ANSWERS TO FREQUENTLY ASKED QUESTIONS

Size: px
Start display at page:

Download "ANSWERS TO FREQUENTLY ASKED QUESTIONS"

Transcription

1 Infrastructure & Security Q&A: ANSWERS TO FREQUENTLY ASKED QUESTIONS How is the solution hosted? Intermedia's solution is 100% Web based. There is no hardware or software to install and address compliance and archiving. The Intermedia solution will be accessed utilizing a secure, web interface. What is the maximum number of users the solution can handle? Infinite. Intermedia utilizes Amazon S3 cloud infrastructure, which allows the unique ability to scale and grow ondemand with no impact on our customers. Should the customer need more computing or storage, Intermedia can intelligently access more of these resources without any changes to customer s service, network or pricing. Provide statistics on what to expect for bandwidth consumption. Intermedia assumes megabytes of data traffic per user per month. How is customer data stored? Data stored in the Intermedia archive is redundantly stored in multiple physical locations as part of normal operation of the services and at no additional charge. Intermedia ensures object durability by storing objects multiple times across multiple datacenters on the initial write and then actively doing further replication in the event of device unavailability or detected bit-rot. This is all supported by default in the Amazon Web Services cloud infrastructure. Customer data is encrypted with AES-256bit encryption using a private key assigned to the account, then we batch them together into a 1GB Encrypted package and store it on Amazon's redundant global storage. All messages and attachments are date and time stamped, serialized and written to tamper-proof, dedicated customer WORM storage. How long is data stored for? Intermedia offers unlimited storage and retention at a fixed price. Is there a limit or maximum archive size? Intermedia offers unlimited storage and retention at a fixed price. What file format are the archives stored in? Data is compressed, encrypted and stored in the RFC 822 industry format (EML). Does the solution support WORM storage? Is the data forensically compliant? Intermedia has designed and implemented a proprietary software lock so that in the archive each customer is on WORM-like storage (similar to netapps snaplock & permabit) Satisfies FSA type requirements. Are messaged digitally finger printed for authenticity? Yes. Because all messages are stored in our secured WORM format it is impossible for the messages to be edited once archived. When data is exported from the system we provide MD5 hash to ensure data is not edited in transit Intermedia, Inc. All rights reserved 1

2 REQUEST FOR PROPOSAL - FAQs Does Intermedia s solution allow for efficient archives by storing just one copy of a file or message (Single-Instance- Storage), regardless of the number of times it occurs or where it is stored? Intermedia provides a fully redundant, unlimited storage model for the archive. The system has a series of proprietary compression technologies that are used to reduce our storage needs. But the customer is never charged for the storage usage. Does the solution allow for the encryption of data during data transport? Yes. TLS and SSL encryption methods are used during transport. Describe the standards you use for password: (Construction (strength), history retention, length, expiration) Passwords must be at least eight (8) positions in length. Passwords must contain a mix of alphabetic and non-alphabetic characters (numbers, punctuation or special characters) or a mix of at least two types of non-alphabetic characters. Passwords must not contain the userid as part of the password. Passwords must be changed at least once every 90 days. Passwords may not be reused for at least 2 years. Passwords must be set to an expired state when issued or reset unless system generated. Maximum of 5 unsuccessful attempts before lockout. Describe your policy on data mining of customer data? All data is encrypted using AES 256 bit encryption. Intermedia has no direct access to customer data unless customer explicitly asked and is given login credentials. How does Intermedia ensure data destruction? Intermedia uses encrypted disk volumes to protect customer data privacy. If a volume should become dismounted before it is destroyed, the encryption is the safeguard to prevent another non-intermedia entity from accessing the information stored on the volume. Encryption keys are maintained in an encrypted keystore and only accessible by the software. No data is cached or stored in temporary un-encrypted storage. Data destruction is accomplished by invoking the cloud compute infrastructure API delete functions AND encryption. The combination of the delete function and tossing the encryption key ensures data that needs to disappear is not recoverable. What functions are auditable? What information is recorded? Where is the information stored? Is the persistence of an audit record synchronous or asynchronous to the action being audited? What are the options available for configuring what gets audited? All login, search access, message interaction and administrative functions are recorded and audited. The information included is the originating IP, user name, date/time and activity. These audit logs are tamper proof and locked down from the customer site. There are no special configuration options available at this time. How are resiliency and reliability plus COB accomplished for your SMTP submission solution? For continuity and failover, the Intermedia s SMTP ingestion service runs in multiple regional availability zones located in Eastern US, Western US, Ireland, Singapore and Japan. Intermedia s SMTP ingestion service is directly integrated with the Amazon Web Services S3 taking advantage of its built in geographical diversity. In case of a catastrophic event, Intermedia SMTP service nodes can be dropped within minutes into non-impacted availability zones for continuity of service. During a COB / Disaster Recovery / Network Outage event, how do you resynchronize your storage and metadata (indexes, configurations, databases) to be consistent? How long does this take? Outage event has not previously occurred due to clustering. Underlying storage is based on eleven 9s of durability. In the event of a data loss re indexing speed can exceed 1 billion documents per day Intermedia, Inc. All rights reserved 2

