ANSWERS TO FREQUENTLY ASKED QUESTIONS
|
|
|
- Dorthy Blake
- 10 years ago
- Views:
Transcription
1 Infrastructure & Security Q&A: ANSWERS TO FREQUENTLY ASKED QUESTIONS How is the solution hosted? Intermedia's solution is 100% Web based. There is no hardware or software to install and address compliance and archiving. The Intermedia solution will be accessed utilizing a secure, web interface. What is the maximum number of users the solution can handle? Infinite. Intermedia utilizes Amazon S3 cloud infrastructure, which allows the unique ability to scale and grow ondemand with no impact on our customers. Should the customer need more computing or storage, Intermedia can intelligently access more of these resources without any changes to customer s service, network or pricing. Provide statistics on what to expect for bandwidth consumption. Intermedia assumes megabytes of data traffic per user per month. How is customer data stored? Data stored in the Intermedia archive is redundantly stored in multiple physical locations as part of normal operation of the services and at no additional charge. Intermedia ensures object durability by storing objects multiple times across multiple datacenters on the initial write and then actively doing further replication in the event of device unavailability or detected bit-rot. This is all supported by default in the Amazon Web Services cloud infrastructure. Customer data is encrypted with AES-256bit encryption using a private key assigned to the account, then we batch them together into a 1GB Encrypted package and store it on Amazon's redundant global storage. All messages and attachments are date and time stamped, serialized and written to tamper-proof, dedicated customer WORM storage. How long is data stored for? Intermedia offers unlimited storage and retention at a fixed price. Is there a limit or maximum archive size? Intermedia offers unlimited storage and retention at a fixed price. What file format are the archives stored in? Data is compressed, encrypted and stored in the RFC 822 industry format (EML). Does the solution support WORM storage? Is the data forensically compliant? Intermedia has designed and implemented a proprietary software lock so that in the archive each customer is on WORM-like storage (similar to netapps snaplock & permabit) Satisfies FSA type requirements. Are messaged digitally finger printed for authenticity? Yes. Because all messages are stored in our secured WORM format it is impossible for the messages to be edited once archived. When data is exported from the system we provide MD5 hash to ensure data is not edited in transit Intermedia, Inc. All rights reserved 1
2 REQUEST FOR PROPOSAL - FAQs Does Intermedia s solution allow for efficient archives by storing just one copy of a file or message (Single-Instance- Storage), regardless of the number of times it occurs or where it is stored? Intermedia provides a fully redundant, unlimited storage model for the archive. The system has a series of proprietary compression technologies that are used to reduce our storage needs. But the customer is never charged for the storage usage. Does the solution allow for the encryption of data during data transport? Yes. TLS and SSL encryption methods are used during transport. Describe the standards you use for password: (Construction (strength), history retention, length, expiration) Passwords must be at least eight (8) positions in length. Passwords must contain a mix of alphabetic and non-alphabetic characters (numbers, punctuation or special characters) or a mix of at least two types of non-alphabetic characters. Passwords must not contain the userid as part of the password. Passwords must be changed at least once every 90 days. Passwords may not be reused for at least 2 years. Passwords must be set to an expired state when issued or reset unless system generated. Maximum of 5 unsuccessful attempts before lockout. Describe your policy on data mining of customer data? All data is encrypted using AES 256 bit encryption. Intermedia has no direct access to customer data unless customer explicitly asked and is given login credentials. How does Intermedia ensure data destruction? Intermedia uses encrypted disk volumes to protect customer data privacy. If a volume should become dismounted before it is destroyed, the encryption is the safeguard to prevent another non-intermedia entity from accessing the information stored on the volume. Encryption keys are maintained in an encrypted keystore and only accessible by the software. No data is cached or stored in temporary un-encrypted storage. Data destruction is accomplished by invoking the cloud compute infrastructure API delete functions AND encryption. The combination of the delete function and tossing the encryption key ensures data that needs to disappear is not recoverable. What functions are auditable? What information is recorded? Where is the information stored? Is the persistence of an audit record synchronous or asynchronous to the action being audited? What are the options available for configuring what gets audited? All login, search access, message interaction and administrative functions are recorded and audited. The information included is the originating IP, user name, date/time and activity. These audit logs are tamper proof and locked down from the customer site. There are no special configuration options