ExchangeDefender – ExchangeDefender Blog

November 6, 2013

Exchange Migration Conversations

Filed under: ExchangeDefender,Hosted Services — vlad @ 10:34 am

movemailMany of our partners have been asking about the migration collateral as well as the experience our partners and their clients have on these calls. What is being discussed? How are you being introduced? Do you try to sell? What sort of information do you provide? What kind of guarantees do you provide? Relax. It’s a process and a very flexible one at that with two goals in mind: Reassure the client and identify any problems up front.

Pre-call (Partner)

Prior to the call with the client, ExchangeDefender and our Partner get together and go over the new opportunity. We discuss all the obvious stuff – domain names, current technology, current problems, any special personnel or solutions in place, timelines, etc. We determine how ExchangeDefender will be introduced (sometimes as ExchangeDefender, sometimes as “migration team” and other times just by the name) and which solutions we are to discuss during the call.

We do not sell to the client on the call. It is partners responsibility to evaluate the needs and requirements the client may have for more complex things like corporate encryption, long term archiving, Outlook addins and so on. However, sometimes we can explain the technical and business implementation matters better because of our experience with them and we make sure we get our partners permission to talk about those items. Sometimes partners have a third party encryption or compliance product they prefer over ExchangeDefender so we try to make sure we follow the plan the partner has laid out for their client and assist in what they want to do.

Initial Client Call (Partner & ExchangeDefender & Client)

Partners typically arrange a phone call between the client, themselves and us and we get on the line with our questionnaire and go through the typical barrage of questions that lead us in the direction the client deems to be most important. This is critical: Always let the client guide you through their problems so you can address them. Based on their prior experience, company management may have different concerns than their IT team or previous IT Solution Provider; they may not be the right ones to answer the questions you may be asking; they may provide more detail of where the company is going and give both the partner and ExchangeDefender an avenue to help mitigate some risks and problems that will show up down the road.

During the initial talk we identify their primary problems and concerns; identify the contact points and vendors they rely on; timelines or dates around which no service interruption should take place; regulatory compliance requirements and activities, etc.

The purpose of the first call is to introduce our process, make adjustments and determine the correct plan of action.

Followup Partner Call (Partner & ExchangeDefender)

There are always surprises and opportunities the more we talk with our clients. The purpose of the followup call is to divide up the work and discovery process and begin the assessment. While some partners will allow us full control of the process and trust us to do the work end-to-end, others may prefer to do parts of the migration process themselves (installing their own RMM, making backups, etc) and we plan our course of action during this call.

Without getting extremely granular on every detail, the technical process of a migration is not complex. The complexity comes from problems, issues and limitations that come up during the mailbox move. So one of the first steps after we deploy the ExchangeDefender Business Monitoring tool (or our partners RMM choice) is to deploy bandwidth monitoring tool and verify the speed of the Internet connection around the clock. We go through the mailbox infrastructure and identify large mailboxes that are appropriate for Compliance Archiving, run tests and so on. The goal of the followup is to get an understanding of what can and cannot be done, what timelines we may be looking at given the limitations and restrictions and to match up calendars and migration schedules.

Followup Client Call (Partner & ExchangeDefender & Client)

Followup calls are optional and frequently handled by the partner but ExchangeDefender does offer to be a part of the whole process of explaining our discovery and our recommendations about compliance, encryption, DNS control, migration, LiveArchive business continuity, upgrading of various desktops and systems, viability of the Outlook addins or third party vendors or remote office migration plans.

The initial process is all about gathering ideas, suggestions, problems and solutions and running them by your client. It’s never going to be foolproof and we’ve heard this one often:

“You are very reassuring and seem to have a good grasp on how all this works. I’m happy about that. My concern is with things that you don’t know about and things that we don’t bring up that will break the system after the migration. We don’t want to be in a situation where you just tell us that you didn’t know about it because we didn’t tell you”

The above problem is inevitable, it is commercially impossible to both provide an economical move and a fool proof one. So we focus on the process at hand, we do only what we write into the contract and then we deal with anything that may be outside of that contract through other means. It doesn’t make all the clients happy – which is unfortunate – but it gives them something they can count on and a process they can understand.

