August 2013

Picture this- You get to a prospective client’s site, you go in, you’re prepared, confident you will win the sale, but you come out and no sale. You ask yourself, what went wrong? Was it my presentation? Was it me? Was it them? Was it the pricing? Some business owners may not be willing to tell you why they went with another solution, but knowing why is irrelevant. What you really need to know is how to correctly position the product or service. Once you learn how to do this your chances of losing out in the future will decrease dramatically. To ensure that you have the competitive advantage you will need to stand out from the rest, show your customers you’re unique. Once you help your clients understand that you’re offering something no one else can offer you will make the sale! So how do you convey that to your customers?

Perhaps the most important feature and biggest competitive advantage of ExchangeDefender is LiveArchive. LiveArchive is the business continuity piece of ExchangeDefender. What happens when the client’s server goes down? They are unable to send or receive email. We live in the technological age and majority of business is conducted through email, so no email means loss of business; no one likes to lose money. With ExchangeDefender’s LiveArchive your clients will never have to worry or experience this again. With other solutions your clients would not be able to access their email during an outage, but with ExchangeDefender you are providing your clients access to their emails through LiveArchive, this advantage will set you apart from everyone else.

Another advantage of LiveArchive is that it’s instantaneous. Your clients will be able to resume service automatically and everything will run as it normally would. It’s simple, you just open a web browser to https://livearchive.exchangedefender.com or (https://la.livearchive.exchangedefender.com) and continue where you left off so there is nothing to tweak/install/configure.

Finally, ExchangeDefender’s LiveArchive lets you stand out because unlike our competitors we sync mail, contacts and calendars. We do so for a year so you don’t have to worry about missing critical pieces of information to do your job. This is truly a Business Enterprise solution like no other and that is what will differentiate you from your competition.

Comparatively speaking, nobody else has this service so it’s easy to explain why LiveArchive as a hosted solution makes a giant difference. Another piece of the comparative puzzle is when customers find something they believe is similar, but know this is not an apples to apples comparison. If your client does happen to find a “comparable” solution, make it known to them that other solutions partner with a third party- so what does that mean for them? It means that your client is placing trust in a company that doesn’t trust their company and/or technology so they put it in the hands of a third party. Typically what happens in that case is the solution is purchased and IT Providers and clients come to find out the solution doesn’t work as it should and it happens just when the client is depending on it most. If you or your clients were in a situation like this the last thing you would want to find out is that they’re unable to access their email because their provider’s provider is down.

In addition, LiveArchive is built in with the ExchangeDefender package so unlike your competition we do not charge for basic or extended storage. Lastly, convey to your clients that your solution stands out by offering mail sync. Competing companies do not sync mail back to your server once the service comes back up so you effectively lose mail. Even worse, some don’t give you live access to email while you’re down, they just offer “mail bagging” or “mail queuing” which keeps the mail from being lost but while you’re down – you do not have the ability to send or receive mail.

LiveArchive is just one of the many features that give you the advantage over your competition. For additional tips and selling points, check out these great blogs!

If you have any additional questions, please feel free to contact me directly at: anastasia@ownwebnow.com or 877-546-0316 x 739.

Data retention and compliance archiving requirements can be a frustrating and easily misunderstood topic, especially when discussing these requirements with customers. What should be understood is that almost every business and organization falls into some type of retention requirement. Whether it is a business that accepts credit cards, or an organization that has employees, a company that deals with financials, or a shop that collects customer information; all are required to maintain records for a certain amount of time to stay in compliance with local, state, and federal laws.

Email, being a significant form of communication and means of transferring data, falls into the retention policy of most laws that require retention of “records.” This makes email compliance archiving a required solution for most businesses.

Beyond regulatory requirements, e-discovery and legal discovery rules mandated by the federal courts, requires compliance with these rules and provides specific limited time to obtain requested records. The cost of e-discovery without a proper archiving and retention policy can be astronomical, considering time and forensic requirements.

Certain industries as well as local, state, and federal governments are highly regulated through legal compliance such as HIPAA for health and patient records, FINRA for financial information, IRS, SOX, SEC, The US Patriot Act, and thousands more. Though other industries are not as heavily regulated, with the vast amount of regulatory laws that are on the books, just about every business is required to comply in one way or another.

Click to zoomThe following example is just a small sample of the thousands of data retention requirement laws that are currently in effect.

MSP’s and IT solution companies have a significant opportunity to educate and provide compliance and archiving solutions to ensure customers are meeting necessary requirements. The opportunity provides for adding an additional recurring revenue stream for hosted cloud-based archiving and compliance products, as well as potential project revenue for designing and implementing a company wide retention policy.

While there are hardware-based solutions on the market, the cost of hardware, licensing, installation, and maintenance makes them a much harder sell to customers. Comparatively, cloud-based solutions offer all of the protection, required access, and security without upfront costs, maintenance requirements, and storage limitations.

Though there are a number of cloud-based vendors to choose from, it is important to understand the differences between compliance and archiving solutions from a provider like ExchangeDefender and other cloud solution providers. ExchangeDefender will provide its partners with a Business Associate Agreement also known as a (BAA), which is required for HIPAA compliance. Other providers are quick to point fingers and often times resell 3rd party solutions branded as their own providing little recourse and protection for their partners. As well, some other vendors are not providing solutions that are hosted utilizing SSAE16 standards and auditing practices and procedures.

Compliance and archiving solutions are becoming a necessary requirement for all businesses. As an MSP or IT Solution provider, standardizing on an offering that includes this critical component is an important step in providing the best protection and service for your customers. Whether a business is micro, small, medium, or an enterprise-sized company, the threat of litigation, government compliance, or imposed fines is always a possibility. On top of all of this, providing archiving and compliance as a standard solution for customers provides an additional layer of disaster recovery by providing offsite and hosted availability to customer email information.

