ARCHITECTURAL OVERVIEW Availability Service (EAS) with Activ box
|
|
- Lilian Page
- 8 years ago
- Views:
Transcription
1 ARCHITECTURAL OVERVIEW Availability Service () with Activ box Availability Service () with Activ box For Microsoft Exchange -Centric Environments
2 The Market Need for Through direct customer validation with Global 2000 companies SunGard identified the need for a low-cost, easy-to-implement solution that provides continuity of service during a crisis impacting the primary system. The two key differentiators of the SunGard solution versus traditional approaches to high availability are solution cost and deployment time. With the goal of radically decreasing both cost and implementation time, SunGard evaluated new approaches to providing continuity and developed a solution that costs a fraction of traditional solutions would cost while retaining most of the critical benefits. This breakthrough offering in the disaster recovery space is called ( Availability Service). Current high-availability / continuity solutions ecosystem Alternative (server replication) high bandwidth cost complex to manage requires redundant hardware real-time replication Only SunGard delivers a comprehensive solution that offers: enterprise-wide coverage instantaneous activation a breakthrough price point the most flexible deployment models Cost SunGard continuity/ suite of products low bandwidth cost easy to manage enterprise-wide protection real-time replication instantaneous & transparent activation offered as stand-alone software or hosted service most cost-effective & affordable solution Alternative (tape restore) long restore time (24hr+) requires expensive logistics (tapes, personnel, hardware) server-by-server restore failure-prone difficult to test Time Traditional solutions are costly and complex in part because of the upfront costs to replicate tremendous data volumes stored in today s systems. This data volume drives high bandwidth, storage, and administration costs. focuses on maintaining continuity, is designed to provide immediate Return Time Objective (RTO) of a transparent system for approximately one-tenth of the cost of traditional solutions while enabling bandwidth usage tailored to your requirements for historical storage. with Activ box TM keeps storage costs low by allowing administrators to determine which users have access to historical during an outage and the amount of history that is stored for each user. for Microsoft Exchange can typically be deployed in less than one day and contains several different implementation options depending on the details of a company s architecture. for Exchange 2000 and Exchange 2003 has the ability to redirect mail messages around a failure by deploying SunGard s Redirector Sinks. These optional components allow an organization to failover selected parts of their overall messaging topology to while leaving other parts unchanged. Availability Service () with Activ box: Architecture Overview: Microsoft Exchange-Centric Environments 2
3 Architectural Components Summary COMPONENT DESCRIPTION PLATFORM SUPPORT A hosted, backup mail system managed and administered by SunGard 5.5 / 2000 / 2003 SyncManager Customer managed software that keeps the mail system current 5.5 / 2000 / 2003 RecoveryManager RedirectorSink The Infrastructure The Infrastructure is the backup mail system that takes over for the primary mail system in the event of an disruption. The Infrastructure enables employees to have access to anytime and anywhere. When is not active it acts as a store-and-forward system for a company s primary system. This is useful in the case of minor outages that do not constitute sufficient reason to activate. Activating allows users to access their even though the primary system may not be available. A primary benefit of to the Exchange market is that provides end users with continuity of all the critical components they require on a daily basis - not only providing 100% coverage of internal and external , but also access to historical with Activ box, access to calendars as well as contacts. is readily deployed in the most complex, highly distributed, centralised/decentralised Exchange environments and provides the same robust service regardless of your specific configuration. What is it? Customer managed software that automatically imports messages into the primary mail system 5.5 / 2000 / 2003 after recovery An Exchange 2000 Event Sink that enables the dynamic re-routing of messages required in order to have some users active on the while other users remain on the primary mail system. Also 2000 / 2003 responsible for transferring copies of mail for Activ box enabled users to the RedirectorController Customer managed software that sends updates to the RedirectorSinks 2000 / 2003 RedirectorManager A centralized console to install, upgrade, and maintain RedirectorSinks 2000 / 2003 Responsible for relaying mail to for Activ box in a secure and efficient manner 2000 / 2003 Authentication Controller (Optional) Software that extends a customer s security policy for authentication to 2000 / 2003 The Infrastructure is capable of hosting a large number of mail users in the event of disaster. It is kept in sync with the primary mail system by use of the SyncManager. This ensures that when is activated it has the latest