3 How it works Q&A: How does the solution capture mail (e.g. log shipping, journaling, MAPI)? What capture methods are available? Intermedia utilizes journaling to stage s for archiving. Archiving collections happen by IMAP pulls or SMTP pushes. 1. Push Customer would configure mail server journaling to push via a secure SMTP stream to a unique SMTP address that Intermedia provides for our customers. 2. Pull Customer would allow Intermedia to connect to their Exchange server via IMAP over SSL (port 143, 993 or others) on a scheduled basis daily. Does the solution capture all s before they reach the recipient s mailbox? No, journaling stages the s for archiving followed by a push (SMTP) or pull (IMAP) of journaled s into the archive. How are users provisioned within the Intermedia archive service? Intermedia administrators have the ability to either manually add users or they can leverage LDAP integration. LDAP integration gives you the ability to leverage your directory information to provision and manage archive users and related attributes. LDAP integration is designed to help you streamline user provisioning, management, and authentication. What Operating systems are supported? The Intermedia solution is OS / platform agnostic. Can the solution handle multiple domains? Intermedia can simultaneously support an unlimited number of domains and environments. Does the solution allow for role-based administration? Yes. There are 4 basic levels built in to the solution. 1. Search Admin: does global searching, access to ALL Search admin plus: within admin interface, settings reports and policies are also accessible (that are normally in the admin only). Look but not touch. 3. Search User: only sees results of a search the admin executes. Can export from the set they are looking at. 4. End user: individual who can see & search own archive only. Can export own . Does the solution allow end users seamless access to messages in the mail client? If so, does this require stubbing? Please describe. Yes, Outlook uses folders accessing the end user web interface. This provides archive access with no plugins or software required. Stubbing is not required. Can Intermedia selectively archive users? Yes. Intermedia has the ability to selectively journal users based on storage groups / databases and through premium journaling rules. Does the solution capture all content types (e.g. messages, attachments, tasks, calendar entries, contacts)? Intermedia captures all s and attachments (mail enabled items). Intermedia captures all envelope and header data such as received date, To, CC, BCC and various other x-header information associated with the message. How does Intermedia perform reconciliation of each SMTP message submitted from the mail server so that each transmitted message is correlated to message ingestion within your archive? Supported. Intermedia has developed a separate database service that runs outside of the archiving service. Its sole purpose is to analyze, audit and report on potential data integrity gaps within the archive. Customer data entering the Intermedia archive service is immediately written to highly redundant storage in the form of an encrypted archive file. Intermedia will not acknowledge receipt of a message unless it has been written and verified to the redundant cloud storage service ( % data durability) Intermedia, Inc. All rights reserved 3

4 REQUEST FOR PROPOSAL - FAQs Does the solution support contemporaneous indexing of and all attachments? Yes, all collections are indexed and submitted to the archive at the same time. Describe how your solution associates objects with user names and records for employees and if it uses well-known methods such as Active Directory and Human Resource Databases. Intermedia integrates with Active Director and other LDAP enabled services for access control and to associate object classification, disposition and access. ( % data durability) Does the solution have the ability to monitor system health and report problems via , or other mechanism, to support staff? Yes. Intermedia constantly monitors the entire service (infrastructure & application) for compliance, service health, and data integrity. Systems and Network Engineers monitor the status of the archive service on a daily basis using automated tools allowing them to review reports and respond to hardware / software alerts quickly & efficiently. Discovery & Retention Q&A: Describe how the service offering could enable ediscovery, such as forensic analysis, audit ability, and other similar governance requirements. Intermedia offers the ability to request, locate and acquire electronically stored data. The archive service supports full stemming, wild card, boolean logic, proximity logic, fuzzy logic, character replacement and quoted phrase searches. Searches can be done by sender, recipient, subject, date range, or by message only, or by attachment only, and by message header properties. Search results can then be assigned to outside counsel for review. Legal holds can be placed on specific data to supersede retention polices. A complete audit trail is kept on all actions performed. Does the solution allow retention policies to be set to any length (i.e. 15 days, 1 month, 2 years, 10 years etc.)? All s will be retained on the system for an infinite period of time until an administrator enables the retention policy. At which time s older than the retention (not on a legal hold) will be purged. Retention time frames can be set to any time frame. Does the solution provide an audit trail? Yes. Once a user logs in an audit trail tracks every move. Access, viewing s, adding categories, every single action. All user types. Access to see: search admins (for searches). Account admins for everything. Does the solution provide a way to categorize messages and or search results? Yes. Searches can be categorized by default tags or buckets (Save, Reviewed, Starred, Attention) or custom tags can be created. Messages can be flagged for attention, or with custom tags that can be created and then messages categorized by those specific tags. Can the solution capture mail only for groups or end users who are in a policy? This is dependent on mail server journaling capabilities. Does the solution allow for the capture of mail for both individuals and entire data stores? This is dependent on mail server journaling capabilities. Does the solution allow retention policies to be applied to individual users, teams, departments and/or entire organizations? Currently, the archive service allows for a single retention policy for the entire organization. Roadmap plans to provide this feature are going to be included in a future release, ETA Q Can data archived be imported into other products? What would an exit strategy look like? Intermedia would export the data to the RFC822 format and either ship the data back or make the data available for download Intermedia, Inc. All rights reserved 4