available at this time. How are resiliency and reliability plus COB accomplished for your SMTP submission solution? For continuity and failover, the Intermedia s SMTP ingestion service runs in multiple regional availability zones located in Eastern US, Western US, Ireland, Singapore and Japan. Intermedia s SMTP ingestion service is directly integrated with the Amazon Web Services S3 taking advantage of its built in geographical diversity. In case of a catastrophic event, Intermedia SMTP service nodes can be dropped within minutes into non-impacted availability zones for continuity of service. During a COB / Disaster Recovery / Network Outage event, how do you resynchronize your storage and metadata (indexes, configurations, databases) to be consistent? How long does this take? Outage event has not previously occurred due to clustering. Underlying storage is based on eleven 9s of durability. In the event of a data loss re indexing speed can exceed 1 billion documents per day Intermedia, Inc. All rights reserved 2
3 How it works Q&A: How does the solution capture mail (e.g. log shipping, journaling, MAPI)? What capture methods are available? Intermedia utilizes journaling to stage s for archiving. Archiving collections happen by IMAP pulls or SMTP pushes. 1. Push Customer would configure mail server journaling to push via a secure SMTP stream to a unique SMTP address that Intermedia provides for our customers. 2. Pull Customer would allow Intermedia to connect to their Exchange server via IMAP over SSL (port 143, 993 or others) on a scheduled basis daily. Does the solution capture all s before they reach the recipient s mailbox? No, journaling stages the s for archiving followed by a push (SMTP) or pull (IMAP) of journaled s into the archive. How are users provisioned within the Intermedia archive service? Intermedia administrators have the ability to either manually add users or they can leverage LDAP integration. LDAP integration gives you the ability to leverage your directory information to provision and manage archive users and related attributes. LDAP integration is designed to help you streamline user provisioning, management, and authentication. What Operating systems are supported? The Intermedia solution is OS / platform agnostic. Can the solution handle multiple domains? Intermedia can simultaneously support an unlimited number of domains and environments. Does the solution allow for role-based administration? Yes. There are 4 basic levels built in to the solution. 1. Search Admin: does global searching, access to ALL Search admin plus: within admin interface, settings reports and policies are also accessible (that are normally in the admin only). Look but not touch. 3. Search User: only sees results of a search the admin executes. Can export from the set they are looking at. 4. End user: individual who can see & search own archive only. Can export own . Does the solution allow end users seamless access to messages in the mail client? If so, does this require stubbing? Please describe. Yes, Outlook uses folders accessing the end user web interface. This provides archive access with no plugins or software required. Stubbing is not required. Can Intermedia selectively archive users? Yes. Intermedia has the ability to selectively journal users based on storage groups / databases and through premium journaling rules. Does the solution capture all content types (e.g. messages, attachments, tasks, calendar entries, contacts)? Intermedia captures all s and attachments (mail enabled items). Intermedia captures all envelope and header data such as received date, To, CC, BCC and various other x-header information associated with the message. How does Intermedia perform reconciliation of each SMTP message submitted from the mail server so that each transmitted message is correlated to message ingestion within your archive? Supported. Intermedia has developed a separate database service that runs outside of the archiving service. Its sole purpose is to analyze, audit and report on potential data integrity gaps within the archive. Customer data entering the Intermedia archive service is immediately written to highly redundant storage in the form of an encrypted archive file. Intermedia will not acknowledge receipt of a message unless it has been written and verified to the redundant cloud storage service ( % data durability) Intermedia, Inc. All rights reserved 3
4 REQUEST FOR PROPOSAL - FAQs Does the solution support contemporaneous indexing of and all attachments? Yes, all collections are indexed and submitted to the archive at the same time. Describe how your solution associates objects with user names and records for employees and if it uses well-known methods such as Active Directory and Human Resource Databases. Intermedia integrates with Active Director and other LDAP enabled services for access control and to associate object classification, disposition and access. ( % data durability) Does the solution have the ability to monitor system health and report problems via , or other mechanism, to support staff? Yes. Intermedia constantly monitors the entire service (infrastructure & application) for compliance, service health, and data integrity. Systems and Network Engineers monitor the status of the archive service on a daily basis using automated tools allowing them to review reports and respond to hardware / software alerts quickly & efficiently. Discovery & Retention Q&A: Describe how the service offering could enable ediscovery, such as forensic analysis, audit ability, and other similar governance requirements. Intermedia offers the ability to request, locate and acquire electronically stored data. The archive service supports full stemming, wild card, boolean logic, proximity logic, fuzzy logic, character replacement and quoted phrase searches. Searches can be done by sender, recipient, subject, date range, or by message only, or by attachment only, and by message header properties. Search results can then be assigned to outside counsel for review. Legal holds can be placed on specific data to supersede retention polices. A complete audit trail is kept on all actions performed. Does the solution allow retention policies to be set to any length (i.e. 15 days, 1 month, 2 years, 10 years etc.)? All s will be retained on the system for an infinite period of time until an administrator enables the retention policy. At which time s older than the retention (not on a legal hold) will be purged. Retention time frames can be set to any time frame. Does the solution provide an audit trail? Yes. Once a user logs in an audit trail tracks every move. Access, viewing s, adding categories, every single action. All user types. Access to see: search admins (for searches). Account admins for everything. Does the solution provide a way to categorize messages and or search results? Yes. Searches can be categorized by default tags or buckets (Save, Reviewed, Starred, Attention) or custom tags can be created. Messages can be flagged for attention, or with custom tags that can be created and then messages categorized by those specific tags. Can the solution capture mail only for groups or end users who are in a policy? This is dependent on mail server journaling capabilities. Does the solution allow for the capture of mail for both individuals and entire data stores? This is dependent on mail server journaling capabilities. Does the solution allow retention policies to be applied to individual users, teams, departments and/or entire organizations? Currently, the archive service allows for a single retention policy for the entire organization. Roadmap plans to provide this feature are going to be included in a future release, ETA Q Can data archived be imported into other products? What would an exit strategy look like? Intermedia would export the data to the RFC822 format and either ship the data back or make the data available for download Intermedia, Inc. All rights reserved 4
5 REQUEST FOR PROPOSAL - FAQs What format can search results be exported to? Search results can be exported to.pst,.eml,.txt,.html,.pdf as well as.nsf. Does the solution have the ability for authorities or outside counsel to search the entire enterprise archive including message body, text, subject, sender, recipient, dates, attachments, keywords and metadata for targeted information? Yes. The Intermedia solution provides role-based permissions. One of these roles is called the Search Administrator. The Search admin has the ability to search the entire global archive and create searches based including but not limited to message body text, subject, sender, recipient, dates, attachments, keywords and meta data. What type of searches can be performed on the archive and does the solution support queries using Boolean logic? Yes Boolean logic, proximity and fuzzy logic is used. The archive service supports full stemming, wild card, and character replacement and quoted phrase searches. Searches can be done by sender, recipient, subject, date range, or by message only, or by attachment only, and by message header properties. Does the solution have the ability to produce hard and soft copies of reports including detailed and summarized information regarding the size, age and composition of the archived data? Yes. Intermedia provides a dashboard view, which provides information on number of messages in archive, size of archive, last collection data and size of last collection. This information can be exported to a pdf file. Does the solution have ability to merge legacy from the corporate system into the archive and to flag the merged content so that users can identify messages for which chain of custody cannot be completely determined? Yes. Intermedia can add a customer x-header to the messages which can be searched on later, or create a search for all s once import has completed and then tag all s with custom tag denoting an undetermined chain of custody. Does the solution associate imported s with the correct mailbox and distribution lists? Yes. Intermedia supports the ability for users to link their accounts to any aliases they send via, additionally for the administrator to import users with their aliases during account creation. Does the solution provide a mechanism for collecting locally and network stored.pst files and move them into the archive? We can provide access to an industry standard utility in order to locate and pull in this data. Does the solution prevent individuals from permanently deleting messages from the archive? Yes. The Intermedia solution provides a single global retention policy custom to the customers needs. This is the only way data can be removed from the archive. Legal Hold Q&A: Does your solution have the ability to place a legal hold on data? Yes. Legal holds can be placed on individual messages and search results. Can records under legal hold be identified? Yes. The Intermedia archive service has the ability to identify records under legal hold Does the solution provide for the automatic designation of mailboxes and distribution lists for legal hold? No. All legal holds must be manually applied to search results. REQUEST FOR PROPOSAL - FAQs 2014 Intermedia, Inc. All rights reserved 5
