SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
GFI White Paper

  Going beyond Exchange 2010
- Why it pays to have a dedicated
    email archiving solution
Contents
                  Introduction	                                                              3
                  The	state	of	email	archiving	and	data	retention	                           3
                  The	compliance	challenge	                                                  4
                  The	challenges	facing	IT	departments	in	storing	critical	business	email	   4
                  Choosing	an	archiving	solution	                                            5
                  Summary	                                                                   6
                  About	GFI®	                                                                6




Going beyond Exchange 2010 - Why it pays to have a dedicated email archiving solution            2
Introduction
In	less	than	20	years,	email	has	progressed	from	a	curiosity	born	out	of	academia	to	become	the	primary	form	
of	business	communication	today,	displacing	both	the	telephone	and	the	fax	machine	in	the	process	and	still	
far	ahead	of	mobile	communications	technologies	such	as	SMS	and	instant	messaging.
In	2010	alone,	107	trillion	emails	were	sent	across	the	open	Internet.	That	number	breaks	down	to	294	billion	
emails	every	single	day	of	the	year1.	In	an	enterprise	environment,	that	number	includes	internal,	site-to-site	
and	external	communications.
Combined	with	the	knowledge	that,	in	2010,	there	are	1.88	billion	active	email	users	worldwide	–	a	figure	
that	is	up	480	million	from	the	year	before	–it	quickly	becomes	clear	that	email	is	paramount	to	the	way	we	
communicate	in	the	modern	world,	both	personally	and	professionally.
Leading	the	field	in	email	management	and	delivery	is	Microsoft	Exchange	2010.	While	Microsoft	Exchange	
2010	does	offer	new	deployment	and	storage	options,	improve	inbox	management	capabilities,	lower	direct	
operational	costs,	and	offer	personal	email	archiving	integrated	into	certain	versions,	it	is	not	a	dedicated	
email	archiving	solution.
With	data	protection,	storage	and	conversation	trails	falling	under	the	remit	of	growing	industry	and	legal	
regulation,	organizations	of	all	sizes	must	take	a	proactive	and	cost-effective	approach	to	managing	email	
retention.	For	most,	this	means	deploying	a	robust	email	archiving	solution	to	supplement	Exchange	that	can	
capture	and	archive	a	searchable	record	of	all	incoming	and	outgoing	email,	while	at	the	same	time	making	
economical	and	reliable	use	of	storage.
 http://royal.pingdom.com/2011/01/12/internet-2010-in-numbers
1	




The state of email archiving and data retention
Data	is	one	of	the	most	volatile	assets	in	an	organization,	thanks	to	the	ease	with	which	it	can	be	lost	without	
hope	of	recovery.	This	is	particularly	true	with	Exchange	email	that	has	been	archived	or	replicated	on	the	
client	in	an	Outlook	PST	file,	the	point	at	which	email	is	most	vulnerable.	While	Microsoft	has	implemented	
many	changes	and	improvements	to	the	PST	email	archive	used	by	Outlook,	the	format	is	far	from	foolproof	
and	the	larger	the	PST	file	gets,	the	slower	Outlook	will	run,	the	longer	it	takes	to	search,	and	the	more	likely	it	
is	to	corrupt	resulting	in	a	total	or	partial	loss	of	data.
In	environments	without	a	good	email	archiving	solution	and	strategy	in	place,	mailbox	quota	sizes	are	
frequently	set	as	low	as	250	MB,	or	as	high	as	just	1	GB	in	order	to	balance	demand	for	storage	space	while	
maintaining	mail	server	and	storage	array	performance.	Taking	into	account	current	attachment	types	and	
sizes,	1	GB	can	be	legitimately	exhausted	in	days	by	some	users.
The	need	to	retain	all	emails	is	further	complicated	by	the	growth	in	attachment	sizes,	as	attaching	everything	
from	Microsoft	Office	documents	to	videos	and	high-resolution	photos	has	become	the	norm.	Retaining	
attachments	creates	a	sizable	burden	and	the	cost	for	that	storage	needs	to	be	funded	and	managed.
In	an	effort	to	mitigate	the	challenges	created	by	local	PST	files	becoming	lone	silos	for	storing	email,	
Exchange	2010	does	offer	archiving	capabilities	but	these	capabilities	are	basic	and	restrictive,	lacking	many	of	
the	features	and	flexibility	needed	within	most	organizations	to	successfully	archive	mail	without	disrupting	
workflow.	Also,	archiving	in	Exchange	2010	is	only	available	as	part	of	the	Exchange	Enterprise	License.	The	
inclusion	of	basic	archiving	in	only	the	high-end	version	of	the	server	immediately	places	a	cost	premium	on	
the	feature,	and	when	you	consider	that	for	the	same	price	some	mail	archiving	solutions	include	anti-spam,	
antivirus	and	mail	archiving	as	well,	Microsoft’s	offering	quickly	becomes	uncompetitive.	
Failure	to	keep	backups	and	functioning	archives	of	email	messages	can	quickly	create	massive	disruption	
and	financial	loss	for	an	organization,	not	least	when	emailed	instructions	from	clients	are	called	into	question,	
timings	for	decisions	need	to	be	referenced,	or	users	simply	want	to	recall	old	email	for	research	purposes.