5 REQUEST FOR PROPOSAL - FAQs What format can search results be exported to? Search results can be exported to.pst,.eml,.txt,.html,.pdf as well as.nsf. Does the solution have the ability for authorities or outside counsel to search the entire enterprise archive including message body, text, subject, sender, recipient, dates, attachments, keywords and metadata for targeted information? Yes. The Intermedia solution provides role-based permissions. One of these roles is called the Search Administrator. The Search admin has the ability to search the entire global archive and create searches based including but not limited to message body text, subject, sender, recipient, dates, attachments, keywords and meta data. What type of searches can be performed on the archive and does the solution support queries using Boolean logic? Yes Boolean logic, proximity and fuzzy logic is used. The archive service supports full stemming, wild card, and character replacement and quoted phrase searches. Searches can be done by sender, recipient, subject, date range, or by message only, or by attachment only, and by message header properties. Does the solution have the ability to produce hard and soft copies of reports including detailed and summarized information regarding the size, age and composition of the archived data? Yes. Intermedia provides a dashboard view, which provides information on number of messages in archive, size of archive, last collection data and size of last collection. This information can be exported to a pdf file. Does the solution have ability to merge legacy from the corporate system into the archive and to flag the merged content so that users can identify messages for which chain of custody cannot be completely determined? Yes. Intermedia can add a customer x-header to the messages which can be searched on later, or create a search for all s once import has completed and then tag all s with custom tag denoting an undetermined chain of custody. Does the solution associate imported s with the correct mailbox and distribution lists? Yes. Intermedia supports the ability for users to link their accounts to any aliases they send via, additionally for the administrator to import users with their aliases during account creation. Does the solution provide a mechanism for collecting locally and network stored.pst files and move them into the archive? We can provide access to an industry standard utility in order to locate and pull in this data. Does the solution prevent individuals from permanently deleting messages from the archive? Yes. The Intermedia solution provides a single global retention policy custom to the customers needs. This is the only way data can be removed from the archive. Legal Hold Q&A: Does your solution have the ability to place a legal hold on data? Yes. Legal holds can be placed on individual messages and search results. Can records under legal hold be identified? Yes. The Intermedia archive service has the ability to identify records under legal hold Does the solution provide for the automatic designation of mailboxes and distribution lists for legal hold? No. All legal holds must be manually applied to search results. REQUEST FOR PROPOSAL - FAQs 2014 Intermedia, Inc. All rights reserved 5

6 Does the solution provide for the automatic flagging of messages for legal hold? Not supported at this time, we plan on bringing features in a future release that will support a similar method of automated tagging/legal hold. Data Import Q&A: Describe your data conversion approach and the availability of any standard conversion utilities. (how do you import legacy data into the archive?) Intermedia can successfully import a variety of mail file formats, therefore we have adopted a standard of preparation that is replicated for all file formats, whether PST, MBX or NSF amongst others. For your archive ingestion, describe how do you handle de-duplication of the same message that may be ingested more than once and if this is reflected on your transmitted/received reconciliation report. Intermedia currently does not de-duplicate messages at the ingestion and storage level. Based on the requirements of the customer, a user can choose to de-duplicate at the application layer Describe your real time ingestion solution s ability to be insulated and segregated from workloads that happen in batch and data at rest incorporation activities that occur in ad hoc fashion. The Intermedia solution has been designed from the ground up to segregate and insulate the ongoing ingestion and processing work from the ongoing application activities and batch processes. We accomplish this by utilizing Amazon Web Services S3 for encrypted storage and separating archiving/indexing functions from website and backend work. Describe your batch solution s ability to alert on a successful, failed, and partially ingested batch process Supported. The Intermedia archive service provides a nightly report via to the designated person which details all collection / ingestion processes. Describe your solution s ability to support batch ingestion and segregate / not impact performance of real-time ingestion, incorporation, and electronic discovery tasks The Intermedia solution has been designed from the ground up to segregate and insulate the ongoing ingestion and processing work from the ongoing application activities and batch processes. We accomplish this by utilizing Amazon Web Services S3 for encrypted storage and EC2 (Elastic Compute dispersed in availability zones) for separating archiving/indexing functions from website and backend work. We are not constrained by those found in a highly utilized shared database and file system. Describe your data rate of ingestion of batch sources (e.g. how fast can you ingest a PST of a specific size, etc) and how are you able to scale this activity without impacting real time sources? The rate of ingestion by PST file varies greatly by the number of items per folder within the PST. With that said, Intermedia can process over 300 GB s of PST s per day on average once they are staged on our S3 cloud storage platform. The process of ingesting PST s is not confined by access to a shared file systems. Intermedia can add a high volume of EC2 (Elastic Compute) instances whose sole purpose is to ingest, archive and index PST files. The work is distributed via an AMQP service, which manages all the sub-tasks on various queues, that the compute PST processing instances draw work off based on available worker threads. Describe cost factors of your solution to purchase to scale real time ingestion (i.e. Licenses, Servers, Bandwidth, etc) per each real time growth step. The cost factors for data ingestion are based on the amount of data being ingested. It is priced per GB and discounts are considered based on the volume of data. Does your solution support preservation of internationalized character formats such as European Complex Language character sets, Asian Double Byte Character Sets, and Middle Eastern Characters? Intermedia supports the preservation of these internationalized character formats in the archive and the index. Our solution supports preservation of all data in its native format--including internationalized character set formats Intermedia, Inc. All rights reserved 6

