Understanding the Benefits of Email Archiving. Volume 1 CMIT Solutions Webinar Series January 2010



Similar documents
Archiving: Common Myths and Misconceptions

White Paper. Why Should You Archive Your With a Hosted Service?

Why You Should Consider Cloud- Based Archiving. A whitepaper by The Radicati Group, Inc.

and ediscovery Peter Pepiton ediscovery Product Manager CA Information Governance

Archiving and The Federal Rules of Civil Procedure: Understanding the Issues

Proactive Data Management for ediscovery

BEYOND THE HYPE: Understanding the Real Implications of the Amended Federal Rules of Civil Procedure. A Clearwell Systems White Paper

Archiving, Retrieval and Analysis The Key Issues

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Corporate Presentation 2016

Archiving for Compliance and Competitive Advantage

Solving.PST Management Problems in Microsoft Exchange Environments

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

Electronic Discovery How can I be prepared? September 2010

savvisdirect White Papers

E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert

Better protection for customers, and recurring revenue for you!

Archiving: To SaaS or not to SaaS?

WHY YOU SHOULD CONSIDER CLOUD BASED ARCHIVING.

Kent Cheong Regional Sales Manager GFI Software

Using EMC SourceOne Management in IBM Lotus Notes/Domino Environments

ELECTRONIC DISCOVERY & LITIGATION SUPPORT

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Preparation and collaboration are key for successful e-discovery. CHAPTER 2. Concerning the matter heretofore of the party of

E-DISCOVERY & PRESERVATION OF ELECTRONIC EVIDENCE. Ana Maria Martinez April 14, 2011

MailStore Server Sales Guide. Archiving ediscovery Compliance Backup Data Loss Protection Lower IT Costs

Solving Key Management Problems in Lotus Notes/Domino Environments

Archiving for Compliance and Competitive Advantage

Achieve more with less

3 Tips for Your Woes: Streamline. Simplify. Cloud.

Meaning Based Computing: Managing the Avalanche of Unstructured Data

Need for Archival Solution

INFORMATION PAPER. Archiving: What Schools Need to Know and Do. Network solutions for safe online learning

Michigan's New E-Discovery Rules Provide Ways to Reduce the Scope and Burdens of E-Discovery

UNCLASSIFIED. UK Archiving powered by Mimecast Service Description

How To Store s On A Server Or On A Hard Drive

Electronic Discovery and the New Amendments to the Federal Rules of Civil Procedure: A Guide For In-House Counsel and Attorneys

EMC SourceOne Management and ediscovery Overview

V1.4. Spambrella Continuity SaaS. August 2

Intelligent Information Management: Archive & ediscovery

Do You Know Where Your Messages Are?

The Disconnect Between Legal and IT Teams

Symantec Enterprise Vault for Lotus Domino

Osterman Research Executive Summary

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

Visendo Suite a reliable solution for SMBs

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY.

A White Paper. Archiving Implementation. Five Costly Mistakes to Avoid. By Bob Spurzem. May Mimosa Systems, Inc.

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

ARCHIVING. What it is, what it isn t, and how it can improve your business operations

Nova has partnered with McAfee to provide cost-effective world-class SaaS and Web Protection services that are easy to deploy and maintain.

Archiving Benefits

Chapter 1. Getting to Know Archiving Systems

security Cloud vs. On-premise solutions

E-Discovery for Paralegals: Definition, Application and FRCP Changes. April 27, 2007 IPE Seminar

How To Write A Hit Report On A Lawsuit Against A Company

Protect Your Enterprise With the Leader in Secure Boundary Services

Using SaaS to Reduce the Costs of Security

AVG AntiVirus. How does this benefit you?

