control, and visibility to simplify unstructured data security

          • Voltage SecureData Enterprise 

            Format-preserving encryption, tokenization, data masking, and key management

          • Voltage SecureData for Payments 

            Omni-channel PCI compliance and data protection for end-to-end payments security

          • Voltage SecureMail On-Premises 

            Email, file, and Office 365 protection for PII, PHI, and Intellectual Property

          • Voltage SecureMail Cloud 

            Saas cloud email encryption to protect information on Office 365

          • Reflection for Secure IT 

            The full solution for secure automated file transfer management inside and across perimeters

      • Application Security › 
        • Application Security 

          Secure development, security testing, and continuous monitoring and protection


          • Fortify Static Code Analyzer 

            Identifies security vulnerabilities in source code early in software development

          • Fortify WebInspect 

            Provides comprehensive dynamic analysis of complex web applications and services

          • Fortify Software Security Center 

            Gain valuable insight with a centralized management repository for scan results

          • Fortify on Demand 

            Manage your entire application security program from one interface

          • Application Defender 

            Gain visibility into application abuse while protecting software from exploits

      • Identity & Access Management › 
        • Identity & Access Management 

          An integrated approach to Identity and Access Management


          • Identity Governance & Administration › 
            • Identity Governance & Administration 

              A comprehensive identity management and governance solution that spans across the infrastructure


            • Data Access Governance 

              Provisions and governs access to unstructured data

            • NetIQ eDirectory 

              Provides an LDAP directory with incredible scalability and an agile platform

            • NetIQ Identity Governance 

              Provides automated user access review and recertification to remain compliant

            • NetIQ Identity Manager 

              Delivers an intelligent identity management framework to service your enterprise

          • Access Management › 
            • Access Management 

              Consistently enforce access rights across your business environment


            • NetIQ Access Manager 

              Provides single sign-on for enterprises and federation for cloud applications

            • NetIQ Advanced Authentication 

              Move beyond username and passwords and securely protect data and applications

            • Advanced Authentication Connector for z/OS 

              Multi-factor Authentication for all your IBM z/OS end points

            • Host Access Management & Security Server 

              Integrate the host with your modern security framework

            • NetIQ Risk Service 

              Adapt the authentication and access experience to the risk at hand.

            • Self Service Password Reset 

              Enables users to reset their passwords without the help of IT

            • NetIQ SecureLogin 

              Streamlines authentication for enterprise apps with a single login experience

            • NetIQ Secure API Manager 

              Protect and manage access to your APIs.

          • Privilege Management › 
            • Privilege Management 

              Manage and control privileged account activities for all credential-based systems


            • NetIQ Privileged Account Manager 

              Enables IT administrators to work on systems without exposing credentials

            • NetIQ Directory & Resource Administrator 

              Limits administrative privileges and restricts directory views to specific users

            • NetIQ Group Policy Administrator 

              Edit, test and review Group Policy Object changes before implementation

            • NetIQ Change Guardian 

              Protect critical data, reduce risk and manage change with Change Guardian

            • NetIQ AD Bridge 

              Extend the power of Active Directory to Linux resources

            • Universal Policy Administrator 

              Unify and centrally manage policies across multiple platforms.

          • Change & Configuration Management › 
            • Change & Configuration Management 

              Deliver actionable and timely security intelligence


            • NetIQ Change Guardian 

              Protect critical data, reduce risk and manage change with Change Guardian

            • NetIQ Secure Configuration Manager 

              Finds and repairs configuration errors that lead to security breaches or downtime

            • NetIQ Security Solutions for IBM i 

              Provides easy compliance auditing and real-time protection for IBM iSeries systems

      • Secure Messaging › 
        • Secure Messaging

          Antivirus, anti-spam, anti-malware, and network protection


          • Secure Messaging Gateway (GWAVA) 

            Protect your network and messaging system from malware, viruses, and harmful content