snapshot of the company directory and personal contacts. Through Activ box, provides immediate access to customised amounts of historical . Bandwidth can be managed and costs minimized by synchronizing specified amounts of historical mail for different users. The Infrastructure is managed by SunGard and hosted at SunGard s world-class Information Availability facilities. The Infrastructure is based on a highly scalable open source code base. The benefits of this include scalability, low cost, and the ability to be resistant to poison pill corruptions that would affect an Exchange-based backup solution. The Infrastructure is easily tested without the risk of taking down the primary mail system. How it works When a disaster is declared by a customer, can rapidly enable employee mailboxes (over 50,000 in less than 1 minute). can send notification messages to employees mobile phones, personal addresses, pagers, BlackBerries, etc. Employees have access to their anytime and anywhere using a simple web browser. They can send and receive messages to anyone on their contact list, access their calendars and historical with Activ box. Availability Service () with Activ box: Architecture Overview: Microsoft Exchange-Centric Environments 3
4 Security All data transmission in/out of the Infrastructure is conducted over 128-bit SSL. Inbound data syncs from the SyncManager can be conducted over a dedicated line or VPN. web servers use Thawte Certificate Authorities for authentication. servers are hosted in a secure, hardened, 24x7 hosting facility with the latest technologies in physical security, fire suppression, environmental systems, power management, and network availability. Activ box encrypts historical messages before they are transported, storing them in the archive in an encrypted format. This meets the secure storage requirements of HIPAA and other regulatory bodies. For organisations using Active Directory, enables Authentication Controller, as an option for users to login to with their Windows user names and passwords. SunGard has a strict policy never to share, sell, or distribute customer data to third parties not acting on behalf of SunGard, or in connection with the business of SunGard. For more information about Customer Data, please refer to our Privacy and Data Ownership Policies. Figure 1. The Infrastructure infrastructure topology Firewall Front-end servers MTA Store Load balancer Customer premises MTA infrastructure Availability Service () with Activ box: Architecture Overview: Microsoft Exchange-Centric Environments 4
5 The SyncManager The SyncManager plays a critical role in the system. The majority of the cost incurred by traditional DR/ HA solutions is due to redundant hardware and bandwidth that keep the backup hardware replicated with the latest data. The SyncManager allows customers to be smart about the portions of data they replicate and focus on the parts of mailboxes that have the highest value during a disaster while leaving behind the parts of the mailbox that drive the traditional high costs and security concerns. For example, a typical configuration of the SyncManager would be to update the names of the mailboxes that should be created when a disaster is declared, replicate all of the personal contacts from the mailbox and replicate the calendar entries from the mailbox, but not to replicate the hundreds of megabytes of old in the mailbox. The SyncManager puts the customer in control of the costs of providing continuity. The SyncManager will run on any Windows 2000/2003 computer and installs in approximately five minutes. The SyncManager runs as a Windows service and has a graphical UI for all setup and configuration. What is it? The SyncManager is software that runs in the customer s data centre that synchronises the most critical information required for to properly mimic the primary mail system. This can include the Global Address List, Personal Contacts, Distribution Lists and Calendar Entries. How it works The SyncManager queries the AD in Exchange 2000/2003 or the Exchange Directory Service in Exchange 5.5 in order to extract the list of all mailboxes in the environment. For each mailbox the SyncManager also extracts all valid SMTP addresses as well as personal contacts. Customers can define how often the replication should occur and at what time. Security CORPORATE SYSTEM SYNC AVAILABILITY RECOVERY Since the SyncManager runs as an NT service, the customer determines the NT Domain account that SERVICE the SyncManager will use for authentication permissions. All data collected by the SyncManager is compressed and encrypted with 128-bit SSL before transmission. The SyncManager always connects to the Infrastructure, never the reverse. As a result, only an outbound TCP session is required by the SyncManager. No computers outside of the company firewall require access to the SyncManager computer. Figure 2. The SyncManager CORPORATE SYSTEM SYNC RECOVERY AVAILABILITY SERVICE SYNC CORPORATE Availability Service SYSTEM () with Activ box: Architecture Overview: Microsoft Exchange-Centric Environments 5 RECOVERY AVAILABILITY SERVICE