As we go through the migration, every step is clearly communicated to the partner. They are armed with tons of branded collateral and every message we send out also has their logo on it. We can send the notification directly to the partner or to the partner and the client contact. Whenever a mailbox moves, whenever a DNS record changes, whenever a login is about to be made or profile reconfigured – we send out notices.

For more details on the collateral and the process notifications and the actual migration and technical stuff, stay tuned. There is new stuff being added every single day and a lot of it is customized with each given scenario. The key to migrations is planning and constant communication. So we’ll obviously have more and more of it here.

-Vlad

Sincerely,
Vlad Mazek, MCSE
CEO, ExchangeDefender


October 25, 2013

ExchangeDefender Outlook 2013 Integration

Filed under: ExchangeDefender,Software — vlad @ 9:54 am

We’re happy to announce Outlook 2013 addin for ExchangeDefender. You can download it here and you won’t have to use anything but Outlook to access your most frequently used ExchangeDefender functions such as management of SPAM quarantines, whitelists, stats and so on. The plugin will refresh the data every 30-60 minutes (or in realtime if you prompt it to do so) and it’s just that simple.

install

install_4

What I would like to discuss now is the future of the platform. As you may have seen on this blog, there has been a significant amount of mobile development on our Shockey Monkey platform. All of that is coming to ExchangeDefender as well this quarter.

It gets even better: Now that we have ExchangeDefender Outlook addins for Outlook 2007, Outlook 2010 and Outlook 2013 (in addition to our Desktop addin, our web portal) we are looking to extend these addins to incorporate additional ExchangeDefender features to the everyday Outlook experience: LiveArchive Business Continuity, Encryption, File Sharing, Compliance Archiving Search and Recovery, LocalCloud, Chat and more. By further integrating these services with your mobile and desktop (or Outlook) experience we are able to provide a more cohesive and collaborative office experience no matter where you are or which device you are using. This is a significant challenge but one that we are working on every day.

Hank Newman
VP of Development, ExchangeDefender
hank@ownwebnow.com


October 15, 2013

Answering With The Cloud

Filed under: ExchangeDefender,General,Hosted Services — vlad @ 9:52 am

oldworlditEvery new wave of technological advancement brings nuances that make it difficult to make the exact comparison to the problems old technology solved. The easiest way to promote the new stuff is to talk about all the new great things it does, but what do you say when you are questioned about things that are no longer a problem in the 21st century?

One of the questions we are usually asked is if a company has enough bandwidth to rely on Hosted Exchange.

Fair question. When the small company first started it’s Exchange deployment in late 90’s early 00’s it had all it’s employees in one site and every desktop was on the LAN. Fast forward to 2013 where most employees have mobile phones that are in constant sync with the Exchange deployment over the WAN. Remote offices, road warriors, executive laptops at home – now each user has several devices connecting to the Exchange server at the office and there would be actual net savings in bandwidth if the Exchange server went to the cloud

To be fair, these “infrastructure concerns” are typically coming from the IT employee who is trying to protect his job with inferior solutions: Your sales process should focus on actual business operations concerns around business continuity, security and compliance. Here are some ways to differentiate the cloud model with the DIY model.

Just how reliable is the cloud version? What happens when it goes down?

Well it uses the same software that you would run in your office so it is comparable to your existing experience. The difference with the cloud is that the systems are much larger and far more redundant so they can conduct more maintenance without affecting operations because it’s not a single server. Maintenance keeps small problems from becoming big problems and when there are issues they are posted here so you know exactly what is going on.

Cloud Exchange is also redundant across two data centers so if there is a networking issue that impacts one you will still be in business.