6 Does the solution provide for the automatic flagging of messages for legal hold? Not supported at this time, we plan on bringing features in a future release that will support a similar method of automated tagging/legal hold. Data Import Q&A: Describe your data conversion approach and the availability of any standard conversion utilities. (how do you import legacy data into the archive?) Intermedia can successfully import a variety of mail file formats, therefore we have adopted a standard of preparation that is replicated for all file formats, whether PST, MBX or NSF amongst others. For your archive ingestion, describe how do you handle de-duplication of the same message that may be ingested more than once and if this is reflected on your transmitted/received reconciliation report. Intermedia currently does not de-duplicate messages at the ingestion and storage level. Based on the requirements of the customer, a user can choose to de-duplicate at the application layer Describe your real time ingestion solution s ability to be insulated and segregated from workloads that happen in batch and data at rest incorporation activities that occur in ad hoc fashion. The Intermedia solution has been designed from the ground up to segregate and insulate the ongoing ingestion and processing work from the ongoing application activities and batch processes. We accomplish this by utilizing Amazon Web Services S3 for encrypted storage and separating archiving/indexing functions from website and backend work. Describe your batch solution s ability to alert on a successful, failed, and partially ingested batch process Supported. The Intermedia archive service provides a nightly report via to the designated person which details all collection / ingestion processes. Describe your solution s ability to support batch ingestion and segregate / not impact performance of real-time ingestion, incorporation, and electronic discovery tasks The Intermedia solution has been designed from the ground up to segregate and insulate the ongoing ingestion and processing work from the ongoing application activities and batch processes. We accomplish this by utilizing Amazon Web Services S3 for encrypted storage and EC2 (Elastic Compute dispersed in availability zones) for separating archiving/indexing functions from website and backend work. We are not constrained by those found in a highly utilized shared database and file system. Describe your data rate of ingestion of batch sources (e.g. how fast can you ingest a PST of a specific size, etc) and how are you able to scale this activity without impacting real time sources? The rate of ingestion by PST file varies greatly by the number of items per folder within the PST. With that said, Intermedia can process over 300 GB s of PST s per day on average once they are staged on our S3 cloud storage platform. The process of ingesting PST s is not confined by access to a shared file systems. Intermedia can add a high volume of EC2 (Elastic Compute) instances whose sole purpose is to ingest, archive and index PST files. The work is distributed via an AMQP service, which manages all the sub-tasks on various queues, that the compute PST processing instances draw work off based on available worker threads. Describe cost factors of your solution to purchase to scale real time ingestion (i.e. Licenses, Servers, Bandwidth, etc) per each real time growth step. The cost factors for data ingestion are based on the amount of data being ingested. It is priced per GB and discounts are considered based on the volume of data. Does your solution support preservation of internationalized character formats such as European Complex Language character sets, Asian Double Byte Character Sets, and Middle Eastern Characters? Intermedia supports the preservation of these internationalized character formats in the archive and the index. Our solution supports preservation of all data in its native format--including internationalized character set formats Intermedia, Inc. All rights reserved 6
7 REQUEST FOR PROPOSAL - FAQs Describe in detail how you differentiate different message objects in your archive once they have been ingested and incorporated. Each supported message object is indexed using a defined, hierarchical indexing schema. How are orphaned messages in the archive managed? And reported? And reclaimed? Intermedia archives all messages including malformed messages that maybe missing the necessary headers for proper archiving and indexing. These messages are reported monthly to the customer (upon request) and reprocessed into the archive after any needed technical enhancements to the indexing service. Describe how your solution maintains identities for departed employees that may have left the firm or been divested. Intermedia will continue to maintain the archive data for departed employees with their last known group memberships. A customer can classify departed employees into