6 The RecoveryManager The RecoveryManager fulfills an essential role in post-recovery operations the migration of all from the backup system to the primary system. Employees expect that sent or received during the activation of the will not be lost when the primary mail system is restored. This process is automated by the RecoveryManager. After the primary system is repaired and brought back online after the disaster, is deactivated. When is deactivated it generates archive files of all messages sent, received, deleted, or saved as drafts. This alone is an industry regulatory requirement for many companies. The RecoveryManager software reads the archive files and uses MAPI to connect to mail servers in the primary messaging system and restore mail directly to mailboxes. The RecoveryManager preserves message properties such as read/unread status, time/date stamp, etc. The RecoveryManager also puts messages into their SYNC proper folders upon recovery; for example, sent messages to the CORPORATE Sent Items folder, deleted messages to the Deleted Items folder, etc. The RecoveryManager will run on any Windows 2000/2003 computer and installs SERVICE in approximately five minutes. What is it? The RecoveryManager is a customer run software application that automatically migrates messages sent/ received on back into the Exchange environment post-disaster. How it works The RecoveryManager connects to the Exchange servers over MAPI and injects the messages to be recovered. This does not cause downtime to end users. The RecoveryManager maps messages to mailboxes using their GUID, enabling migration of a mailbox from one server to another during the recovery process. SYNC The RecoveryManager processes archived files that contain mail for groups of mailboxes. As a result it SYSTEM can import mail for many people without manual intervention RECOVERY (unlike using exmerge AVAILABILITY with PSTs). Security SYSTEM CORPORATE RECOVERY AVAILABILITY SERVICE The RecoveryManager derives its privileges from the currently logged in user. That user account must have write privileges to the mailboxes being recovered. Figure 3. The RecoveryManager CORPORATE SYSTEM SYNC RECOVERY AVAILABILITY SERVICE Availability Service () with Activ box: Architecture Overview: Microsoft Exchange-Centric Environments 6
7 The RedirectorSink The RedirectorSinks were designed to allow customers to activate for partial failures of their Exchange 2000/2003-based messaging systems. In order to make this possible a mechanism must be in place to route incoming internet messages destined for users on impacted servers to. The re-routing is also necessary to ensure the proper delivery of internal company messages sent from individuals still on Exchange to individuals moved to. RedirectorSinks take advantage of Exchange 2000/2003 s open Event Sink architecture that provides a clean integration point for third party software vendors. The RedirectorSink can quickly enable a server to re-route messages destined to a server that is known to be down. Once activated, the RedirectorSink can ensure that messages for downed servers are being routed to and not queued in Exchange. What is it? The RedirectorSink is an Exchange 2000/2003 Event Sink designed to re-direct mail routing to accommodate for failure of sections of a company s overall messaging system. The RedirectorSinks not only provide the capability for partial activation of, but also provide the intelligence to send copies of mail for Activ box through the to. How it works The RedirectorSinks take advantage of Exchange 2000/2003 s open Event Sink architecture that provides a clean integration point for third party software vendors. The RedirectorSink is deployed to Exchange servers using a centralised deployment and management application called the RedirectorManager. The Redirector Manager can install, upgrade, or remove the Event Sink from remote servers. The RedirectorSink is invoked when all messages pass through the Exchange server. However, when is in the normal or ready state, nothing is done. The performance overhead associated with this is negligible. The RedirectorSink can quickly enable a server to route copies of messages to the associated in a rapid and efficient manner, for all users enabled on Activ box. Each RedirectorSink knows the routable address of the to which it will route copies of Activ box mail. When there is a partial failure in the Exchange system, and the customer chooses to activate, the RedirectorSinks are sent a list of all mail addresses that require re-routing. This list is loaded into memory for performance. Security The RedirectorSinks are managed by a centralized management application. Installation of the RedirectorSinks requires proper NT Domain privileges. The RedirectorSinks do not have connections to servers outside of the firewall. The RedirectorSinks maintain connections with available Controllers which act as proxies for the routing configuration information. Figure 4. The RedirectorSinks SG SG SG SG CONTROLLER SG SunGard RedirectorSink Availability Service () with Activ box: Architecture Overview: Microsoft Exchange-Centric Environments 7