In the event of a catastrophic outage, where your cloud Exchange is actually down, you can rely on ExchangeDefender LiveArchive which gives you last year worth of email including all your contacts, calendars and appointments with full realtime access to send and receive even over a mobile device.

What about backups? What if they go out of business? How can I be sure I have my data?

You’re protected in several ways, the most immediate one being Outlook 2013 cached mode. Because Outlook 2013 is included for free we will upgrade all your workstations to store all your email locally on your workstations or laptops so it will be protected by the local backups first.

We also provide business level backups of your entire organization and we can do it on a monthly, quarterly or annual basis so you can snapshot your mail and keep it here or off site in a safe deposit box on a portable USB hard drive. We can even automate the process by keeping this information on BDR systems in our data center.

There is also an option for Compliance Archiving – we can store up to 10 years of email and have it available for immediate search without additional devices or appliances. It’s just another service available to protect your data.

To be honest, the concept of backups worked in the old days where organizations had small servers or single instance storage with a single RAID – cloud deployments are scalable, using multiple servers with DAG that keeps copies of the data in multiple locations. Because these systems are built for scale they offer more flexibility and more data copies – but we can certainly help you sleep easier at night by providing these additional services that make sense if you’re not so sure about the cloud.

What about security? I hear the cloud is hacked a lot! I have compliance to worry about as well.

The threat of having your security compromised is real regardless of where your Exchange is. One thing you can be sure of is that providing the level of monitoring and security layers available in the cloud would make an office server solution very expensive. ExchangeDefender provides stated Security Procedures document, Data Destruction Document, is SSAE 16 certified and undergoes multiple security audits every year – how about your IT employee?

We already mentioned Compliance Archiving, the system that gives you realtime access to 10 years of your email, where you can quickly locate any inbound, outbound and even interoffice email that matches search criteria. If you have HIPAA concerns, ExchangeDefender will sign a Business Associate Agreement (BAA) so you’re covered and have full access to your mail without worrying if it has been tampered with by the IT staff.

Security is really a matter of monitoring, technology and user awareness. ExchangeDefender has a lot more resources and higher end firewalls and DDoS protection service to address security problems when they pop up, patch the systems quickly because it can offline redundant servers, filter suspicious traffic and more that we cannot do affordably for you in the office. But what we can do is implement requirements for password rotation, we can deploy RSA SecurID for one-time passwords, we can monitor usage patterns and more.

Summary

Sometimes it’s hard for people stuck in the old model of IT to quickly accept how change has provided for better solutions to old IT problems. The key to a successful client relationship and a sale is not to argue some preconceived notions about IT but to explain the advances in technology and all the better stuff they will get from the cloud.

While everything about technology can be debated endlessly by the tech world, technical implementation to suit business has been taken out of the clutches of IT departments and placed into control of executives who have a more practical view of technology. Try asking two IT people: “What’s the best way to backup data” and see how many answers you get. Asking an executive will get you a different, more practical answer: We need to be able to continue work as usual within X hours but we need to have access to Y years of data in case of an audit.

ExchangeDefender and our partners are constantly evolving the best technology and the best local people around the world to solve these IT problems. Sometimes starting the conversation and framing it in a way to explain the advancement we’ve had in the past two decades when it comes to email is more difficult than just providing the solution. We hope this helps and if you need more info please do not hesitate to contact us.

Sincerely,
Vlad Mazek
CEO, ExchangeDefender


October 7, 2013

ExchangeDefender Reputation Scoring

Filed under: Announcements,ExchangeDefender — vlad @ 10:50 am

When you send an email through ExchangeDefender it is checked for the presence of viruses, malware, SPAM and other dangerous content. It is our responsibility to make sure that the mail crossing the network, both in and out, is safe and that we are notcontributing to the flood of junk across the Internet. This is the story of our outbound network and it’s working great.