a designated former employees group for a final identification of their associated data within the archive. Describe how additional metadata be associated with messages and how this can be used in your solution. Intermedia records metadata associated to messages from the time of capture, as well as, through the lifetime of the message in the archive. This metadata can be used to differentiate search access based on various classifications found in the metadata. (user folder synchronization, marked reviewed, exported, viewed, forwarded (to whom), legal hold, etc). Describe in detail your solution s indexing technology and database technologies used. Intermedia has built a proprietary cloud based search solution based on Lucene that provides high availability, scalability and performance in a cloud environment Describe in detail your solution s ability to index in real time or near-real time, objects coming into the archive. Intermedia can support the highest rate of document indexing in excess of 100 million documents per day, with the ability to scale horizontally beyond this. Does the solution have the ability to monitor system health and report problems via , or other mechanism, to support staff? Yes. Intermedia constantly monitors the entire service (infrastructure & application) for compliance, service health, and data integrity. Systems and Network Engineers monitor the status of the archive service on a daily basis using automated tools allowing them to review reports and respond to hardware / software alerts quickly & efficiently. Describe your data conversion approach and the availability of any standard conversion utilities. Intermedia can successfully import a variety of mail file formats, therefore we have adopted a standard of preparation that is replicated for all file formats, whether PST, MBX or NSF amongst others. The following section for PST Import Guidance explores the popular PST formal, commonly used by Microsoft Outlook, but is not limited only to PST file formats. You will need to provide each PST file as a separate file, which must not be secured with any password protection. Simply name the PST file and copy it onto the hard drive you will be shipping. PST files may be generated either: > directly by your users OR > via an automated application such as exmerge, which extracts messages from your Exchange Server into a collection of pst files. Note that the PST file format can hold information other than just messages. For example, tasks, notes and contacts. The information is actually stored as a message and can, if required, be imported into the archive. However there will be no differentiation between these various information types. Imported data is search able by and or attachment. The import process requires that all the messages subject to import must be transferred to our Data Centre s prior to processing. The data can be sent to the archive in two ways. SFTP upload or hard disk shipment. If the data needs to be retained on a legal hold it must be extracted and made available to Intermedia for import in the way it is held Intermedia, Inc. All rights reserved 7
8 Once the data is received by Intermedia our data import teams will begin with the legal hold data first, so that we can import and then immediately create searches that will define those s to be placed under legal hold. As the data import team completes the data import we will report back to the customer and update them on the status of the data that was imported. When the entire data import has been completed we will report back the amount of the data that was imported to the system Intermedia, Inc. All rights reserved 8
Symantec Enterprise Vault.cloud Overview
Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult
Symantec Enterprise Vault.cloud Overview
Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult
Enterprise Email Archive Managed Archiving & ediscovery Services User Manual
Enterprise Email Archive Managed Archiving & ediscovery Services User Manual Copyright (C) 2012 MessageSolution Inc. All Rights Reserved Table of Contents Chapter 1: Introduction... 3 1.1 About MessageSolution
WEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM
WEBROOT EMAIL ARCHIVING SERVICE Getting Started Guide North America Webroot Software, Inc. World Headquarters 2560 55th Street Boulder CO 80301 USA www.webroot.com 800.870.8102 Table of Contents Create
How To Use The Policy Patrol Archiver Server
POLICY PATROL ARCHIVER FOR ADMINISTRATORS Manual MANUAL Policy Patrol Archiver For Administrators This manual, and the software described in this manual, are copyrighted. No part of this manual or the
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
Addressing Legal Discovery & Compliance Requirements
Addressing Legal Discovery & Compliance Requirements A Comparison of and Archiving In today s digital landscape, the legal, regulatory and business requirements for email archiving continue to grow in
We look beyond IT. Cloud Offerings
Cloud Offerings cstor Cloud Offerings As today s fast-moving businesses deal with increasing demands for IT services and decreasing IT budgets, the onset of cloud-ready solutions has provided a forward-thinking
SonaVault Email Archiving Software
SonaVault Email Archiving Software Sonasoft specifically architected it email archiving solution, SonaVault, for small and medium-sized enterprises (SME). SonaVault Email Archiving Software is a stand-alone