7 REQUEST FOR PROPOSAL - FAQs Describe in detail how you differentiate different message objects in your archive once they have been ingested and incorporated. Each supported message object is indexed using a defined, hierarchical indexing schema. How are orphaned messages in the archive managed? And reported? And reclaimed? Intermedia archives all messages including malformed messages that maybe missing the necessary headers for proper archiving and indexing. These messages are reported monthly to the customer (upon request) and reprocessed into the archive after any needed technical enhancements to the indexing service. Describe how your solution maintains identities for departed employees that may have left the firm or been divested. Intermedia will continue to maintain the archive data for departed employees with their last known group memberships. A customer can classify departed employees into a designated former employees group for a final identification of their associated data within the archive. Describe how additional metadata be associated with messages and how this can be used in your solution. Intermedia records metadata associated to messages from the time of capture, as well as, through the lifetime of the message in the archive. This metadata can be used to differentiate search access based on various classifications found in the metadata. (user folder synchronization, marked reviewed, exported, viewed, forwarded (to whom), legal hold, etc). Describe in detail your solution s indexing technology and database technologies used. Intermedia has built a proprietary cloud based search solution based on Lucene that provides high availability, scalability and performance in a cloud environment Describe in detail your solution s ability to index in real time or near-real time, objects coming into the archive. Intermedia can support the highest rate of document indexing in excess of 100 million documents per day, with the ability to scale horizontally beyond this. Does the solution have the ability to monitor system health and report problems via , or other mechanism, to support staff? Yes. Intermedia constantly monitors the entire service (infrastructure & application) for compliance, service health, and data integrity. Systems and Network Engineers monitor the status of the archive service on a daily basis using automated tools allowing them to review reports and respond to hardware / software alerts quickly & efficiently. Describe your data conversion approach and the availability of any standard conversion utilities. Intermedia can successfully import a variety of mail file formats, therefore we have adopted a standard of preparation that is replicated for all file formats, whether PST, MBX or NSF amongst others. The following section for PST Import Guidance explores the popular PST formal, commonly used by Microsoft Outlook, but is not limited only to PST file formats. You will need to provide each PST file as a separate file, which must not be secured with any password protection. Simply name the PST file and copy it onto the hard drive you will be shipping. PST files may be generated either: > directly by your users OR > via an automated application such as exmerge, which extracts messages from your Exchange Server into a collection of pst files. Note that the PST file format can hold information other than just messages. For example, tasks, notes and contacts. The information is actually stored as a message and can, if required, be imported into the archive. However there will be no differentiation between these various information types. Imported data is search able by and or attachment. The import process requires that all the messages subject to import must be transferred to our Data Centre s prior to processing. The data can be sent to the archive in two ways. SFTP upload or hard disk shipment. If the data needs to be retained on a legal hold it must be extracted and made available to Intermedia for import in the way it is held Intermedia, Inc. All rights reserved 7

8 Once the data is received by Intermedia our data import teams will begin with the legal hold data first, so that we can import and then immediately create searches that will define those s to be placed under legal hold. As the data import team completes the data import we will report back to the customer and update them on the status of the data that was imported. When the entire data import has been completed we will report back the amount of the data that was imported to the system Intermedia, Inc. All rights reserved 8

Symantec Enterprise Vault.cloud Overview

Symantec Enterprise Vault.cloud Overview Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult

More information

Symantec Enterprise Vault.cloud Overview

Symantec Enterprise Vault.cloud Overview Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult

More information

Enterprise Email Archive Managed Archiving & ediscovery Services User Manual

Enterprise Email Archive Managed Archiving & ediscovery Services User Manual Enterprise Email Archive Managed Archiving & ediscovery Services User Manual Copyright (C) 2012 MessageSolution Inc. All Rights Reserved Table of Contents Chapter 1: Introduction... 3 1.1 About MessageSolution