Going beyond Exchange 2010 - Why it pays to have a dedicated email archiving solution                               3
Recent	research	by	storage	analyst	MacArthur	Stroud	revealed	that	40	percent	of	respondents	failed	to	test	
their	disaster	recovery	system	more	than	once	a	year,	while	a	third	of	respondents	admitted	they	have	no	data	
archiving	strategy	in	place	whatsoever2.
The	survey,	which	went	to	200	medium	to	large	European	enterprises,	found	that	a	four-hour	loss	of	email	
might	result	in	administrative	disruption,	inconvenience,	lost	productivity	and	decreased	customer	satisfaction.
Failed	backups,	read/write	errors	with	storage	devices	and	broken	process	scripts	can,	and	often	do,	go	
unnoticed	if	the	procedure	is	not	tested	and	verified	regularly.	Failure	to	archive	effectively	or	at	all	can	lead	to	
an	organization	being	hit	with	significant	fines	by	regulators,	in	addition	to	the	data	loss	risk	created	by	email	
being	retained	solely	on	client	computers.
2	
    http://www.infosecurity-magazine.com/view/16139/report-claims-ukeuropean-firms-are-poorly-prepared-for-data-loss-event


The compliance challenge
The	importance	of	retaining	and	being	able	to	recover	email	messages	and	conversation	threads	was	
underlined	by	financial	services	giant	Morgan	Stanley,	which	was	fined	$15	million	in	2006	for	failing	to	retain	
emails3.	The	fine	is	the	largest	to	date	handed	out	in	the	US	for	failing	to	retain	email	that	is	relevant	to	the	
operation	of	a	business	and	the	relationship	between	organization	and	customer.	It	was	not	the	first	time	that	
Morgan	Stanley’s	retention	of	email	was	called	into	question.
The	previous	year	Morgan	Stanley	was	ordered	to	pay	Ronald	Perelman,	the	billionaire	investor,	$1.57	billion	
in	damages	related	to	the	sale	of	his	camping	equipment	firm,	Coleman,	to	Sunbeam	Corporation.	Perelman	
claimed	the	bank	knew	or	should	have	known	the	perilous	state	of	Sunbeam	Corporation’s	finances,	which	
filed	for	bankruptcy	in	2001.	Perelman	alleged	he	suffered	millions	of	dollars	in	losses	because	stock	he	
received	in	the	deal	plunged	in	value.	When	challenged,	Morgan	Stanley	failed	to	locate	and	hand	over	emails	
requested	by	lawyers	detailing	its	guidance	to	Perelman	on	the	deal.
Morgan	Stanley	appealed	the	decision	and	won,	but	the	case	and	subsequent	SEC	fine	highlighted	the	
financial	importance	of	retaining	email	and	being	able	to	recall	it	when	challenged.
3
 http://www.computing.co.uk/ctg/news/1833828/poor-email-controls-prove-costly