We also have another network, outbound-jr (affectionately nicknamed junk relay) where the rules are a little more relaxed. Some organizations have business case scenarios thatrequire them to send out null sender messages (maintenance, bounces, oof replies), some like to send bounces, some have massive email notification systems (RMM, transactions, etc) and they are on the line of legitimate andjunk mail as a choice. Since junk classification is handled by computers, (not humans), sometimes-legitimate mail is not being accepted for delivery.

A change that we are considering implementing, is a stricter set of monitoring and access restriction controls on outbound-jr. The first of these is a restriction on open SMTP ports, which often contributes to open relay mass mailings. This can be accomplished by rolling out a service that will deny access to outbound-jr if a client’s port 25 is accessible from the Internet (outside of the ExchangeDefender network). Traditionally this has been managed by IT departments and partners, but with a constant barrage of overly aggressive SPAM methods, the ability for most to manage this without security threats or incidents is an overwhelming issue.

To counter these threats and provide the most effective and best solution possible for our partners, we are soliciting feedback and beginning the alerting process to clients that have port 25 open without IP restrictions to the ExchangeDefender network. If there are no major objections to enforcing IP restrictions to port 25 (after all, if you have external client that requires SMTP relay access they can always use the SSL port) then we are considering adding this as a service requirement.

Thoughts? Opinions? Let us know via phone, chat, support tickets or just email me at vlad@ownwebnow.com

Sincerely,
Vlad Mazek, MCSE
CEO, Own Web Now Corp


September 30, 2013

ExchangeDefender Service Check

Filed under: ExchangeDefender — vlad @ 2:39 pm

Although I can’t talk about our major initiative until the webinar next week, we have a ton of new stuff we’re developing on the backend to make your life easier. First of many that I have the pleasure of announcing is the ExchangeDefender Validation Wizard:

ExchangeDefender Validation Wizard gives you the ability to eliminate/isolate problems on the ExchangeDefender network through the same process our team uses and through the same systems our engineers rely on. The beta is available at: http://www.exchangedefender.com/check.php

Simply plug in the mailbox email and password and our wizard will troubleshoot things end to end and line up with our best practices:

vlad0

 

Validation Wizard

vlad1What the wizard actually does is even more important to understand: this is not some simple database field validation tool. It actually opens connections to the live backend servers, tests connections, looks up DNS records and does everything that technicians typically do by hand.

Exchange Mailbox: Wizard will first check the password and authentication credentials against the live CAS server. If this check fails it means you have the wrong email/password combo. Please note that this check validates the actual connection, not what is in the control panel. If your user went around you and reset their password via OWA then just remember the best practice to reset it right back to something you can support.

MX Record Check: After the mailbox is verified as live and online, system will check the DNS for the correct MX and Autodiscover records. This is particularly useful in the mail troubleshooting process when email delays and missing emails are a problem. Clients tend to have incorrect, missing or external MX records in their delivery list and more often than not this is the culprit to missing and delayed email. Every now and then we also find that the domain record registration had expired (and as it’s the last thing we ever check it’s among the most frustrating)

Network Connectivity: As the test implies, we check the connectivity to clients CAS, HUB and Mbox server to check on the backend and identify any potential bottlenecks that could be affecting connectivity.

Mail Services Check: The extension of the network test, in which we go through all the web, SMTP, IMAP, POP3, CAS and MAPI services to make sure the clients mailbox is setup correctly, mail flows as it should and there aren’t any “weird” issues on the backend such as a mailbox that is locked out, over quota, possessed by email gremlins and so on.

Piece of a Proactive Puzzle

As you can tell, we are putting more and more pieces together that allow us to deliver a truly managed service throughout the cloud. Typical cloud service checks verify that the servers are online and functioning but the truth is that there are typically dozens of servers and multiple data centers involved in service delivery and the transparency to the backend can at times make it impossible for a third party to effectively troubleshoot the service.

