Dark data: shedding light on a growing problem for businesses

Dark data: shedding light on a growing problem for businesses

Mika Javanainen – Senior Director, Product Management at M-Files

Dark data: shedding light on a growing problem for businessesWhile somewhat ominous, the term effectively describes an important class of information that exists within nearly every company. “Dark data” refers to all of the fragments and files that have been forgotten or lost within an organisation’s digital repositories.

What is dark data?

Many define dark data as information assets that are created and used only once, such as a .zip file that is received, stored, unzipped and then typically ignored forever. And even content that is actively used for a period of time can turn into dark data when organisational and project priority changes. Active information that becomes inactive is typically left where it was and is easily forgotten. To make matters worse, employees often recreate data when they can’t quickly find their copy. Duplication and recreation multiply the incremental volumes of any data that subsequently goes dark.

Dark data – A fast-growing burden on the business

Massive volumes of neglected, unused information can grow just as fast as relevant, mission-critical data.

Expenses for eDiscovery and forensic data analysis can similarly be significantly increased by dark data. Any organisation that anticipates or has to plan for possible litigations will be hampered by huge amounts of dark data.

Dark data also impedes analytical efforts that involve culling data repositories. Results can be skewed by essentially bogus or out-of-date information, and at a minimum, time will be wasted filtering out dark data.

Rewiring information with metadata

Before dark data can see the light, it has to be identified. After that, enterprise content management (ECM) solutions that leverage metadata can inject a layer of intelligence capable of eradicating the dark data.

By attaching attributes or tags to content assets, a metadata-driven ECM solution can instantly identify the information assets that are related and/or relevant to other unstructured content assets as well as structured data objects. For example, metadata attached to a sales proposal (an unstructured content asset) can be tagged with a metadata attribute for “Customer A.” That proposal then becomes visible from within the CRM system, and can be linked to the CRM account for Customer A (a structured data object). In this way, metadata shines the light on previously dark data. All of the information assets related to Customer A can be displayed to decision makers in context with other related information.

Learning to see in the dark

With the ability to see and harness dark data, companies can make better use of all of their data. At a time when the volume of information continues to skyrocket, it makes sense to pay attention to dark data. Since a portion of dark data can still provide value, there are positive incentives for making it broadly visible.

[su_button url=”https://www.m-files.com/en” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]For more information on M-Files please click here[/su_button]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Image provided by SentinelOne

SentinelOne to Spotlight AI-Power at GISEC 2025

SentinelOne announces its participation at GISEC Global 2025 (6-8 May) at the Dubai World Trade Centre. The company will highlight..
Two young intercultural programmers trying to solve problem with access to data while interacting in front of computers

DDoS attacks targeting critical infrastructure

NETSCOUT released its 2H2024 DDoS Threat Intelligence Report, revealing how Distributed Denial of Service (DDoS)…
Copyright: Security Buyer

ASIS UK Launches “Security is You(th)” Hackathon

ASIS International UK has launched Security is You(th), an initiative designed to engage students and early-career professionals…
BeyondTrust

Into the Cloud – Morey J. Haber, BeyondTrust

The January edition of International Security Buyer featured Morey J Haber, Chief Security Advisor for BeyondTrust in our Into the Cloud…
Riham Security website

Growing Intersec Saudi Arabia

Intersec Saudi Arabia’s Event Director, Riham Sedik, discusses the event’s future growth and government partnerships

Neustar Security Services introduces UltraPlatform

Neustar Security Services, a provider of cloud-based security services that enable businesses to thrive online, is launching UltraPlatform.

Security and fire 2023 trends

In 2023 all industries will face several challenges: sustainability, cost increases, and how to better manage energy & resources.
istorage

Zero trust, maximum caution

John Michael, CEO, iStorage considers the dangerous new ‘golden age’ of ransomware, ways businesses can neutralise..

LAPSUS$ exposes cyber gaps in organisations

The LAPSUS$ group exploded onto the cyber scene late last year after successfully breaching major companies.

BeyondTrust Remote Support receives new patch

BeyondTrust, an intelligent identity and access security company, has announced the release of BeyondTrust Remote Support 22.2.
Scroll to Top