The challenges facing IT departments in storing critical business email
The	use	of	Exchange	2010’s	built-in	capabilities	must	be	measured	against	the	needs	of	the	organization	and	
the	expectation	of	customers,	suppliers	and	regulators	with	regards	to	data	protection	and	retention.	This	is	
especially	true	when	reviewing	archiving	needs.
SMEs	require	cost-effective,	reliable	solutions	that	deliver	a	clear	return	on	investment	in	terms	of	operational	
performance	and	competitive	advantage.	When	choosing	an	email	archiving	solution,	organizations	need	to	
consider	whether	the	solution	adequately	deals	with	the	following:
»»     Dealing	with	Outlook	PST	files:	The	PST	file	format	used	by	Microsoft	Outlook	as	a	silo	for	incoming	and	
       outgoing	email	is	a	point	of	risk	for	email	data.	Large,	locally	stored	archive	PST	files	put	email	at	risk	
       from	corruption.	With	a	good	email	archiving	solution,	mailbox	size	is	no	longer	a	key	consideration	for	
       the	end-user,	and	the	IT	department	no	longer	needs	to	be	concerned	about	capping	mailbox	sizes	to	
       manage	storage	load	and	server	performance.	Email	contents	and	attachments	from	both	incoming	and	
       outgoing	emails	can	be	captured,	indexed	and	stored	in	a	read-only	format	in	a	separate	database	off	the	
       email	server.	Also,	by	separating	the	archive	from	the	immediate	Exchange	email	repository,	access	to	the	
       archive	is	not	lost	if	the	mail	server	goes	down	for	any	reason.	
       	
       	
       	
       	
       	



Going beyond Exchange 2010 - Why it pays to have a dedicated email archiving solution                                        4
»»   Achieving	compliance:	Faced	with	a	myriad	of	internal	regulations	that	govern	the	retention	of	
     email	including	Basel	II	(Global),	Sarbanes	Oxley	(US),	the	Data	Protection	Act	(UK)	and	the	EU	Data	
     Protection	Directive,	organizations	must	keep	a	contemporaneous	record	of	all	inbound	and	outbound	
     communication.	In	the	past,	this	has	been	tackled	by	retaining	all	email,	including	duplicate	instances,	
     creating	a	massive	storage	burden	and	retrieval	problem	in	the	process.	Effective	archiving,	combined	
     with	centralized,	read/write	controlled	access	to	the	archive,	will	minimize	the	risk	of	accidental	and	
     malicious	deletion	of	material	while	still	enabling	an	organization	to	respond	to	legally	binding	requests	
     for	email	conversation	disclosure.
»»   Improved	internal	performance	and	accountability:	Email,	like	a	letter,	is	a	legally	binding	statement	
     and	must	be	retained	in	order	for	the	organization	to	prove	its	position	or	disprove	that	of	a	customer	
     or	supplier	in	the	event	of	a	dispute.	Archiving	and	retention	at	the	point	of	reception	allows	for	all	
     conversations	to	be	recorded	for	future	disclosure	and	as	proof	of	liability,	while	at	the	same	time	
     maintaining	audit	trails	for	anyone	accessing	the	information	or	trying	to	delete	material	and	alter	the	
     conversation	timeline.
»»   Improved	data	storage:	A	full-featured	email	archiving	solution	can	significantly	reduce	the	overall	storage	
     requirement	for	email.	By	removing	reliance	on	PST	files,	emails	and	their	attachments	can	be	archived	
     into	more	space-efficient	database	formats,	allowing	for	better	compression	and	data	ordering	that	the	
     PST	format	is	not	compatible	with.	Furthermore,	email	can	be	de-duplicated,	meaning	that	the	archive	
     need	only	contain	a	single	instance	of	an	email.	If	the	same	mail	is	sent	to	30	people	in	an	organization,	
     there	is	no	longer	a	need	to	store	that	email	–	and	its	attachments	–	30	times.	A	single	instance	can	be	
     retained,	the	rest	discarded	and	the	one	copy	served	to	any	of	the	30	original	recipients	on	demand.
»»   Effective	search	and	data	mining:	The	larger	a	PST	file	grows,	the	longer	it	takes	to	search	through	it.	Also,	
     retaining	email	in	multiple	archive	PSTs	creates	another	issue	–	the	inability	to	search	across	multiple	PSTs	
     in	a	single	search	request.	Each	one	needs	to	be	mined	individually.	By	centralizing	the	archive	into	a	
     single,	efficient	database,	search	performance	is	increased	and	the	problems	of	searching	across	multiple	
     PST	files	is	eliminated,	improving	operational	and	competitive	performance	and	simplifying	the	process	of	
     locating	legacy	emails.