By extending the access of our backend into your hands we feel we can deliver powerful functionality in a very easy to use and manage tool set. Even though PowerShell access is available, we find it that few have the capability to rely on it and every time you have to do something manually through PowerShell you will waste more time than you expected. Not to mention that the testing has to be layered in order to make sense.

Our business model calls for us to further simplify and eliminate the hassle of email issues. By transferring these complex, procedural and often poorly documented best practice and troubleshooting sets to a simple, easy to use and cleanly presented service we can eliminate a huge cost and open up our portfolio to delivering managed mail services that are not conditional on the infrastructure problems.

I certainly look forward to sharing everything we’re up to here but I think you can agree that it helps when we’re on the same page Smile

Sincerely,

Vlad Mazek, MCSE
CEO, Own Web Now Corp
vlad@ownwebnow.com
(407) 536-VLAD


September 4, 2013

The Truth About Cloud Services

Filed under: ExchangeDefender,Hosted Services,How To — vlad @ 6:46 pm

If you attended our last webinar (will be posted for download in our portal next week) you already know what I’m going to say: Winning in the cloud has nothing to do with technology and everything to do with good customer service. The technology of implementation, scalability, redundancy, system capacity and long term legacy use are terms both distant and hard to differentiate for most clients from SMB to enterprise: If you meet their compliance requirements the question of whether you will make money in the cloud or not depends solely on your ability to set the correct expectations and deliver the non-IT part of the service effectively.

Good news is that we are here to help!

But is it smug to believe that you actually need help? When we talked to our partners about cloud adoption the answer surprised even us: not at all and to be honest we’d rather have our weekends back. Truth behind cloud deployments is that the up front investment in time and planning is expensive, messy and clients do not like downtime – forcing IT Solution Providers to execute complex migrations over weekends, holidays and provide ongoing support for unpredictable surprises that always come up.

Truth about the cloud is that the deployment of a cloud solution is 1% technology, 99% proper project management and customer communication. It’s the 99% of the prep work and followup that is keeping most solution providers from seriously taking advantage of the cloud solutions because without help the ability to scale to the cloud is the same as the ability to scale to another inhouse solution.

Over the next two weeks ExchangeDefender is dedicating significant resources to help you navigate what we’re internally calling Napalm Cloud – rapid fire cloud service deployments for Exchange, SharePoint, Lync, ExchangeDefender, LocalCloud, LiveArchive and all the project management, communication and service that goes along with it.

We will be posting several articles, blogs, webinars and guides that we use at ExchangeDefender to deliver our Managed Messaging service in hopes of giving you an idea of how these projects happen consistently, successfully and with a great deal of client satisfaction.

I hope you join us as we discuss these topics because they are of a great importance to your success and profits in the cloud. Money in the cloud will not be made on subscription revenues, the “free” model has effectively assured that, so the greatest opportunity for solution providers is in providing a peace of mind and predictability when it comes to technology – today, tomorrow and years from now.

Can you say that you deliver that? Hopefully over the next two weeks we’ll help you get closer to yes.

Sincerely,
Vlad Mazek, MCSE
CEO, Own Web Now Corp
(877) 546-0316 x500


August 26, 2013

Using LiveArchive to differentiate yourself in the marketplace

Filed under: Consulting,ExchangeDefender — Anastasia @ 10:58 am

Picture this- You get to a prospective client’s site, you go in, you’re prepared, confident you will win the sale, but you come out and no sale. You ask yourself, what went wrong? Was it my presentation? Was it me? Was it them? Was it the pricing? Some business owners may not be willing to tell you why they went with another solution, but knowing why is irrelevant. What you really need to know is how to correctly position the product or service. Once you learn how to do this your chances of losing out in the future will decrease dramatically. To ensure that you have the competitive advantage you will need to stand out from the rest, show your customers you’re unique. Once you help your clients understand that you’re offering something no one else can offer you will make the sale! So how do you convey that to your customers?