Email Archiving User Guide Outlook Plugin. Manual version 3.1
Email Archiving User Guide Outlook Plugin Manual version 3.1 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith Road Hammersmith London W14 8TH United Kingdom Omniquad
Selecting Your Essential Cloud Services for Office 365
DATASHEET Selecting Your Essential Cloud Services for Office 365 Mimecast provides a rich set of cloud services designed to meet the specific needs of Microsoft Office 365 customers. We effectively remove
Veritas Enterprise Vault.cloud for Microsoft Office 365
TM Veritas Enterprise Vault.cloud for Microsoft Office 365 Assume control over your information ecosystem Benefits at a glance Satisfies email retention requirements by journaling an immutable copy of
Zmanda Cloud Backup Frequently Asked Questions
Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What
Exchange Mailbox Protection Whitepaper
Exchange Mailbox Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Exchange add-on comparison... 2 Advantages and disadvantages of the different PST formats... 3 2. How Exchange
Omniquad Exchange Archiving
Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith
Microsoft Exchange Online Archiving and Symantec Enterprise Vault.cloud
Microsoft Exchange Online Archiving and Symantec Enterprise Vault.cloud Introduction According to The Radicati Group, email has become one of businesses most critical assets and with worldwide email traffic
Archiving. Mimecast Training. Student Workbook V 2.3
Archiving Mimecast Training Student Workbook V 2.3 2014 by Mimecast Services Ltd. The information posted in this guide is for use by Mimecast customers only. Use of the guide is governed by the terms contained
WaterfordTechnologies.com Frequently Asked Questions
WaterfordTechnologies.com Frequently Asked Questions 1 E-Mail How is an archive different than a backup? MailMeter email archiving captures a copy of every email that is sent or received through your email
RazorSafe Mail Archiving Appliances
RazorSafe Mail Archiving Appliances Product Overview Oct 2012 INTRODUCING RAZORSAFE Copyright (C) 2012 2 RAZORSAFE Overview Our fastest, most scalable and HIGHEST CAPACITY mail archiving appliances ever!
How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (
GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
White Paper. Mimosa NearPoint for Microsoft Exchange Server. Next Generation Email Archiving for Exchange Server 2007. By Bob Spurzem and Martin Tuip
White Paper By Bob Spurzem and Martin Tuip Mimosa Systems, Inc. January 2008 Mimosa NearPoint for Microsoft Exchange Server Next Generation Email Archiving for Exchange Server 2007 CONTENTS Email has become
GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007
GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email
Best Practices Series: Cure Your E-mail Management Headaches in IBM Lotus Notes/Domino Environments
1 Best Practices Series: Cure Your E-mail Management Headaches in IBM Lotus Notes/Domino Environments Part 2: Managing E-mail Compliance and Discovery Challenges Kelly Ferguson Michael Brown 2 Agenda Compliance
Email Archiving Troubleshooting Guide
Email archiving alerts are most often associated with failed attempts to pull mail from the associated journaling mailbox. In many cases, these alerts are resolved automatically. However, there have been
Email Archiving E-mail Compliance Storage Management Electronic Discovery
Email Archiving E-mail Compliance Storage Management Electronic Discovery archiver Athena www.athenaarchiver.com Athena Archiver is a next-generation email and instant message archiving system which enables
Enterprise Vault.cloud Deployment Checklist
Enterprise Vault.cloud Deployment Checklist This checklist is for administrators of the Symantec Enterprise Vault.cloud service. It summarizes the tasks required to deploy the service. Document version
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
GFI Product Guide. GFI MailArchiver Archive Assistant
GFI Product Guide GFI MailArchiver Archive Assistant The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either
Veritas AdvisorMail. Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies
Veritas AdvisorMail Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies Email compliance redefined Our new and improved version of redefines
How To Use Nearpoint Ediscovery On A Pc Or Macbook
NearPoint ediscovery Option User's Guide Software Release 4.2 Copyright 2003-2010, Mimosa Systems, Inc. All Rights Reserved. Mimosa Systems, Inc. 3200 Coronado Drive Santa Clara, CA 95054 www.mimosasystems.com
# Is ediscovery eating a hole in your companies wallet?
1. ediscovery # Is ediscovery eating a hole in your companies wallet? 90% Of New Records are Created Electronically Only 50% Of Electronic Documents are Printed The Number of GB processed per year is growing
Mimecast Unified Email Management
DATA SHEET Mimecast Unified Email Management An always-on, cloud-based email security solution that reduces the complexity of protecting your organization from malware, spam and data leakage. Mimecast
USER GUIDE: MANAGING NARA EMAIL RECORDS WITH GMAIL AND THE ZL UNIFIED ARCHIVE
USER GUIDE: MANAGING NARA EMAIL RECORDS WITH GMAIL AND THE ZL UNIFIED ARCHIVE Version 1.0 September, 2013 Contents 1 Introduction... 1 1.1 Personal Email Archive... 1 1.2 Records Management... 1 1.3 E-Discovery...