More information

WEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM

WEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM WEBROOT EMAIL ARCHIVING SERVICE Getting Started Guide North America Webroot Software, Inc. World Headquarters 2560 55th Street Boulder CO 80301 USA www.webroot.com 800.870.8102 Table of Contents Create

More information

How To Use The Policy Patrol Archiver Server

How To Use The Policy Patrol Archiver Server POLICY PATROL ARCHIVER FOR ADMINISTRATORS Manual MANUAL Policy Patrol Archiver For Administrators This manual, and the software described in this manual, are copyrighted. No part of this manual or the

More information

Sonian Getting Started Guide October 2008

Sonian Getting Started Guide October 2008 Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using

More information

Addressing Legal Discovery & Compliance Requirements

Addressing Legal Discovery & Compliance Requirements Addressing Legal Discovery & Compliance Requirements A Comparison of and Archiving In today s digital landscape, the legal, regulatory and business requirements for email archiving continue to grow in

More information

We look beyond IT. Cloud Offerings

We look beyond IT. Cloud Offerings Cloud Offerings cstor Cloud Offerings As today s fast-moving businesses deal with increasing demands for IT services and decreasing IT budgets, the onset of cloud-ready solutions has provided a forward-thinking

More information

SonaVault Email Archiving Software

SonaVault Email Archiving Software SonaVault Email Archiving Software Sonasoft specifically architected it email archiving solution, SonaVault, for small and medium-sized enterprises (SME). SonaVault Email Archiving Software is a stand-alone

More information

Email Archiving User Guide Outlook Plugin. Manual version 3.1

Email Archiving User Guide Outlook Plugin. Manual version 3.1 Email Archiving User Guide Outlook Plugin Manual version 3.1 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith Road Hammersmith London W14 8TH United Kingdom Omniquad

More information

Selecting Your Essential Cloud Services for Office 365

Selecting Your Essential Cloud Services for Office 365 DATASHEET Selecting Your Essential Cloud Services for Office 365 Mimecast provides a rich set of cloud services designed to meet the specific needs of Microsoft Office 365 customers. We effectively remove

More information

Veritas Enterprise Vault.cloud for Microsoft Office 365

Veritas Enterprise Vault.cloud for Microsoft Office 365 TM Veritas Enterprise Vault.cloud for Microsoft Office 365 Assume control over your information ecosystem Benefits at a glance Satisfies email retention requirements by journaling an immutable copy of

More information

Zmanda Cloud Backup Frequently Asked Questions

Zmanda Cloud Backup Frequently Asked Questions Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What

More information

Exchange Mailbox Protection Whitepaper

Exchange Mailbox Protection Whitepaper Exchange Mailbox Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Exchange add-on comparison... 2 Advantages and disadvantages of the different PST formats... 3 2. How Exchange

More information

Omniquad Exchange Archiving

Omniquad Exchange Archiving Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith

More information

Microsoft Exchange Online Archiving and Symantec Enterprise Vault.cloud

Microsoft Exchange Online Archiving and Symantec Enterprise Vault.cloud Microsoft Exchange Online Archiving and Symantec Enterprise Vault.cloud Introduction According to The Radicati Group, email has become one of businesses most critical assets and with worldwide email traffic

More information

Archiving. Mimecast Training. Student Workbook V 2.3

Archiving. Mimecast Training. Student Workbook V 2.3 Archiving Mimecast Training Student Workbook V 2.3 2014 by Mimecast Services Ltd. The information posted in this guide is for use by Mimecast customers only. Use of the guide is governed by the terms contained

More information

WaterfordTechnologies.com Frequently Asked Questions

WaterfordTechnologies.com Frequently Asked Questions WaterfordTechnologies.com Frequently Asked Questions 1 E-Mail How is an archive different than a backup? MailMeter email archiving captures a copy of every email that is sent or received through your email

More information

RazorSafe Mail Archiving Appliances

RazorSafe Mail Archiving Appliances RazorSafe Mail Archiving Appliances Product Overview Oct 2012 INTRODUCING RAZORSAFE Copyright (C) 2012 2 RAZORSAFE Overview Our fastest, most scalable and HIGHEST CAPACITY mail archiving appliances ever!