          • Voltage SecureMail 

            Scalable, end-to-end encrypted email solution for desktop, cloud, and mobile

      • Unified Endpoint Management › 
        • Unified Endpoint Management

          Ensure all devices follow standards and compliance to secure your network


          • Connected MX 

            Cloud-based endpoint backup solution with file sync and share, and analytics

          • Desktop Containers 

            Package, test, and deploy containerized Windows apps quickly and easily

          • ZENworks Asset Management 

            Provides reports that integrate licensing, installation and usage data

          • ZENworks Configuration Management 

            Provides automated endpoint management, software distribution, support, and more

          • ZENworks Endpoint Security Management 

            Delivers identity-based protection for devices and features total protection

          • ZENworks Full Disk Encryption 

            Proactive laptop and desktop data protection to automatically lock out threats

          • ZENworks Patch Management 

            Automates patch assessment and monitors patch compliance for security vulnerabilities

          • ZENworks Service Desk 

            Streamlines and automates the way you provide IT services to your business

          • ZENworks Suite 

            Seven integrated products to help track, manage and protect endpoint devices


    • Products A-Z
  • Support & Services Support & Services
    • Support
    • Premium Support & Flexible Credits
    • Professional Services › 
      • Professional Services

        Shape your strategy and transform your hybrid IT.


      • Professional Services by Product 
      • Analytics and Big Data 

        Help you embed security throughout the IT value chain and drive collaboration between IT operations, applications, and security teams.

      • Cyber Security 

        Help you to react faster and gain a competitive advantage with enterprise agility.

      • DevOps 

        Accelerate your hybrid cloud outcomes with advisory, transformation and implementation services.

      • IT4IT Value Chain Consulting 

        Application management services that let you out-task solution management to experts who understand your environment.

      • Application Delivery Management 

        Strategic consulting services to guide your digital transformation agenda.

      • Mobile Application Lifecycle 

        Fully functional use-case modeling, with pre-built integrations across the Micro Focus Software portfolio, showcasing real-life use-case

      • Hybrid Cloud Management and Brokerage 

        Expert security intelligence services to help you quickly architect, deploy, and validate your Micro Focus security technology implementation.

      • Data Center Automation 

        A service integration and management service that optimizes delivery, assurance, and governance in multi-supplier settings.

      • Operations Management 

        Get insights from big data with real-time analytics, and search unstructured data.

      • Service Management 

        Get insights from big data with real-time analytics, and search unstructured data.

      • Vertica 

        Get insights from big data with real-time analytics, and search unstructured data.

      • Global Product Authentication 

        Mobile services that ensure performance and expedite time-to-market without compromising quality.

      • Managed Services 

        Get insights from big data with real-time analytics, and search unstructured data.

      • Model Offices 

        Comprehensive Big Data services to propel your enterprise forward.

    • Training › 
      • Training

        Give your team the power to make your business perform to its fullest


      • Training Central 

        All Micro Focus learning in one place

      • Certification 
      • Adoption Readiness Tool (ART) 
      • Academic Teaching Programs 
      • APJ Software University › 
        • APJ Software University 

          Build the skills to succeed


          • IoT, AI, and Machine Learning 
          • Big Data Analytics 
          • Cloud Computing 
          • Cyber Security 
          • DevOps and Docker 
          • LeanFT 
          • Mobile Apps Dev and Testing 
          • Quality Engineering 
      • Contact a Training Expert 
    • Community
  • Partners
  • Events
  • About About
    • Meet Micro Focus
    • Press Room
    • Investor Relations
    • Leadership
    • Corporate Responsibility
    • Careers
    • Our COVID-19 Response

  • Support Login
  • Contact Us
  • Free Trials
 

Micro Focus Blog

Close
View More
RSS Feed
Reminder | Worldwide Emergency Contact No: +44(0)7771 762 855

Reminder | Provo Security Centre No: +1 801-861-8888
View all posts

What Exactly is Metadata?