Perhaps the most important feature and biggest competitive advantage of ExchangeDefender is LiveArchive. LiveArchive is the business continuity piece of ExchangeDefender. What happens when the client’s server goes down? They are unable to send or receive email. We live in the technological age and majority of business is conducted through email, so no email means loss of business; no one likes to lose money. With ExchangeDefender’s LiveArchive your clients will never have to worry or experience this again. With other solutions your clients would not be able to access their email during an outage, but with ExchangeDefender you are providing your clients access to their emails through LiveArchive, this advantage will set you apart from everyone else.

Another advantage of LiveArchive is that it’s instantaneous. Your clients will be able to resume service automatically and everything will run as it normally would. It’s simple, you just open a web browser to https://livearchive.exchangedefender.com or (https://la.livearchive.exchangedefender.com) and continue where you left off so there is nothing to tweak/install/configure.

Finally, ExchangeDefender’s LiveArchive lets you stand out because unlike our competitors we sync mail, contacts and calendars. We do so for a year so you don’t have to worry about missing critical pieces of information to do your job. This is truly a Business Enterprise solution like no other and that is what will differentiate you from your competition.

Comparatively speaking, nobody else has this service so it’s easy to explain why LiveArchive as a hosted solution makes a giant difference. Another piece of the comparative puzzle is when customers find something they believe is similar, but know this is not an apples to apples comparison. If your client does happen to find a “comparable” solution, make it known to them that other solutions partner with a third party- so what does that mean for them? It means that your client is placing trust in a company that doesn’t trust their company and/or technology so they put it in the hands of a third party. Typically what happens in that case is the solution is purchased and IT Providers and clients come to find out the solution doesn’t work as it should and it happens just when the client is depending on it most. If you or your clients were in a situation like this the last thing you would want to find out is that they’re unable to access their email because their provider’s provider is down.

In addition, LiveArchive is built in with the ExchangeDefender package so unlike your competition we do not charge for basic or extended storage. Lastly, convey to your clients that your solution stands out by offering mail sync. Competing companies do not sync mail back to your server once the service comes back up so you effectively lose mail. Even worse, some don’t give you live access to email while you’re down, they just offer “mail bagging” or “mail queuing” which keeps the mail from being lost but while you’re down – you do not have the ability to send or receive mail.

LiveArchive is just one of the many features that give you the advantage over your competition. For additional tips and selling points, check out these great blogs!

If you have any additional questions, please feel free to contact me directly at: anastasia@ownwebnow.com or 877-546-0316 x 739.


August 20, 2013

Building a Sales Case for Encryption

Filed under: Consulting,ExchangeDefender — vlad @ 9:42 am

If you’re running an I.T. business trying to understand HIPAA compliance as far as email security is concerned, you’re not alone. I.T. shops are scrambling to find solutions for their clients that are “HIPAA Compliant.” But what exactly does that mean? For the most part, HIPAA compliance states that you need a set of policies and procedures in place on appropriate use and safeguarding protected health information or PHI, processes to validate those policies and procedures are followed, and supporting technology to facilitate secure and protected communications. In my opinion, it does a very poor job at defining with any reasonable detail as to “how” to protect PHI in email form. The Privacy Rule requires a covered entity participating in the exchange of electronic protected health information (ePHI) to have in place appropriate administrative, technical, and physical safeguards to protect the privacy of PHI, including practical safeguards to protect against any intentional or unintentional use or disclosure in violation of the Privacy Rule.

Furthermore, the standard for transmission security (which can be read here: http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/techsafeguards.pdf) has been updated to enforce the use of encryption. It states that covered entities police themselves in regards to the use of public networks, possess a solution to protect ePHI as it is transmitted, and document that solution. The Security Rule goes on to state that it is perfectly acceptable to transmit ePHI to be sent over a public network as long as it is “adequately protected.”