8 The RedirectorController The RedirectorController sends routing configuration updates to the RedirectorSinks and to aggregate status of the RedirectorSinks prior to transmission to. RedirectorSinks maintain connections to RedirectorControllers for updated routing information. They also inform the Controllers of their overall status. Since the RedirectorControllers are required components during an activation, it is recommended that a customer deploy more than one RedirectorController. The RedirectorSinks can manage concurrent connections to many RedirectorControllers. The RedirectorControllers regularly poll the Infrastructure for routing updates (to forward to the RedirectorSinks). What is it? The RedirectorController is a customer managed software application that runs as a Windows service on a Windows 2000/2003 computer in the customer s data centre. How it works The RedirectorController regularly polls Infrastructure for latest message routing information. The RedirectorSinks maintain connections to the RedirectorControllers for latest message routing information. Security The RedirectorSinks serve as a proxy for configuration information being relayed from to the RedirectorSinks on the Exchange servers. Because of the RedirectorController, a direct connection from the Exchange servers to the internet is not necessary. The RedirectorController polls the Infrastructure over SSL (port 443). The RedirectorSinks communicate with the RedirectorController over a high numbered TCP port (port 10709). Figure 5. The RedirectorController SG SG SG SG CONTROLLER Availability Service () with Activ box: Architecture Overview: Microsoft Exchange-Centric Environments 8
9 The Vaultbox The was designed to address three specific customer requirements. First, is the requirement that all transferred from the primary mail system to the be done in a secure fashion. To address this, the strongly encrypts each message using a customer-specific encryption passphrase. The second customer requirement is that all be compressed in order to minimise bandwidth usage. The not only compresses message before transmission but also captures messages in a single-instance compliant manner; greatly reducing the bandwidth required versus traditional Exchange Journaling. The third and final key requirement is that the system minimises impact on the primary Exchange system. To address this, the performs all encryption and compression on a separate machine, minimising the additional load and impact to the primary system. What is it? The is software that runs in the customer s data centre on a dedicated server accessible to the associated Exchange Servers. The provides for encryption and compression of messages before transmitting them to. In order to configure Activ box, the software is installed on a dedicated server to which the associated Exchange Servers can connect. RedirectorSinks are installed on each Exchange server, and an entry for each in DNS is added in order to properly route mail to the. How it works Essentially, is responsible for assuring secure and efficient transmission from the corporate environment to the service. The is configured to receive for a specific routable entry in local DNS. The copies of for Activ box are routed using the Redirector Sink to the. The Vaultbox encrypts and compresses messages for secure transmission to. For distributed environments, a can be placed in each geographic location to reduce intra-site and inter-site routing of messages. can also be installed on multiple servers to provide redundancy. Security The plays a key role in providing message transport and storage security. The encrypts each message before transmitting over an encrypted channel to the service. Figure 6. SMTP SG SG SG SG ARCHIVE Availability Service () with Activ box: Architecture Overview: Microsoft Exchange-Centric Environments 9
10 The Authentication Controller (Optional) Authentication Controller allows Exchange 2000 and Exchange 2003 customers to extend their security policy for authentication to. Authentication Controller allows employees to log into the using their, Windows password. This removes the need for a separate password for and improves the ease of activation and an overall better user experience. What is it? The Authentication Controller is a customer managed software application that runs as a Windows service on a Windows 2000/2003 computer in the customer s data centre and proxies login requests from the to a local Active Directory server in real-time. How it works Authentication Controller must be deployed on at least one server per domain controller. For geographically disparate locations that depend on a single domain controller, customers may choose to deploy one Authentication Controller per location. The Authentication controller can be installed on the same hardware as the SyncManager. will validate users passwords by queuing authentication request for secure retrieval by the Authentication Controller. The Authentication Controller retrieves the login requests and verifies if the login credentials are valid. The Authentication Controller communicates over a 128-bit encrypted, outbound only connection over HTTPS and queries the SunGard server if there are any authentication requests pending. Authentication Controller takes the login requests, checks them against the customer s Active Directory and returns a authentication result to the SunGard system. Security Like all communication, it will be initiated by components inside the customer s firewall rather than having the back end initiating contact. Authentication Controller also allows IT departments to extend their security policy out to, in terms of user lockout, password management, password strength, etc. Customers of this service will never have to send usernames and passwords outside of their corporate environment or open ports on their corporate firewall. Figure 7. The Authentication Controller HUB B DOMAIN CONTROLLER DOMAIN CONTROLLER WINDOWS AUTHENTICATION CONTROLLER WINDOWS AUTHENTICATION CONTROLLER LOGIN AUTHENTICATION REQUEST Availability Service () with Activ box: Architecture Overview: Microsoft Exchange-Centric Environments 10