08.31.2016

by Zac Muir

Views: 757

  • 0
  • Share
    Share this...
    Share on Facebook
    Facebook
    Pin on Pinterest
    Pinterest
    Tweet about this on Twitter
    Twitter
    Share on LinkedIn
    Linkedin
  • 0
Categories: Information Archiving
Tags: Archive Email, Archive Social Media, Archive Text Messages, Information Archiving, Information Governance, Metadata, Retain
0

Metadata may be one of those geeky terms you’ve heard before, but have never worried about, leaving the interpretation for the more technical people in your company. However, it is important that you understand what metadata is and know how it can affect you and your business.

What is Metadata?

Metadata is data that provides more information to help describe another piece of data. Metadata makes it easier to retrieve, use, or manage an information resource. For example, let’s use Boston as our example. So, Boston is the “data.” Associated “metadata” is:

  • It is a city,
  • It has many historic places,
  • it is home of the Red Sox, a baseball team.

Metadata is stored within documents or other data, like an email. Metadata s the message that was sent, words, attachments, links, etc. Common metadata includes: the specific information about who sent it, when it was sent, the time it was sent, individuals who were copied on the email, etc. Some of this metadata is shown by your email client. However, much of the metadata is hidden deep within the email itself.

Emails messages contain headers that are loaded with information such as IP addresses, if the message passed through a spam/security filter, and even where the data is stored. Images also contain metadata. Metadata about a picture may include the image resolution, when it was created, who created it, when it was received, etc. A text document has metadata that describes how many words it contains, who the author was, and other important descriptive information.

A purpose of all of this metadata is to allow for categorization and description of electronic information, making it easier to find and analyze the email or document. If you want to learn more deeply about a piece of data, looking into the metadata is your best bet. It can tell you what the data is, when it was created, where it has been, if it has been copied or changed, and much more.

Why Worry About Metadata?

If a large part of metadata goes unseen, why then is it important? Years ago, when letters were the main form of communication, senders would stamp their envelopes with a wax seal. This seal showed that the letter had maintained its integrity and had not been tampered along the journey from sender to receiver. In the same way, metadata is the stamp that gives any data its integrity. If the metadata is there, it can be shown and proven that the data is authentic. On the other hand, a document without data is like the body of a car without an engine. Looks like the real thing but not totally authentic.

Understanding what metadata is–and knowing how to use it–is extremely important when you consider the information that you are archiving. Data may be archived, but if metadata is left behind and is not archived and made accessible, it will prove much less useful. For example, metadata serves three key roles in litigation requests and lawsuits:

  • It can authenticate any data and its source
  • It leaves a trail that can be followed and potentially reveal even more relevant information
  • It allows for authenticity verification.

Learn more about metadata in discovery

Metadata in Law

Metadata has played key roles in past lawsuits. Take a look:

  • August 1, 2013 in Barrette Outdoor Living, Inc. v. Michigan Resin Representatives, 2013 WL 3983230 (E.D. Mich), The parties disputed over various issues, one of them being an alleged theft of $400,000. The plaintiff accused one of the defendant’s employees of wiping relevant information from his devices. A computer forensics expert was brought in. He was able to follow the trail of metadata left on the devices to find useful information and light into the case.
  • In Armstrong v. Executive Office of the President, Office of Administration, The court ruled that records the U.S. government agencies had kept did not include metadata or other electronic information, and therefore they were not in compliance with recordkeeping regulations.
  • United Med. Supply Co. v. United States, A preservation order from the court identified that parties should preserve and produce all documents, data, and tangible things. The court of law concluded that this included metadata.

Metadata serves as a trail to lead to more information and is a determining factor in court cases. Defendants can face charges for not keeping metadata. Even if you are archiving data, the archive is incomplete without all data because, in order for information to be completely authentic, it must contain, once again, metadata.

Retain Excels with Metadata

At GWAVA, we are dedicated to providing you the most efficient, effective archive that can be offered. Retain integrates directly with the email messaging system to archive and preserve metadata in Office 365, Exchange, Gmail or GroupWise, in both the message contents and attachments. Check out this related blog post to learn about the difference between SMTP archiving and the integrated archiving provided with Retain.