If you’re not confused yet, I salute you. What I have gathered is that HIPAA = security + training + polices + procedures–all of which “should be” monitored and audited for compliance. It is the equivalent of saying, “You shouldn’t speed because you might get a ticket.” In this case, you should provide some reasonable level of security, train your staff and end-users on said security, create policies and procedures to comply with HIPAA guidelines. Otherwise, that “speeding ticket” can have a minimum fine of simply a warning to a maximum penalty of $1.5 million dollars with the possibility of up to 10 years in prison–depending on the severity of the breach (see: http://www.mcguirewoods.com/Client-Resources/Alerts/2013/2/HIPAA-Omnibus-Final-Rule-Implements-Tiered-Penalty-Structure-HIPAA-Violations.aspx).

It’s my opinion that the goal here is to protect the transmission and storage of sensitive patient data while trying not to impose a decisive method on how that data should be protected. While I am not claiming to speak for any government official; in a way, I believe the government body is saying, “Listen, be smart. Do everything in your power and ability to protect data in transit and the storage or that data. And if we deem there to be a compliance issue, we will weigh that violation and determine a suitable penalty.” While there’s a veil of ambiguity that shrouds the strategy or implementation of ePHI compliance, you have to admire any body of government that takes an approach of flexibility–allowing the entities to take a best practices approach to the technology that is available. In fact, as previously mentioned above, technology (or the security of that technology) is only a piece of the HIPAA compliance equation. However, since is mainly a technology blog, let’s talk about how ExchangeDefender’s Corporate Encryption can help you become HIPAA compliant with your clients.

ExchangeDefender Corporate Encryption highlights four major are of concern with thinking about email security:

Pattern Matching – Pattern-based encryption that can detect credit card numbers, social security numbers, dates of birth and other account-specific data.

Lexicon Keyword Matching – Lexicon dictionaries can contain words and word patterns that can trigger encryption mechanisms and protect from data leakage.

Corporate Encryption Mechanisms – Corporate encryption mechanisms can automatically encrypt messages or forward the contents to the administrator for the corporate review.

Comprehensive Reporting – Comprehensive reporting of all email activity as well as a Compliance Officer (CO) reporting with search capabilities provide proof of regulatory compliance and simplify reporting.

ExchangeDefender Corporate Encryption provides an easy and seamless way for organizations of all sizes to implement content protection and comprehensive control over information being sent through email. Powered by ExchangeDefender, Corporate Encryption complies with the SOX, HIPAA, SEC and local government requirements for information encryption while providing powerful audit and policy wizards to meet organizations unique goals. We provide all these features without you having to invest in expensive equipment and colocations fees. If you have additional question about our Corporate Encryption service or any of our ExchangeDefender solutions, give us a call at 877-546-0316. We will be more than happy to assist you in building a solid business solution portfolio.


August 16, 2013

LocalCloud 2.1

Filed under: Announcements,Development,ExchangeDefender,Software — vlad @ 8:07 am

We’ve released an update to the desktop version of ExchangeDefender LocalCloud. We’ve spent a few days sifting through bugs reported via (The bug section) @ support.ownwebnow.com for ExchangeDefender LocalCloud and those are the ones we focused on and fixed. Listed below are the hand full of bugs that were isolated and corrected. You can find the most recent version (v1.2), here.

· Fixed an issue that would cause the application to crash upon launch.

o This issue was caused by invalid .ICO files being supplied for branding. Even though it explicitly states that you must provide .ICO files for the Product Icon:, we had users uploading (jpg, gif, png) files.

clip_image001

· Fixed an issue that would prevent files from being deleted from the cloud upon request.

· Fixed an issue that would cause the application to continuously download/synchronize files.

While out team was busy correcting the issues reported for the desktop version of LocalCloud, we finalized our initial Web Version of the file sharing software. The web interface is a slightly trimmed down version of the Desktop Software, for what should be obvious reasons.