11 Customer Environment with a Single Internet Hub Customers with a single inbound internet connection naturally have a single point of failure of their system. A loss of service at the hub site will impact the mailboxes hosted locally as well as any mailboxes hosted in remote sites that depend on that internet hub. can be deployed to restore service for an entire organisation. can also be used to provide protection in the event of the loss of a remote site without impacting the users hosted in the hub; this leverages s unique partial failover technology. Figures 8 and 9 depict the deployment of the SyncManager, RedirectorSinks, and RedirectorController. Figure 8. Customer Environment with a single Internet Hub before Installation INTERNET COMPANY MX Figure 9. Customer Environment with a single Internet Hub after Installation SG SG SG SG SG SG SG SMTP CONTROLLER SYNC ARCHIVE SYNC UPDATES (DIRECTORY, CONTACTS, ETC) INTERNET COMPANY MX Availability Service () with Activ box: Architecture Overview: Microsoft Exchange-Centric Environments 11
12 Customer Environment with Redundant Internet Hubs Customers with two inbound internet hubs have the benefit of added redundancy to their inbound mail handling process but also have a complication as it pertains to partial failover. handles this scenario with the installation of the RedirectorSink for Exchange This RedirectorSink allows companies to continue to receive mail by whatever inbound SMTP hosts remain active. In the event of a partial activation, the remaining Exchange servers dynamically route messages to that would normally be queued pending delivery to the downed Exchange server. This allows a company to have some users active on while others continue to be active on the Exchange-based mail system. Figure 10. Customer Environment with Two Internet Hubs before Installation HUB B INTERNET COMPANY MX Figure 11. Customer Environment with Two Internet Hubs after Installation SG SG SG SG SG SG HUB B SG SG SG SG SMTP SMTP SG SG SG SG CONTROLLER CONTROLLER SYNC SYNC ARCHIVE SYNC UPDATES (DIRECTORY, CONTACTS, ETC) ARCHIVE SYNC UPDATES (DIRECTORY, CONTACTS, ETC) INTERNET COMPANY MX Availability Service () with Activ box: Architecture Overview: Microsoft Exchange-Centric Environments 12
13 Figure 12. Partial Activation after the failure of a Remote Site SG SG SG SG SG SG HUB B SG SG SG SG SMTP SMTP SG SG SG SG CONTROLLER CONTROLLER SYNC SYNC ARCHIVE SYNC UPDATES (DIRECTORY, CONTACTS, ETC) ARCHIVE SYNC UPDATES (DIRECTORY, CONTACTS, ETC) INTERNET COMPANY MX Figure 13. Partial Activation after the failure of an Internet Hub SG SG SG SG SG SG HUB B SG SG SG SG SMTP VaultBo aultbox SMTP SG SG SG SG CONT TROLLER CONTROLLER SYNCMA ANAGER SYNC ARCHIVE SYNC UPDATES (DIRECTORY, CONTACTS, ETC) ARCHIVE SYNC UPDATES (DIRECTORY, CONTACTS, ETC) INTERNET COMPANY MX Availability Service () with Activ box: Architecture Overview: Microsoft Exchange-Centric Environments 13
14 Phases of Operation There are three major phases of operation of the : Before: After has been installed but before a disaster has been declared. During: From the time is activated until the time the primary messaging system is back on line. After: From the time the primary system has been recovered to the time that all data has been migrated back from to the primary system. Before: Complete installation takes less than one hour. The SyncManager keeps the directory in synchronised with the primary system. Settings are completely configurable. With smart replication, total bandwidth can be as low as 0.5kb per mailbox! The facility is configured as a low priority MX record which means it is never in the mail stream until the primary messaging system fails or is deactivated. In the event of a minor outage of the primary mail system, will queue mail and attempt to redeliver until the primary system comes back online. The operation of is done through a secure, web-based interface. Figure 14. Phases of Operation Before HISTORICAL MAIL ARCHIVE SUNGARD SITE Availability Service () with Activ box: Architecture Overview: Microsoft Exchange-Centric Environments 14
15 During: can be configured to be activated over the web or with a phone call. rapidly activates the temporary mailboxes in less than 60 seconds! Notification messages are sent to the electronic contacts of the company employees (mobile phones, BlackBerries, personal addresses, pagers, etc). Employees can access the Infrastructure anytime and anywhere. The company maintains complete continuity among its employees and all external contacts, such as customers and suppliers. Figure 15. Phases of Operation During HISTORICAL MAIL ARCHIVE SUNGARD SITE Availability Service () with Activ box: Architecture Overview: Microsoft Exchange-Centric Environments 15