How To Archive A Mail From A Mailbox On A Server On A Password Protected (Smtp) On A Pc Or Mac (Mailbox) On An Ipa (For A Password Safemail) On Your Pc Or Ipa On A Mac
Symantec Enterprise Vault Setting up SMTP Archiving 11.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used
eztechdirect Backup Service Features
eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets
Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies.
Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies. Data Sheet: Symantec.cloud Email Compliance Redefined Our new and improved version of redefines
SHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233
Administration GUIDE Exchange Database idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 User Guide - Exchange Database idataagent Table of Contents Overview Introduction Key Features
GFI Product Manual. GFI MailArchiver Outlook Addon
GFI Product Manual GFI MailArchiver Outlook Addon The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express
GFI Product Guide. Archive Assistant
GFI Product Guide Archive Assistant The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied,
Email Archiving Service Overview and Setup Guide
Email Archiving Service Overview and Setup Guide This guide is for the IT administrator the person that sets up the appliance and deals with Exchange and Active Directory. Service Version: ArchivingP_3.5
Email Protection for your account
User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts
Medical Privacy Version 2015.04.13 Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts In order for Lux Scientiae, Incorporated (LuxSci) to ensure the security and privacy of all Electronic
ARCHITECTURAL OVERVIEW E-mail Availability Service (EAS) with ActiveMailbox
ARCHITECTURAL OVERVIEW E-mail Availability Service () with ActiveMailbox E-mail Availability Service () with ActiveMailbox For Microsoft Exchange -Centric Environments The Market Need for Through direct
E-mail Management: A Guide For Harvard Administrators
E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered
Amazon Cloud Storage Options
Amazon Cloud Storage Options Table of Contents 1. Overview of AWS Storage Options 02 2. Why you should use the AWS Storage 02 3. How to get Data into the AWS.03 4. Types of AWS Storage Options.03 5. Object
Service Overview CloudCare Online Backup
Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
NYSeMail Office 365 Administration Guide for Agencies
NYSeMail Office 365 Administration Guide for Agencies Office 365 Overview... 34 What is included... 34 Software Requirements... 34 Message Limits... 34 Provisioning... 34 Archive and Retention Policy...
Beyond Data Migration Best Practices
Beyond Data Migration Best Practices Table of Contents Executive Summary...2 Planning -Before Migration...2 Migration Sizing...4 Data Volumes...5 Item Counts...5 Effective Performance...8 Calculating Migration
Overview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
Technical. Overview. ~ a ~ irods version 4.x
Technical Overview ~ a ~ irods version 4.x The integrated Ru e-oriented DATA System irods is open-source, data management software that lets users: access, manage, and share data across any type or number
Fileweave. Large File Transfer. Seamless Microsoft Outlook add-in. Simple drag and drop functionality
Overview The sparkweave suite of applications is next-generation secure communication and collaboration technology for the changing needs of the enterprise. Sparkweave combines the best attributes of consumer
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
How To Manage Your Spam On Graymail On Pc Or Macodeo.Com
User Guide Revision E SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
Simple Storage Service (S3)
Simple Storage Service (S3) Amazon S3 is storage for the Internet. It is designed to make web-scale computing easier for developers. Amazon S3 provides a simple web services interface that can be used
Enterprise Vault.cloud. Microsoft Exchange Managed Folder Archiving Guide
Enterprise Vault.cloud Microsoft Exchange Managed Folder Archiving Guide Enterprise Vault.cloud: Microsoft Exchange Managed Folder Archiving Guide The software described in this book is furnished under
Barracuda Message Archiver Administrator s Guide
Barracuda Message Archiver Administrator s Guide Version 1.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2008, Barracuda
Symantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1
Symantec Enterprise Vault Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault: Upgrading to Enterprise Vault 11.0.1 The software described in this book is furnished under a license agreement
MailEnable Connector for Microsoft Outlook
MailEnable Connector for Microsoft Outlook Version 2.23 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for
Frequently Asked Questions TransVault Migrator for Microsoft Exchange & Office 365
Q1. What is TransVault Migrator for Microsoft Exchange & Office 365?... 1 Q2. What archives are supported?... 2 Q3. Will I need to buy services?... 3 Q4. Who created TransVault Migrator?... 3 Q5. Why not
Selecting Your Essential Cloud Services
DATASHEET Selecting Your Essential Cloud Services Mimecast s flexible and scalable suite of essential cloud services for Microsoft Exchange removes the risks and complexities of business email management
ARCHIVING FOR EXCHANGE 2013
White Paper ARCHIVING FOR EXCHANGE 2013 A Comparison with EMC SourceOne Email Management Abstract Exchange 2013 is the latest release of Microsoft s flagship email application and as such promises to deliver
Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review
Accelerate e-discovery and simplify review Overview provides IT/Legal liaisons, investigators, lawyers, paralegals and HR professionals the ability to search, preserve and review information across the
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description
Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.
