eDiscovery for your End User Computing / User Developed ApplicationsPrint Version
The first step to controlling critical end-user computing (also known as user developed applications) is to understand what you have, where it is and how it is connected to your business.
ClusterSeven can start by automatically scanning your network to intelligently locate your key spreadsheets and Access databases. Alternatively you can give ClusterSeven specific files and it will ‘Spider’ down the connections to discover all the applications (both end user and central systems) that are feeding them. This builds a complete dependency tree including:
- Excel Spreadsheets
- MS Access® Databases
- Flat Files (csv, exports from Core Applications etc)
- OLEDB Database connections
The true power of ClusterSeven is apparent when you are dealing with large numbers of files with multiple connections or when you want to link eDiscovery to other dynamic business properties as used in Audit Analytics.
In the example below the CFO believed that his top level reporting file (blue) was only connected to four other spreadsheets (green). ClusterSeven highlighted many other connected sheets and broken links. For you ClusterSeven’s server-side power does all the hard work automatically, while other approaches trail behind.Print Version
“We scanned network servers to find out how many spreadsheets we had. It amounted to thousands across the company. We then focused on the critical ones.”Don Simpson, MD of Operations and Technology, MUSI (ClusterSeven client)
“When ClusterSeven approached us, it was the first time we had seen such a product. We immediately realised its value to us as a company.”George Flynn, business analyst of product control, European Credit Management (ClusterSeven client)
“ClusterSeven’s software allows businesses to continue using spreadsheets but within a structured environment and promoting best practice.”Geoff Dixon, CEO, Double Helix (ClusterSeven partner)