Choosing an archiving solution
The	technologies	needed	to	deliver	effective	email	archiving	without	compromising	on	performance	or	
reliability	–	and	without	losing	control	of	costs	–	do	exist	and	are	within	reach	of	the	SME	community.
When	choosing	an	email	archiving	product,	such	as	GFI	MailArchiver,	all	the	above	points	should	be	
addressed	effectively	and	efficiently.	You	need	a	solution	that	allows	you	to	store	email	in	a	central	location	yet	
remains	easily	accessible	in	two	ways:	through	a	folder	in	your	user’s	Outlook	email	client	(including	Outlook	
2010),	or	by	using	a	web	browser.	By	integrating	closely	with	Outlook	in	a	first-in-its-class	manner,	the	solution	
should	also	avoid	the	use	of	stub	files	which	other	products	use	but	is	not	recommended	by	Microsoft.	
Although	stub	files	are	smaller	in	size,	that	reduced	size	of	message	does	not	really	avoid	the	problems	that	
stubbing	was	meant	to	prevent.	Performance	issues	faced	by	Outlook	users	have	more	to	do	with	large	
numbers	of	messages	rather	than	large	emails.	Over	time,	these	thousands	of	small	stub	messages	amount	
to	a	performance	hit	since	item	counts	is	the	primary	performance	driver	for	the	Exchange	store	rather	than	
aggregate	size.
Message	contents	and	attachments	should	also	be	automatically	extracted	from	both	incoming	and	outgoing	
emails	at	the	initial	server-side	point	of	reception	and,	after	being	indexed,	are	stored	in	a	read-only	format	–	
this	ensures	that	your	archived	records	are	maintained	in	their	original	state.
By	retaining	all	email	in	a	single	repository,	your	email	database	remains	protected	and	can	be	used	as	a	
contemporaneous	record	of	all	inbound	and	outbound	communication.	Employees	can	still	be	granted	full	
access	to	their	archives,	but	in	a	read-only	manner,	protecting	the	integrity	of	the	archive	at	all	times.	Even	
administrators	with	read/write	access	are	unable	to	alter	the	archive	contents	unnoticed,	due	to	full	logging	of	
activity	that	cannot	be	tampered	with,	essential	for	good	compliance	and	robust	legal	defense.


Going beyond Exchange 2010 - Why it pays to have a dedicated email archiving solution                              5
Summary
While	small	and	medium-sized	enterprises	do	not	typically	produce	or	receive	the	same	volume	of	email	as	
a	larger	enterprise,	businesses	of	all	sizes	face	the	same	challenge:	email	is	an	ever-increasing	silo	of	data	that	
needs	to	be	archived	and	recalled	as	needed.
By	understanding	how	email	is	handled	and	stored,	either	centrally	or	locally,	within	the	organization	
today,	and	looking	at	how	that	process	can	be	improved	through	effective	centralized	archiving	and	robust	
retention,	organizations	can	improve	all	aspects	of	email	management	and	adherence	to	information	
management	compliance,	while	at	the	same	time	improving	the	email	experience	for	end-users.