Amendments to Federal Rules of Civil Procedure. electronically stored information. 6 Differences from Paper Documents

REALITY BYTES: A NEW ERA OF ELECTRONIC DISCOVERY

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud

E-Discovery: The New Federal Rules of Civil Procedure A Practical Approach for Employers

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

In-House Solutions to the E-Discovery Conundrum

Elements of a Good Document Retention Policy. Discovery Services WHITE PAPER

WHITE PAPER Archiving: The Facts Behind The Myths

Mimecast Unified Management

Is your business still wasting time and money on PCs and Servers?

68% Meet compliance needs with Microsoft Exchange. of companies send sensitive data via .

- CIO/Technology Director

Benefits of Hosted and Managed Services

High Speed Internet - User Guide. Welcome to. your world.

ELECTRONIC DISCOVERY. Dawn M. Curry

Network Usage Guidelines Contents

How to Avoid the Headache of User Mailbox Quotas

Colt Smart Office. Flexible network services for the smaller business. / Next

Developing an Integrated e-discovery and Corporate Records Management Program. Presented by: Janeine Charpiat Information Security Professional

Archiving Whitepaper. Why Archiving is Essential (and Not the Same as Backup)

Archiving: To SaaS or not to SaaS?

Archiving: Understanding the Reasons, Risks and Rewards Proofpoint ARCHIVE Whitepaper

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

Are Mailboxes Enough?

Comprehensive Archiving as a Service

WHITE PAPER Archiving and Continuity

The Headache of Managing an Service Top 10 Reasons to Outsource. White Paper July 08

# Is ediscovery eating a hole in your companies wallet?

Why Archiving is So Important in GroupWise Environments

Guide. is vital - but it s not your business!

ATTERCOPIA MANAGED HOSTING & DOMAIN SERVICES TERMS & CONDITIONS

How To Preserve Records In Mississippi

Director, Value Engineering

Challenges and Solutions

Achieve more with less

Continuity protecting your business against downtime

Archiving: A Proactive Approach to e-discovery Proofpoint ARCHIVE Whitepaper

A 123Together.com White Paper. Microsoft Exchange Server: To Outsource Or Not To Outsource The affordable way to bring Exchange to your company.

E-DISCOVERY: BURDENSOME, EXPENSIVE, AND FRAUGHT WITH RISK

HOW BUSINESSES CAN USE CLOUD COMPUTING TO OPTIMISE THEIR IT INFRASTRUCTURE

System Management. What are my options for deploying System Management on remote computers?

Transcription:

Understanding the Benefits of Email Archiving Volume 1 CMIT Solutions Webinar Series January 2010

Welcome Melanie Fricke VP of Product Strategy CMIT Solutions Scott Barlow VP of Sales & Product Management Reflexion Networks

CMIT Webinar Series If new technology is a BLUR to you... We are here to help clear things up January 22 Understanding the Benefits of Email Archiving February 25 Do you just want your computers to work? Keeping track of it all. March 25 Getting to the bottom of Google s FREE tools April 29 Social Networking Uncovering the Hype May 27 Email for small business Hosted or In-house?

About CMIT Solutions Providing IT Solutions since 1996 Have 120 local offices across the US Focus on small business We are your outsourced IT department keeping your computers running

Agenda Email Challenges What can we do about it? Hosted Email Security Why Email Archiving? The CMIT RADAR Difference

Challenges Information Overload Email Threats Spam, Virus, Spoofing, etc. Controlling Email Sprawl

Information Overload Always Connected You Wanna Get Away WSJ reported 278M people used email in August 2009 How many emails do YOU get a day? www.qsl.net

Email is Primary Tool

Effective Email 1. Only Reply to All if ALL need the information 2. Keep Subject Lines Short & to the point 3. Attach it FIRST 4. Nix the fancy background 5. Use high importance marker judiciously

Email Threats Spam unsolicited or undesired emails Virus computer program that can copy itself and infect a computer Spoofing attack person or program successfully masquerades as another Phishing criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details Beware of Tax Related Email Scams

Phishing Example

Email Spam 78% of all email sent is spam Time reports spam will cost $130 billion in 2009

Rona Reznick President and CEO Summit Management Specialists Rona averaged 250 emails a day, of which maybe 10% were business-related. After CMIT Anti-Spam, she estimated that it saved the company 1500 employee hours a year and upward of $30,000 of regained productivity time.