More information

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org ( GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

White Paper. Mimosa NearPoint for Microsoft Exchange Server. Next Generation Email Archiving for Exchange Server 2007. By Bob Spurzem and Martin Tuip

White Paper. Mimosa NearPoint for Microsoft Exchange Server. Next Generation Email Archiving for Exchange Server 2007. By Bob Spurzem and Martin Tuip White Paper By Bob Spurzem and Martin Tuip Mimosa Systems, Inc. January 2008 Mimosa NearPoint for Microsoft Exchange Server Next Generation Email Archiving for Exchange Server 2007 CONTENTS Email has become

More information

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007 GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email

More information

Best Practices Series: Cure Your E-mail Management Headaches in IBM Lotus Notes/Domino Environments

Best Practices Series: Cure Your E-mail Management Headaches in IBM Lotus Notes/Domino Environments 1 Best Practices Series: Cure Your E-mail Management Headaches in IBM Lotus Notes/Domino Environments Part 2: Managing E-mail Compliance and Discovery Challenges Kelly Ferguson Michael Brown 2 Agenda Compliance

More information

Email Archiving Troubleshooting Guide

Email Archiving Troubleshooting Guide Email archiving alerts are most often associated with failed attempts to pull mail from the associated journaling mailbox. In many cases, these alerts are resolved automatically. However, there have been

More information

Email Archiving E-mail Compliance Storage Management Electronic Discovery

Email Archiving E-mail Compliance Storage Management Electronic Discovery Email Archiving E-mail Compliance Storage Management Electronic Discovery archiver Athena www.athenaarchiver.com Athena Archiver is a next-generation email and instant message archiving system which enables

More information

Enterprise Vault.cloud Deployment Checklist

Enterprise Vault.cloud Deployment Checklist Enterprise Vault.cloud Deployment Checklist This checklist is for administrators of the Symantec Enterprise Vault.cloud service. It summarizes the tasks required to deploy the service. Document version

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

GFI Product Guide. GFI MailArchiver Archive Assistant

GFI Product Guide. GFI MailArchiver Archive Assistant GFI Product Guide GFI MailArchiver Archive Assistant The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either

More information

Veritas AdvisorMail. Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies

Veritas AdvisorMail. Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies Veritas AdvisorMail Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies Email compliance redefined Our new and improved version of redefines

More information

How To Use Nearpoint Ediscovery On A Pc Or Macbook

How To Use Nearpoint Ediscovery On A Pc Or Macbook NearPoint ediscovery Option User's Guide Software Release 4.2 Copyright 2003-2010, Mimosa Systems, Inc. All Rights Reserved. Mimosa Systems, Inc. 3200 Coronado Drive Santa Clara, CA 95054 www.mimosasystems.com

More information

# Is ediscovery eating a hole in your companies wallet?

# Is ediscovery eating a hole in your companies wallet? 1. ediscovery # Is ediscovery eating a hole in your companies wallet? 90% Of New Records are Created Electronically Only 50% Of Electronic Documents are Printed The Number of GB processed per year is growing

More information

Mimecast Unified Email Management

Mimecast Unified Email Management DATA SHEET Mimecast Unified Email Management An always-on, cloud-based email security solution that reduces the complexity of protecting your organization from malware, spam and data leakage. Mimecast

More information

USER GUIDE: MANAGING NARA EMAIL RECORDS WITH GMAIL AND THE ZL UNIFIED ARCHIVE

USER GUIDE: MANAGING NARA EMAIL RECORDS WITH GMAIL AND THE ZL UNIFIED ARCHIVE USER GUIDE: MANAGING NARA EMAIL RECORDS WITH GMAIL AND THE ZL UNIFIED ARCHIVE Version 1.0 September, 2013 Contents 1 Introduction... 1 1.1 Personal Email Archive... 1 1.2 Records Management... 1 1.3 E-Discovery...

More information

How To Archive A Mail From A Mailbox On A Server On A Password Protected (Smtp) On A Pc Or Mac (Mailbox) On An Ipa (For A Password Safemail) On Your Pc Or Ipa On A Mac

How To Archive A Mail From A Mailbox On A Server On A Password Protected (Smtp) On A Pc Or Mac (Mailbox) On An Ipa (For A Password Safemail) On Your Pc Or Ipa On A Mac Symantec Enterprise Vault Setting up SMTP Archiving 11.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used

More information

eztechdirect Backup Service Features

eztechdirect Backup Service Features eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets

More information

Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies.

Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies. Email archiving, compliance, and ediscovery solution designed specifically for U.S. financial services companies. Data Sheet: Symantec.cloud Email Compliance Redefined Our new and improved version of redefines

More information

SHARPCLOUD SECURITY STATEMENT

SHARPCLOUD SECURITY STATEMENT SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud

More information

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 Administration GUIDE Exchange Database idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 User Guide - Exchange Database idataagent Table of Contents Overview Introduction Key Features

More information

GFI Product Manual. GFI MailArchiver Outlook Addon

GFI Product Manual. GFI MailArchiver Outlook Addon GFI Product Manual GFI MailArchiver Outlook Addon The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express

More information

GFI Product Guide. Archive Assistant

GFI Product Guide. Archive Assistant GFI Product Guide Archive Assistant The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied,

More information

Email Archiving Service Overview and Setup Guide

Email Archiving Service Overview and Setup Guide Email Archiving Service Overview and Setup Guide This guide is for the IT administrator the person that sets up the appliance and deals with Exchange and Active Directory. Service Version: ArchivingP_3.5

More information

Email Protection for your account

Email Protection for your account User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts

Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts Medical Privacy Version 2015.04.13 Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts In order for Lux Scientiae, Incorporated (LuxSci) to ensure the security and privacy of all Electronic

More information

ARCHITECTURAL OVERVIEW E-mail Availability Service (EAS) with ActiveMailbox

ARCHITECTURAL OVERVIEW E-mail Availability Service (EAS) with ActiveMailbox ARCHITECTURAL OVERVIEW E-mail Availability Service () with ActiveMailbox E-mail Availability Service () with ActiveMailbox For Microsoft Exchange -Centric Environments The Market Need for Through direct

More information

E-mail Management: A Guide For Harvard Administrators

E-mail Management: A Guide For Harvard Administrators E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered

More information

Amazon Cloud Storage Options

Amazon Cloud Storage Options Amazon Cloud Storage Options Table of Contents 1. Overview of AWS Storage Options 02 2. Why you should use the AWS Storage 02 3. How to get Data into the AWS.03 4. Types of AWS Storage Options.03 5. Object

More information

Service Overview CloudCare Online Backup

Service Overview CloudCare Online Backup Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

NYSeMail Office 365 Administration Guide for Agencies

NYSeMail Office 365 Administration Guide for Agencies NYSeMail Office 365 Administration Guide for Agencies Office 365 Overview... 34 What is included... 34 Software Requirements... 34 Message Limits... 34 Provisioning... 34 Archive and Retention Policy...

More information

Beyond Data Migration Best Practices

Beyond Data Migration Best Practices Beyond Data Migration Best Practices Table of Contents Executive Summary...2 Planning -Before Migration...2 Migration Sizing...4 Data Volumes...5 Item Counts...5 Effective Performance...8 Calculating Migration

More information

Overview. Timeline Cloud Features and Technology

Overview. Timeline Cloud Features and Technology Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

More information

Technical. Overview. ~ a ~ irods version 4.x

Technical. Overview. ~ a ~ irods version 4.x Technical Overview ~ a ~ irods version 4.x The integrated Ru e-oriented DATA System irods is open-source, data management software that lets users: access, manage, and share data across any type or number

More information

Fileweave. Large File Transfer. Seamless Microsoft Outlook add-in. Simple drag and drop functionality

Fileweave. Large File Transfer. Seamless Microsoft Outlook add-in. Simple drag and drop functionality Overview The sparkweave suite of applications is next-generation secure communication and collaboration technology for the changing needs of the enterprise. Sparkweave combines the best attributes of consumer

More information

Security Architecture Whitepaper

Security Architecture Whitepaper Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

How To Manage Your Spam On Graymail On Pc Or Macodeo.Com

How To Manage Your Spam On Graymail On Pc Or Macodeo.Com User Guide Revision E SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

Simple Storage Service (S3)

Simple Storage Service (S3) Simple Storage Service (S3) Amazon S3 is storage for the Internet. It is designed to make web-scale computing easier for developers. Amazon S3 provides a simple web services interface that can be used

More information

Enterprise Vault.cloud. Microsoft Exchange Managed Folder Archiving Guide

Enterprise Vault.cloud. Microsoft Exchange Managed Folder Archiving Guide Enterprise Vault.cloud Microsoft Exchange Managed Folder Archiving Guide Enterprise Vault.cloud: Microsoft Exchange Managed Folder Archiving Guide The software described in this book is furnished under

More information

Barracuda Message Archiver Administrator s Guide

Barracuda Message Archiver Administrator s Guide Barracuda Message Archiver Administrator s Guide Version 1.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2008, Barracuda

More information

Symantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1

Symantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault: Upgrading to Enterprise Vault 11.0.1 The software described in this book is furnished under a license agreement

More information

MailEnable Connector for Microsoft Outlook

MailEnable Connector for Microsoft Outlook MailEnable Connector for Microsoft Outlook Version 2.23 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for

More information

Frequently Asked Questions TransVault Migrator for Microsoft Exchange & Office 365

Frequently Asked Questions TransVault Migrator for Microsoft Exchange & Office 365 Q1. What is TransVault Migrator for Microsoft Exchange & Office 365?... 1 Q2. What archives are supported?... 2 Q3. Will I need to buy services?... 3 Q4. Who created TransVault Migrator?... 3 Q5. Why not

More information

Selecting Your Essential Cloud Services

Selecting Your Essential Cloud Services DATASHEET Selecting Your Essential Cloud Services Mimecast s flexible and scalable suite of essential cloud services for Microsoft Exchange removes the risks and complexities of business email management

More information

ARCHIVING FOR EXCHANGE 2013

ARCHIVING FOR EXCHANGE 2013 White Paper ARCHIVING FOR EXCHANGE 2013 A Comparison with EMC SourceOne Email Management Abstract Exchange 2013 is the latest release of Microsoft s flagship email application and as such promises to deliver

More information

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review Accelerate e-discovery and simplify review Overview provides IT/Legal liaisons, investigators, lawyers, paralegals and HR professionals the ability to search, preserve and review information across the

More information

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Ensuring Enterprise Data Security with Secure Mobile File Sharing. A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite

More information

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.