A key issue with all electronically stored information (ESI) in court/compliance cases is authenticating and validating the information. Rule 34(b)(1)(c) of the Federal Rules of Civil Procedure requires that all ESI be produced in native format, with metadata attached. Missing metadata could result in the rejection of presented evidence. Companies need to focus not only on preserving information in its native format, but they also must ensure that records are not tampered with after being stored, keeping in mind that tampering can be done by anyone, even those with little technical background. This means that even though you have all your ESI archived, it might be useless to you if it is not archived correctly.

In Retain, you can be sure that not only are the visible aspects of a record archived, but that all necessary metadata is being preserved as well. Retain goes above and beyond by assuring that once archived, the email data cannot be tampered with. Once archived, all ESI is has the authentic metadata and proper chain of custody, stored in its native format. Furthermore, only administrators have the ability to manage records, and every action is recorded within Retain with a complete audit trail. All searches are also logged. And timestamping is used to show when records are accessed, making everything stored in the archive impossible to tamper with or alter as well as being completely authentic and presentable in a court of law.

In addition to archiving email messages, Retain can easily archive social media and archive mobile device communication like text messages, along with all metadata. This archived data can be instantly retrieved, searched, and published in one central location. All of these features and more make Retain your best bet for creating a secure, reliable archive and that your organization is always in compliance.

Get Started Today!

Integrate Retain into your company’s IT infrastructure and rest assured knowing that everything you need to archive will be taken care of. The metadata archiving that Retain offers will ensure that all of your records can be proven authentic, and it can provide a complete audit trail for digging deeper into any key issue. Our team would love to assist you in getting Retain running!

Archive your Company’s Email, Social & Text Message Data Complete with All Metadata.

Download a FREE Trial of Retain!

Post Views: 757

Zac Muir

Share this post:
Share this...
Share on Facebook
Facebook
Pin on Pinterest
Pinterest
Tweet about this on Twitter
Twitter
Share on LinkedIn
Linkedin

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RSS Feed
  • English

Categories

  • Application Delivery Management
  • Application Modernization and Connectivity
  • Artificial Intelligence
  • Collaboration
  • Company Culture
  • Corporate
  • Data Center Solutions
  • Digital Transformation
  • Enterprise DevOps
  • File and Networking Services
  • Identity and Access Management
  • Information Archiving
  • ITOM
  • News
  • Predictive Analytics
  • Security Management
  • Support
  • Uncategorized
  • Workload Migration and Disaster Recovery

Archive

Tags

Agile ALM Application Delivery Change Management Cloud COBOL Compliance Configuration Management Core Systems Development DevOps Disruptive technologies eDiscovery Enterprise Applications Federal Government File Transfer Solutions FTP Governance In-House Solutions Information Archiving Innovation IT Operations IT Service Management IT Skills IT Systems Large Files Legacy Mainframe MFT Modernization North America Release Automation Release Management Retain Secure File Transfer Security Serena SerenaOnDevOps Server-to-Server Strategic File Transfer Terminal Emulation Testing User Group Visual COBOL xChange

Authors

View All Authors
Discover
  • Products
  • Partners
  • Events & Webinars
  • Marketplace
  • TechBeacon
Resources
  • Support Login
  • Resource Library
  • Free Trials
  • Community
  • Subscribe
  • Education Central
Company
  • About
  • Careers
  • Contact Us
  • Investor Relations
  • Corporate Blog
  • Press Room
  • Corporate Social Responsibility
  • Tax Strategy
Legal & Compliance
  • Privacy and Cookie Notice
  • Website Terms of Use
  • Code of Conduct
  • Anti-Slavery Statement
  • Cookie Privacy Manager
  • Accessibility
  English US
English
Deutsch (German)
Español (Spanish)
Français (French)
Italiano (Italian)
日本語 (Japanese)
한국어 (Korean)
Português (Portuguese)
Русский (Russian)
中文(简体) (Simplified Chinese)
中文(繁體) (Traditional Chinese)
  • © Copyright 2021 Micro Focus or one of its affiliates
×

The translated version of this page is coming soon. In the meantime, content will appear in standard North American English.

 Don't show this message again
×