16 After: creates an archive of all traffic sent and received while was active. The RecoveryManager automatically migrates all data sent and received from back to the primary system. Figure 16. Phases of Operation After HISTORICAL MAIL ARCHIVE SUNGARD SITE SunGard Availability Services For further information about or to arrange for a product demonstration, contact SunGard by calling or visit us at Availability Service () with Activ box: Architecture Overview: Microsoft Exchange-Centric Environments 16
ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0
ReadyNAS Replicate Software Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10727-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,
More informationExchange 2010 migration guide
HOW-TO GUIDE Exchange 2010 migration guide This guide details the best practices to follow when migrating from Microsoft Exchange 2003 to Microsoft Exchange 2010. The guidelines provided explain how to
More informationGiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
More informationThis course is intended for IT professionals who are responsible for the Exchange Server messaging environment in an enterprise.
10233A: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course Number: 10233A Course Length: 5 Day Course Overview This instructor-led course provides you with the knowledge
More informationKaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
More informationBUILT FOR YOU. Contents. Cloudmore Exchange
BUILT FOR YOU Introduction is designed so it is as cost effective as possible for you to configure, provision and manage to a specification to suit your organisation. With a proven history of delivering
More informationitg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.
Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your
More informationTroubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
More informationTechnical White Paper BlackBerry Enterprise Server
Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table
More informationService Overview CloudCare Online Backup
Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
More informationBlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
More informationConfiguration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
More informationHow To Use Attix5 Pro For A Fraction Of The Cost Of A Backup
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
More informationREDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION
REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION SD005 V2.0 Issue Date 02 July 2014 1) SERVICE OVERVIEW Redcentric's Managed Archive Service allows customers to regain control of their Microsoft Exchange
More informationEnterprise Vault.cloud Deployment Checklist
Enterprise Vault.cloud Deployment Checklist This checklist is for administrators of the Symantec Enterprise Vault.cloud service. It summarizes the tasks required to deploy the service. Document version
More informationWHY EMAIL FAILS DELL SURVEY OF EMAIL OUTAGES. WHITE PAPER Dell Modular Services. www.dell.com/modularservices
DELL SURVEY OF EMAIL OUTAGES WHITE PAPER Dell Modular Services www.dell.com/modularservices THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
More informationMimecast Unified Email Management
DATA SHEET Mimecast Unified Email Management An always-on, cloud-based email security solution that reduces the complexity of protecting your organization from malware, spam and data leakage. Mimecast
More informationwww.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
More informationHow To Get The Most Out Of Your Email From Your Mail Server (For A Small Business)
Hosted Exchange +SharePoint: Communication and Collaboration This is the next generation of affordable, reliable messaging and portal solutions with Microsoft Exchange 2010 and Microsoft SharePoint 2010.
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationredcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: support@redcoal.com Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
More informationEnterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
More informationConfiguration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More information5053A: Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007
5053A: Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007 Course Number: 5053A Course Length: 3 Days Course Overview This three-day instructor-led course provides students with the
More informationMCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring
MCSA Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
More informationFeature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
More informationOptus EmailSMS for MS Outlook and Lotus Notes
Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights
More informationMimecast Email Archive
DATA SHEET Mimecast Email Archive A dynamically scalable, secure, cloud-based archive that delivers near real-time searches and seamlessly integrates with Microsoft Outlook. Mimecast Email Archive is a
More informationBackup with synchronization/ replication
Backup with synchronization/ replication Peer-to-peer synchronization and replication software can augment and simplify existing data backup and retrieval systems. BY PAUL MARSALA May, 2001 According to
More informationM4 Systems. M4 Online Backup. M4 Systems Ltd Tel: 0845 5000 777 International: +44 (0)1443 863910 www.m4systems.com www.dynamicsplus.