More information

Installation & Configuration Guide

Installation & Configuration Guide Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks

More information

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between

More information

Installation and Setup: Setup Wizard Account Information

Installation and Setup: Setup Wizard Account Information Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account

More information

Features and benefits guide for partners and their customers

Features and benefits guide for partners and their customers and benefits guide for partners and their customers Version 3.0 and Guide for Partners and their customers Security Anti Virus Proofpoint s own threat detection technology enables our email Anti-Virus

More information

CloudDesk - Security in the Cloud INFORMATION

CloudDesk - Security in the Cloud INFORMATION CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Monitoring DoubleTake Availability

Monitoring DoubleTake Availability Monitoring DoubleTake Availability eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may

More information

Cloud. Hosted Exchange Administration Manual

Cloud. Hosted Exchange Administration Manual Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...

More information

Capstone Compliance Using Symantec Archiving and ediscovery Solutions

Capstone Compliance Using Symantec Archiving and ediscovery Solutions WHITE PAPER: CAPSTONE COMPLIANCE........................................ Capstone Compliance Using Symantec Archiving and ediscovery Solutions Who should read this paper IT decision-makers, architects,

More information

Features of AnyShare

Features of AnyShare of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...

More information

Version: 1.5 2014 Page 1 of 5

Version: 1.5 2014 Page 1 of 5 Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware

More information

FilesAnywhere Feature List

FilesAnywhere Feature List FilesAnywhere Feature List FilesAnywhere Page 1 of 9 3/31/2014 Contents Basic Features... 3 Advanced Features... 7 Enterprise Features... 9 FilesAnywhere Page 2 of 9 3/31/2014 Basic Features No File Size

More information

AVLOR SERVER CLOUD RECOVERY

AVLOR SERVER CLOUD RECOVERY AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties

More information

Archive Manager 5.0. How to Diagnose & Troubleshoot. Spencer Pelley Technical Team Lead May 2014

Archive Manager 5.0. How to Diagnose & Troubleshoot. Spencer Pelley Technical Team Lead May 2014 Archive Manager 5.0 How to Diagnose & Troubleshoot Spencer Pelley Technical Team Lead May 2014 Learning Objectives How To Diagnose & Troubleshoot Upon completion of this lesson, the student should have

More information

MDaemon Vs. Microsoft Exchange Server 2013 Standard

MDaemon Vs. Microsoft Exchange Server 2013 Standard Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS

More information

Feature and Technical

Feature and Technical BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's

More information

UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description

UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description UNCLASSIFIED 11/12/2015 v2.2 UK Email Archiving powered by Mimecast Service Description Cobweb s UK Email Archiving, powered by Mimecast, provides businesses with a secure, scalable cloud-based message

More information

NTP Software VFM Administration Web Site for EMC Atmos

NTP Software VFM Administration Web Site for EMC Atmos NTP Software VFM Administration Web Site for EMC Atmos User Manual Revision 1.1 - July 2015 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective.

More information

Live Office. Personal Archive User Guide

Live Office. Personal Archive User Guide Live Office Personal Archive User Guide Document Revision: 14 Feb 2012 Personal Archive User Guide Personal Archive gives you an unlimited mailbox and helps you quickly and easily access your archived

More information

GiftWrap 4.0 Security FAQ

GiftWrap 4.0 Security FAQ GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels

More information

Personal Archive User Guide

Personal Archive User Guide Personal Archive User Guide Personal Archive gives you an unlimited mailbox and helps you quickly and easily access your archived email directly from Microsoft Outlook or Lotus Notes. Since Personal Archive

More information

Exchange Web Services [EWS] support in The Bat! v7

Exchange Web Services [EWS] support in The Bat! v7 Exchange Web Services [EWS] support in The Bat! v7 User Guide for TBBETA 7/17/2015 Page 1 of 17 Contents EWS support in The Bat! version 7... 2 New Wizard: Creating a new account... 2 Step 1... 2 Step

More information

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.

More information

Lesson Plans Configuring Exchange Server 2007

Lesson Plans Configuring Exchange Server 2007 Lesson Plans Configuring Exchange Server 2007 (Exam 70-236) Version 2.1 Table of Contents Course Overview... 2 Section 1.1: Server-based Messaging... 4 Section 1.2: Exchange Versions... 5 Section 1.3:

More information

Archive Attender. Version 3.2. White Paper. Archive Attender is a member of the Attender Utilities family. www.re-soft.

Archive Attender. Version 3.2. White Paper. Archive Attender is a member of the Attender Utilities family. www.re-soft. Archive Attender Version 3.2 White Paper Archive Attender is a member of the Attender Utilities family Under the copyright laws, neither the documentation nor the software can be copied, photocopied, reproduced,

More information