The Web Interface Offers, (Fully Integrated – into the admin.exchangedefender.com (USER) control panel.) the ability to view, download and upload files to your personal /shared LocalCloud accounts.

clip_image003

The accounts you have access to will be located in the left panel and their content is located to the right. You can easily transverse through the file structures to either upload or download a desired file. Complete with real time file upload & download status and located at the bottom of the screen is your storage quota. Now you can view & access your files from virtually anywhere.


August 12, 2013

Changes coming to ExchangeDefender SPAM Reporting

Filed under: ExchangeDefender,Software — vlad @ 10:15 am

Over the past year you have seen us integrate our suite of communication applications under a single interface in the ExchangeDefender family. We’re making Exchange, ExchangeDefender Antispam, LocalCloud, Web File Sharing, Encryption, Compliance Archiving and Reporting, Web Filtering and even Shockey Monkey come under a single beautiful and seamless user interface. Our clients live inside of an interface that helps them communicate with each other, customers, vendors and outside partners and having bits and pieces of the functionality spread across many platforms is just not an optimal experience anymore.

On September 12th we will be unveiling changes to our reporting, unifying the control panels and creating a full seamless experience across all of our applications. We are extending the experience to the mobile and Outlook plugins so that you can get access to the same information no matter what sort of device or location you are in. It’s what we are working towards.

Email SPAM Quarantine Reports

To understand the necessary changes it’s important to note how ancient some of these ideas are:

When I originally designed email SPAM reports people didn’t live inside of Outlook. There were no iPads or iPhones and the smartest portable device was the 3com Palm Pilot V. Originally the only problem I had was making sure that technically inept people had a seamless way of seeing the junk mail that we quarantined.

We will first unveil the consolidated SPAM Quarantine reports. Email reports were the first technology that gave users insight into what ExchangeDefender was quarantining as SPAM but over time they have not been able to keep up with the more efficient, realtime, searchable and managed reporting we have available on our web site, Outlook plugins, desktop agents, mobile software and so on. While many have moved on from the legacy email reports platform, many have kept the old email reports running in parallel with the new software and for the most part those reports get ignored and just contribute to wasted space and bandwidth for the user.

We have changed the behavior and style of email reports to address this problem. If a user does not review their SPAM reports (doesn’t click on anything) for over 30 consecutive days, the mail reports will continue to flow but will not include the usual full quarantine message listing. They will instead be presented with a link to their ExchangeDefender web control panel where with one click they will have full access to the realtime SPAM data with the ability to read, respond and release messages, manage whitelists and settings.

But Vlad, my clients need access to this it’s the most important part of your solution!

I understand. The email reports are not going away for people that actually use them. But if they don’t use the email report to release a single message in more than 30 days… Let’s face it, they aren’t using them. And if they are only using them to look at stuff then the more optimal experience is through the Outlook Addin or the desktop agent. If we’re mistaken – go ahead and reenable their full reports – but if another 30 days goes without a single message release/whitelist, it will be reset to consolidated message.

We believe this change will address the complaints frequently raised by our clients and our partners about the wasted storage and mailbox resources that go towards SPAM reports that nobody opens. Even worse, users at times look at a SPAM report that is weeks old and attempt to locate SPAM messages that are long gone.

With the new SPAM reports they will have a convenient and quick way to access SPAM quarantines and settings. Furthermore, the system will automatically track their usage and adjust the SPAM reports from Full to Consolidated to make sure we aren’t slowing their experience down. Of course, if at any time the users feel they need more detailed access to the SPAM quarantines we urge our partners to install the Outlook addin or Windows Desktop addin or configure links to the control panel or HTML5 mobile app to give the user full and realtime control over their mail.

In October we will be beta testing native apps for ExchangeDefender as well so I hope we can continue to expand the solution portfolio to our clients both in a way that is meaningful and with the times.

Sincerely,
Vlad Mazek, MCSE
CEO, Own Web Now Corp
vlad@ownwebnow.com


« Newer PostsOlder Posts »