About GFI
GFI	Software	provides	web	and	mail	security,	archiving,	backup	and	fax,	networking	and	security	software	
and	hosted	IT	solutions	for	small	to	medium-sized	enterprises	(SMEs)	via	an	extensive	global	partner	
community.	GFI	products	are	available	either	as	on-premise	solutions,	in	the	cloud	or	as	a	hybrid	of	both	
delivery	models.	With	award-winning	technology,	a	competitive	pricing	strategy,	and	a	strong	focus	on	the	
unique	requirements	of	SMEs,	GFI	satisfies	the	IT	needs	of	organizations	on	a	global	scale.	The	company	has	
offices	in	the	United	States	(North	Carolina,	California	and	Florida),	UK	(London	and	Dundee),	Austria,	Australia,	
Malta,	Hong	Kong,	Philippines	and	Romania,	which	together	support	hundreds	of	thousands	of	installations	
worldwide.	GFI	is	a	channel-focused	company	with	thousands	of	partners	throughout	the	world	and	is	also	a	
Microsoft	Gold	Certified	Partner.
More	information	about	GFI	can	be	found	at	http://www.gfi.com.




Going beyond Exchange 2010 - Why it pays to have a dedicated email archiving solution                              6
USA,»CANADA»AND»CENTRAL»AND»SOUTH»AMERICA
15300	Weston	Parkway,	Suite	104,	Cary,	NC	27513,	USA
Telephone:	+1	(888)	243-4329	
Fax:	+1	(919)	379-3402
ussales@gfi.com	



UK»AND»REPUBLIC»OF»IRELAND
Magna	House,	18-32	London	Road,	Staines,	Middlesex,	TW18	4BP,	UK
Telephone:	+44	(0)	870	770	5370	
Fax:	+44	(0)	870	770	5377
sales@gfi.co.uk	



EUROPE,»MIDDLE»EAST»AND»AFRICA
GFI	House,	San	Andrea	Street,	San	Gwann,	SGN	1612,	Malta
Telephone:	+356	2205	2000
Fax:	+356	2138	2419
sales@gfi.com		



AUSTRALIA»AND»NEW»ZEALAND
83	King	William	Road,	Unley	5061,	South	Australia
Telephone:	+61	8	8273	3000
Fax:	+61	8	8273	3099
sales@gfiap.com	




Disclaimer

©	2011.	GFI	Software.	All	rights	reserved.	All	product	and	company	names	herein	may	be	trademarks	of	their	respective	owners.	

The	information	and	content	in	this	document	is	provided	for	informational	purposes	only	and	is	provided	“as	is”	with	no	warranty	of	any	kind,	either	express	or	implied,	including	but	
not	limited	to	the	implied	warranties	of	merchantability,	fitness	for	a	particular	purpose,	and	non-infringement.	GFI	Software	is	not	liable	for	any	damages,	including	any	consequential	
damages,	of	any	kind	that	may	result	from	the	use	of	this	document.	The	information	is	obtained	from	publicly	available	sources.	Though	reasonable	effort	has	been	made	to	ensure	the	
accuracy	of	the	data	provided,	GFI	makes	no	claim,	promise	or	guarantee	about	the	completeness,	accuracy,	recency	or	adequacy	of	information	and	is	not	responsible	for	misprints,	out-
of-date	information,	or	errors.	GFI	makes	no	warranty,	express	or	implied,	and	assumes	no	legal	liability	or	responsibility	for	the	accuracy	or	completeness	of	any	information	contained	in	
this	document.

If	you	believe	there	are	any	factual	errors	in	this	document,	please	contact	us	and	we	will	review	your	concerns	as	soon	as	practical.