M4 Systems M4 Online Backup M4 Systems Ltd Tel: 0845 5000 777 International: +44 (0)1443 863910 www.m4systems.com www.dynamicsplus.net Table of Contents Introduction... 3 Benefits... 3 Features... 4 Data
More informationהמרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר
מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.
More information70-662: Deploying Microsoft Exchange Server 2010
70-662: Deploying Microsoft Exchange Server 2010 Course Introduction Course Introduction Chapter 01 - Active Directory and Supporting Infrastructure Active Directory and Supporting Infrastructure Network
More informationLesson Plans Configuring Exchange Server 2007
Lesson Plans Configuring Exchange Server 2007 (Exam 70-236) Version 2.1 Table of Contents Course Overview... 2 Section 1.1: Server-based Messaging... 4 Section 1.2: Exchange Versions... 5 Section 1.3:
More informationOnline Transaction Processing in SQL Server 2008
Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,
More informationInstalling GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation
More informationMCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:
MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining
More informationServer Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
More informationUNCLASSIFIED. Cobweb Hosted Exchange 2010 Service Description
UNCLASSIFIED 14/01/2015 v1.2 Cobweb Hosted Exchange 2010 Service Description Cobweb Hosted Exchange 2010 is a business-class messaging and collaboration service designed to help your business communicate
More informationMigration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module
Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module WHITE PAPER May 2015 Contents Advantages of NEC / Iron Mountain National
More informationeztechdirect Backup Service Features
eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets
More informationHosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com
Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on
More informationREMOTE BACKUP-WHY SO VITAL?
REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More informationOverview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
More informationTechnical specifications
Technical specifications PhD Manager is built on the Haplo open source platform. The Haplo platform provides a flexible database tailored to storing information about the activities in complex organisations.
More informationSecurity Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
More informationHow To Use Egnyte
INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information
More informationCROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION
1 E N D U R A D A T A EDpCloud: A File Synchronization, Data Replication and Wide Area Data Distribution Solution CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION 2 Resilient
More informationBlackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
More informationWhy Email Fails MessageOne Survey of Email Outages
Why Email Fails MessageOne Survey of Email Outages White Paper MessageOne, Inc. 11044 Research Blvd. Building C, Fifth Floor Austin, TX 78759 Toll-Free: 888.367.0777 Telephone: 512.652.4500 Fax: 512.652.4504
More informationPrinterOn Enterprise Administration Support Guide
PrinterOn Enterprise Administration Support Guide Version 2.5 Doc Rev: 1.1 Table of Contents 1. Overview...4 2. Hardware and Operating System Requirements...5 2.1. Hardware Requirements...5 2.2. Software
More informationTHE SECURITY OF HOSTED EXCHANGE FOR SMBs
THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationConfiguration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
More informationMS-10135 - Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010
MS-10135 - Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Introduction This course will provide you with the knowledge and skills to configure and manage a Microsoft Exchange
More informationHow can I deploy a comprehensive business continuity and disaster recovery solution in under 24 hours without incurring any capital costs?
SOLUTION BRIEF: CA INSTANT RECOVERY ON DEMAND How can I deploy a comprehensive business continuity and disaster recovery solution in under 24 hours without incurring any capital costs? CA Instant Recovery
More informationFeatures and benefits guide for partners and their customers
and benefits guide for partners and their customers Version 3.0 and Guide for Partners and their customers Security Anti Virus Proofpoint s own threat detection technology enables our email Anti-Virus
More informationDesigning, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008
Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:
More informationEvolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016
Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationMigrating Exchange Server to Office 365
Migrating Exchange Server to Office 365 By: Brien M. Posey CONTENTS Domain Verification... 3 IMAP Migration... 4 Cut Over and Staged Migration Prep Work... 5 Cut Over Migrations... 6 Staged Migration...
More informationMCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring
MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
More informationUse of Exchange Mail and Diary Service Code of Practice
Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are
More informationWhy You Should Consider Cloud- Based Email Archiving. A whitepaper by The Radicati Group, Inc.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Why You Should Consider Cloud- Based
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationInterwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
More informationVERITAS NetBackup BusinesServer
VERITAS NetBackup BusinesServer A Scalable Backup Solution for UNIX or Heterogeneous Workgroups V E R I T A S W H I T E P A P E R Table of Contents Overview...................................................................................1
More informationSysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan
SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid IT On-Demand: Architecture Security Business Continuity and Disaster Recovery
More informationBuild Your Knowledge!