Controlling Email Sprawl Archiving Strategy Business Continuity Email Search & Recovery Email Compliance

Scott Barlow Reflexion Networks WHAT CAN WE DO ABOUT IT?

Hosted Email Security 1. An insulating layer of security 2. Significant bandwidth savings 3. Reduced storage expenditure 4. Frees staff time for other priorities 5. Reduced financial risk

Hosted Email Security 6. Operating vs. Capital expense 7. Email spooling - email queued during outages 8. The Green Choice 9. Email Continuity with archiving 10. Increases end-user productivity

Customer Testimonial: 50 employees On-Premises Hosted 6/2/08-6/8/08 10/13/08-10/19/08 Savings Description Bandwidth Overtime (MB) 82,815 59,862 22,953 Data transfer Attack Overtime (MB) 598,663 14,400 584,263 Number of Attacks, e.g. DoS Intrusion Overtime 8,459 2,774 5,685 Intrusion Prevention Mail Usage (MB) 1,263 401 862 Email processing Mail Usage (Connections) 104,878 8,700 92% Email connections Bandwidth Usage (MB) Weekly 82,815 59,862 22,953 Total Bandwidth Consumed Bandwidth Usage (MB) Yearly 4,306,380 3,112,824 1,193,556 1.2 TB reduction in bandwidth Bandwidth Usage (Connections) 2,594,988 779,860 1,815,128 Total Number of Connections Bandwidth Cost ($) Weekly $828.15 $598.62 $229.53 Total Cost for Bandwidth Consumed Bandwidth Cost ($) Yearly $43,063.80 $31,128.24 $11,935.56 Converted from on-premises to hosted email security Experienced significant bandwidth savings

Hosted Services Landscape Internet Direct-to-MX Attack Cached IPs Email Security Anti-Spam Anti-Virus DHA/DoS Email Spooling Outgoing SMTP Protection (Zombie/Open Relay) Incoming Filtered Email Firewall Email Archiving ediscovery Active Archive Email Recovery Email Continuity

What does RADAR offer? 1. Hosted Archiving 2. ediscovery / FRCP Compliance 3. Business Continuity 4. Disaster Recovery

State of Corporate Messaging The email burden is growing: Email is the primary corporate communication tool: Contract & sales negotiations Invoicing HR/Customer management Legal & compliance notices / Internal reporting Average corporate user handles 23,000 emails/year User daily average of 21MB by 2010-5GB/year ~90 minutes per day managing email on average ~80% of corporate Intellectual Property is stored in email (Radicati Group, Osterman Research, XGS)

Small Business Archive Challenge Retention is not assured Deleting email is company policy Discovery takes time and cost Recovery is software dependent Relying on humans to be good Business continuity at risk

Why Archive? Maintain historical reference OVER time Document compliance and performance Audits, commercial conflicts, FRCPs Respond to external requests Legal proceedings Provide disaster recovery/business continuity Insurance

How does it work?

What is Discovery? According to Wikipedia, Discovery is the pre-trial phase in a lawsuit in which each party through the law of civil procedure can request documents and other evidence from other parties or can compel the production of evidence by using a subpoena or through other discovery devices, such as requests for production and depositions.

ediscovery for FRCP Compliance The FRCP are a body of rules focused on governing court procedures for managing civil suits in the United States district courts. The changes reflect the reality that discovery of email and other ESI is now a routine, yet critical, aspect of every litigated case. i. The amendments treat ESI differently. ii. They require early discussion of and attention to electronic discovery. iii. They address inadvertent production of privileged or protected materials. iv. They encourage a two-tiered a roach to discovery deal with reasonably accessible information and then later with inaccessible data. v. They provide a safe harbor from sanctions by imposing a good faith requirement.