Contenu connexe

Similaire à Going beyond Exchange 2010

Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010Osterman Research, Inc.
 
Ergo Microsoft Lync 2010 Brochure
Ergo Microsoft Lync 2010 BrochureErgo Microsoft Lync 2010 Brochure
Ergo Microsoft Lync 2010 BrochureNiamhLordan
 
Mergers & Acquisitions
Mergers & AcquisitionsMergers & Acquisitions
Mergers & Acquisitionsdmurph4
 
Uc technical view-microsoft
Uc technical view-microsoftUc technical view-microsoft
Uc technical view-microsofthlilou
 
Webinar: How an enterprise can Benefit from Email Archiving
Webinar: How an enterprise can Benefit from Email ArchivingWebinar: How an enterprise can Benefit from Email Archiving
Webinar: How an enterprise can Benefit from Email ArchivingVaultastic
 
IBM Lotus Notes / Domino upgrades
IBM Lotus Notes / Domino upgradesIBM Lotus Notes / Domino upgrades
IBM Lotus Notes / Domino upgradesDarren Adams
 
Webinar Presentation: Why Enterprises Need Email Archiving
Webinar Presentation: Why Enterprises Need Email ArchivingWebinar Presentation: Why Enterprises Need Email Archiving
Webinar Presentation: Why Enterprises Need Email ArchivingVaultastic
 
IDC Archiving
IDC ArchivingIDC Archiving
IDC Archivingarms8586
 

Similaire à Going beyond Exchange 2010 (9)

Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010
 
Ergo Microsoft Lync 2010 Brochure
Ergo Microsoft Lync 2010 BrochureErgo Microsoft Lync 2010 Brochure
Ergo Microsoft Lync 2010 Brochure
 
Mergers & Acquisitions
Mergers & AcquisitionsMergers & Acquisitions
Mergers & Acquisitions
 
Uc technical view-microsoft
Uc technical view-microsoftUc technical view-microsoft
Uc technical view-microsoft
 
Webinar: How an enterprise can Benefit from Email Archiving
Webinar: How an enterprise can Benefit from Email ArchivingWebinar: How an enterprise can Benefit from Email Archiving
Webinar: How an enterprise can Benefit from Email Archiving
 
IBM Lotus Notes / Domino upgrades
IBM Lotus Notes / Domino upgradesIBM Lotus Notes / Domino upgrades
IBM Lotus Notes / Domino upgrades
 
Webinar Presentation: Why Enterprises Need Email Archiving
Webinar Presentation: Why Enterprises Need Email ArchivingWebinar Presentation: Why Enterprises Need Email Archiving
Webinar Presentation: Why Enterprises Need Email Archiving
 
Enterprise 2.0
Enterprise 2.0Enterprise 2.0
Enterprise 2.0
 
IDC Archiving
IDC ArchivingIDC Archiving
IDC Archiving
 

Plus de GFI Software

Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013GFI Software
 
Network Environments
Network EnvironmentsNetwork Environments
Network EnvironmentsGFI Software
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data BackupsGFI Software
 
Master Class Series
Master Class SeriesMaster Class Series
Master Class SeriesGFI Software
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability ManagementGFI Software
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™GFI Software
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementGFI Software
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerGFI Software
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security SolutionsGFI Software
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web SecurityGFI Software
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkGFI Software
 
How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR SpamGFI Software
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 

Plus de GFI Software (20)

Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013
 
Network Environments
Network EnvironmentsNetwork Environments
Network Environments
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
Email Continuity
Email ContinuityEmail Continuity
Email Continuity
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data Backups
 
Data Backups
Data BackupsData Backups
Data Backups
 
Master Class Series
Master Class SeriesMaster Class Series
Master Class Series
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log Management
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManager
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security Solutions
 
Maxmp greylisting
Maxmp greylistingMaxmp greylisting
Maxmp greylisting
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web Security
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your Network
 
How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR Spam
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 

Dernier

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Dernier (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Going beyond Exchange 2010