About this Course This course will provide you with the knowledge and skills to configure and manage a Microsoft Exchange Server 2010 messaging environment. This course will teach you how to configure
More informationBackup Exec Private Cloud Services. Planning and Deployment Guide
Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services
More informationLoad Balancing & High Availability
Load Balancing & High Availability 0 Optimizing System Resources through Effective Load Balancing An IceWarp White Paper October 2008 www.icewarp.com 1 Background Every server is finite. Regardless of
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationInstalling GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
More informationRingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.
RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...
More informationTable Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
More informationConfiguration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
More informationDisaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper
Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper Copyright 2011-2012 Dbvisit Software Limited. All Rights Reserved v2, Mar 2012 Contents Executive Summary... 1
More informationSix Steps to a Successful Email Migration to Exchange 2013. Step 1: Migration Project Assessment, Planning and Design
Six Steps to a Successful Email Migration to Exchange 2013 Six Steps to a Successful Email Migration to Exchange 2013 Migrating your organization s email to Exchange 2013, whether it be on premises or
More informationMS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008
MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials
More informationInteract Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
More informationBusiness Continuity: Choosing the Right Technology Solution
Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail
More informationBackup and Archiving Explained. White Paper
Backup and Archiving Explained White Paper Backup vs. Archiving The terms backup and archiving are often referenced together and sometimes incorrectly used interchangeably. While both technologies are
More informationexchange@pam email archiving at its best
exchange@pam email archiving at its best Whitepaper exchange@pam and Microsoft Exchange Server 2007 C O N T E N T exchange@pam and Microsoft Exchange Server 2007 What s new in the latest Microsoft Exchange
More information6231A - Maintaining a Microsoft SQL Server 2008 Database
6231A - Maintaining a Microsoft SQL Server 2008 Database Course Number: 6231A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft Certified Professional
More informationBlackBerry Enterprise Server Version: 5.0. Upgrade Planning Guide
BlackBerry Enterprise Server Version: 5.0 Upgrade Planning Guide SWDT577232-577232-0327090551-001 Contents 1 Overview: BlackBerry Enterprise Server... 3 2 Upgrading a BlackBerry Enterprise Server environment...
More informationREDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION
REDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION SD003 V2.3 Issue Date 02 July 2014 1) SERVICE OVERVIEW The Managed Backup Service (MBS) is a streamlined alternative to traditional backup and restore
More informationFeatures Security. File Versioning. Intuitive User Interface. Fast and efficient Backups
IBackup Professional provides a secure, efficient, reliable, cost effective and easy to use Internet based backup solution with additional emphasis on security and data retention. IBackup Professional
More informationGRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
More informationIntroduction to the AirWatch Cloud Connector (ACC) Guide
Introduction to the AirWatch Cloud Connector (ACC) Guide The AirWatch Cloud Connector (ACC) provides organizations the ability to integrate AirWatch with their back-end enterprise systems. This document
More informationBlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
More informationCA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server
CA RECOVERY MANAGEMENT R12.5 BEST PRACTICE CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering
More informationVMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
More informationMS 10135B Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010
MS 10135B Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Description: Days: 5 Prerequisites: This course will provide you with the knowledge and skills to configure and manage
More informationConfiguring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2
Course 10135B: Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2 Course Details Course Outline Module 1: Deploying Microsoft Exchange Server 2010 This module describes
More informationRemote Data Management & Backup with Snap EDR
Remote Data Management & Backup with Snap EDR CONTENTS Abstract...1 Understanding the Challenges of Remote Data...1 Key Considerations for Managing Remote Data...1 Additional Requirements for Remote Data
More informationCA ARCserve Family r15
CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing
More informationConfiguring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2
About this Course This course will provide you with the knowledge and skills to configure and manage a Microsoft Exchange Server 2010 messaging environment. This course will teach you how to configure
More informationLibrary Recovery Center
Library Recovery Center Ever since libraries began storing bibliographic information on magnetic disks back in the 70 s, the challenge of creating useful back-ups and preparing for a disaster recovery
More information