ediscovery for FRCP Compliance The FRCP apply to virtually all organizations in all industries. If an organization can have a civil lawsuit filed against it, then the FRCP should figure prominently in that organization s data management strategy. -Osterman Research, December 2007

ediscovery in the News Best Buy Stores v Developers Diversified Realty Corp. Developers Diversified said that they not have the resources to find all the required materials. In response, the court ordered them to produce materials from 345 backup tapes in 29 days at an estimated cost of nearly $500,000, not including attorney fees. http://ralphlosey.wordpress.com/20007/10/04/best-buy-wins-key-ruling-in-fraud-case/ http://www.ediscoverylaw.com/2007/12/articles/case-summaries/district-court-sustains-plaintiffs-objection-to-magistratejudges-order-requiring-restoration-and-production-of-database-prepared-in-separate-litigation/

ediscovery in the News Williams v. Taser International, Inc. (N.D. Ga. 6/4/2007) Taser (243 employees) implies that because it has elected to hire and train only a single technology employee, and because it has chosen to retain only a handful of attorneys to conduct document review, it is somehow relieved from its obligations to timely respond to plaintiffs discovery requests. That is not the case. Rather, the Court expects that Taser will make all reasonable efforts to comply with its discovery Orders including, if necessary, retaining additional IT professionals to search electronic databases and adding additional attorneys to perform document review. Even a small company needs to "make all reasonable efforts" including retaining additional employees for electronic discovery. Size is no excuse! http://www.electronicdiscoveryblog.com/cases/taser.pdf

Law Firm Case Study A lawyer leaves the firm after 15 years and allowed to maintain all references to his cases since 1995. The law firm has 20 employees. Example Case Numbers: CL5900 CM1971 CL0060 CL1503 CLO6569 CM14164 CLO606 CM1741 CMO304 CL1439 Step 1: Implement RADAR with ExchangeSync Step 2: Select Global Search Step 3: Search the entire archive for email content containing the above case numbers Step 4: Download the email package as a ZIP or into a PST file 2 hours later, all information was delivered. How long would it take you today?

The CMIT RADAR Difference Ease of capture (automated index, encrypt, and compress) Ease of production (No backup tapes or physical media) Storage management/optimization Reduce storage requirements on Exchange Automate enforcement of mailbox quota Knowledge Management / Data Mining 80% of corporate IP is now at your fingertips!

Business Continuity Web-based email access in the event of a: Power failure Internet outage Mail server crash / corruption

Disaster Recovery One-click recovery of email mistakenly deleted by end-users

The CMIT RADAR Difference Easy to use & quick to deploy Automated, reliable and fully managed Fast & accurate search Secure end-user web-based access Integrates with CMIT Anti-Spam

Return on Investment Rapid response to discovery requests Both internal and external Always on corporate email Frees employees for higher priorities No hardware or software to maintain or upgrade Email data store becomes corporate knowledge-base

The Business Perspective 100% email continuity means staff are more efficient Meeting our regulatory and compliance standards is much easier We could prove instantly which contract version we sent 3 yrs ago I can now know what representations and commitments staff are making via email Evidence found in RADAR saved us from months of litigation

The User Perspective It s great! I can recover an email I deleted I no longer have to manually transfer email to the I Drive. I saved hours looking for that email from 3 months ago I can access all my email anytime and anywhere so much more productive I was instantly able to prove to the client the original quote from a year ago

Ask Yourself If the power goes out, are you confident that you'd still be able to access your email? If a lawsuit arose and you needed to dig up a fiveyear-old email as part of the legal discovery process, could you do it? Could you still support normal business communications if your email server got hit with a denial-of-service attack?

Contact Your Local CMIT Office Receive a free technology assessment www.cmitsolutions.com