Installation & Configuration Guide
Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
Installation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
Features and benefits guide for partners and their customers
and benefits guide for partners and their customers Version 3.0 and Guide for Partners and their customers Security Anti Virus Proofpoint s own threat detection technology enables our email Anti-Virus
CloudDesk - Security in the Cloud INFORMATION
CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
Monitoring DoubleTake Availability
Monitoring DoubleTake Availability eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may
Cloud. Hosted Exchange Administration Manual
Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...
Capstone Compliance Using Symantec Archiving and ediscovery Solutions
WHITE PAPER: CAPSTONE COMPLIANCE........................................ Capstone Compliance Using Symantec Archiving and ediscovery Solutions Who should read this paper IT decision-makers, architects,
Features of AnyShare
of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...
Version: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
FilesAnywhere Feature List
FilesAnywhere Feature List FilesAnywhere Page 1 of 9 3/31/2014 Contents Basic Features... 3 Advanced Features... 7 Enterprise Features... 9 FilesAnywhere Page 2 of 9 3/31/2014 Basic Features No File Size
AVLOR SERVER CLOUD RECOVERY
AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties
Archive Manager 5.0. How to Diagnose & Troubleshoot. Spencer Pelley Technical Team Lead May 2014
Archive Manager 5.0 How to Diagnose & Troubleshoot Spencer Pelley Technical Team Lead May 2014 Learning Objectives How To Diagnose & Troubleshoot Upon completion of this lesson, the student should have
MDaemon Vs. Microsoft Exchange Server 2013 Standard
Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS
Feature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description
UNCLASSIFIED 11/12/2015 v2.2 UK Email Archiving powered by Mimecast Service Description Cobweb s UK Email Archiving, powered by Mimecast, provides businesses with a secure, scalable cloud-based message
NTP Software VFM Administration Web Site for EMC Atmos
NTP Software VFM Administration Web Site for EMC Atmos User Manual Revision 1.1 - July 2015 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective.
Live Office. Personal Archive User Guide
Live Office Personal Archive User Guide Document Revision: 14 Feb 2012 Personal Archive User Guide Personal Archive gives you an unlimited mailbox and helps you quickly and easily access your archived
GiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
Personal Archive User Guide
Personal Archive User Guide Personal Archive gives you an unlimited mailbox and helps you quickly and easily access your archived email directly from Microsoft Outlook or Lotus Notes. Since Personal Archive
Exchange Web Services [EWS] support in The Bat! v7
Exchange Web Services [EWS] support in The Bat! v7 User Guide for TBBETA 7/17/2015 Page 1 of 17 Contents EWS support in The Bat! version 7... 2 New Wizard: Creating a new account... 2 Step 1... 2 Step
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
Lesson Plans Configuring Exchange Server 2007
Lesson Plans Configuring Exchange Server 2007 (Exam 70-236) Version 2.1 Table of Contents Course Overview... 2 Section 1.1: Server-based Messaging... 4 Section 1.2: Exchange Versions... 5 Section 1.3:
Archive Attender. Version 3.2. White Paper. Archive Attender is a member of the Attender Utilities family. www.re-soft.
Archive Attender Version 3.2 White Paper Archive Attender is a member of the Attender Utilities family Under the copyright laws, neither the documentation nor the software can be copied, photocopied, reproduced,