Since very few businesses are in compliance, the opportunity to present and provide solutions to customers is great. Begin educating by marketing compliance requirements through typical marketing outlets, discussing these issues with customers at Quarterly Business Reviews, and including compliance and archiving solutions built into managed service deployments. By providing this level of service you will not only be protecting your customers, but you will be protecting yourself as their IT provider.

krekentMany MSPs pride themselves on putting together their own custom stack for their customers because they like Company X for this product and company Y for that product. However, when you have multiple platforms interfacing with either other you’re leaving the door open for possible issues. Our recommended approach is a unified platform.

The biggest problem with combining multiple vendors across an offering starts when these third party applications aren’t playing well with each other and you need help to resolve an issue. We’ve all been part of those conversations unfortunately, where you have one vendor refusing to work with another or they are just not putting forth the effort you’d like to see. This is more common place than we’d like to admit. The root cause isn’t that people don’t want to be helpful. The problem that arises that once your data leaves the first provider’s platform, they’re now looking at the great unknown. And that’s IF the other party wants to help, because there are times when you’ll engage a vendor on an issue and you’ll be stonewalled instantly once your question involves another provider.

So what’s the proposed solution?

A unified platform that you can trust.

You already choose ExchangeDefender for arguably the most important piece of technology to your clients, their email. But we offer more. You can use our ActiveDirectory syncing software (XDSync) to maintain password synchronization between their desktop logins, their email, and the ExchangeDefender products. Upon first glance that doesn’t sound like much, that’s because folks forget we’re more than an anti-SPAM company.

Now you have a synchronized password for your clients:

E-mail

Desktop

Cloud Storage

SPAM Quarantine

Web Sharing

Business Continuity with Contact and Calendar Sync

Compliance Archiving for eDiscovery and long term email storage

Mobile Applications

Those are the positives for your client. If that’s not enough consider this. Next time there’s something up with your client’s Compliance Archive or Business continuity routing, what happens?

You call us, we will resolve it. We will resolve it quickly, efficiently and with as little hoop jumping as possible.

What happens if your email goes down and you don’t know what to do? You call us.

What happens when your clients are having a cloud storage issue? You call us.

Offering our unified platform will simplify your client’s access to technology and your support process. If you have any problems with our services you can always call us. Not an overseas partner of a company we just acquired. We are always here, and more importantly, here for you for our entire platform.

Does this sound good? It should, this is why your clients hire you: they want a single provider they can turn to that can make their IT problems disappear. When there is a problem they count on you and it’s easy to see why you need someone to count on as well.

If you’re running an I.T. business trying to understand HIPAA compliance as far as email security is concerned, you’re not alone. I.T. shops are scrambling to find solutions for their clients that are “HIPAA Compliant.” But what exactly does that mean? For the most part, HIPAA compliance states that you need a set of policies and procedures in place on appropriate use and safeguarding protected health information or PHI, processes to validate those policies and procedures are followed, and supporting technology to facilitate secure and protected communications. In my opinion, it does a very poor job at defining with any reasonable detail as to “how” to protect PHI in email form. The Privacy Rule requires a covered entity participating in the exchange of electronic protected health information (ePHI) to have in place appropriate administrative, technical, and physical safeguards to protect the privacy of PHI, including practical safeguards to protect against any intentional or unintentional use or disclosure in violation of the Privacy Rule.

Furthermore, the standard for transmission security (which can be read here: http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/techsafeguards.pdf) has been updated to enforce the use of encryption. It states that covered entities police themselves in regards to the use of public networks, possess a solution to protect ePHI as it is transmitted, and document that solution. The Security Rule goes on to state that it is perfectly acceptable to transmit ePHI to be sent over a public network as long as it is “adequately protected.”

If you’re not confused yet, I salute you. What I have gathered is that HIPAA = security + training + polices + procedures–all of which “should be” monitored and audited for compliance. It is the equivalent of saying, “You shouldn’t speed because you might get a ticket.” In this case, you should provide some reasonable level of security, train your staff and end-users on said security, create policies and procedures to comply with HIPAA guidelines. Otherwise, that “speeding ticket” can have a minimum fine of simply a warning to a maximum penalty of $1.5 million dollars with the possibility of up to 10 years in prison–depending on the severity of the breach (see: http://www.mcguirewoods.com/Client-Resources/Alerts/2013/2/HIPAA-Omnibus-Final-Rule-Implements-Tiered-Penalty-Structure-HIPAA-Violations.aspx).

It’s my opinion that the goal here is to protect the transmission and storage of sensitive patient data while trying not to impose a decisive method on how that data should be protected. While I am not claiming to speak for any government official; in a way, I believe the government body is saying, “Listen, be smart. Do everything in your power and ability to protect data in transit and the storage or that data. And if we deem there to be a compliance issue, we will weigh that violation and determine a suitable penalty.” While there’s a veil of ambiguity that shrouds the strategy or implementation of ePHI compliance, you have to admire any body of government that takes an approach of flexibility–allowing the entities to take a best practices approach to the technology that is available. In fact, as previously mentioned above, technology (or the security of that technology) is only a piece of the HIPAA compliance equation. However, since is mainly a technology blog, let’s talk about how ExchangeDefender’s Corporate Encryption can help you become HIPAA compliant with your clients.

ExchangeDefender Corporate Encryption highlights four major are of concern with thinking about email security:

Pattern Matching – Pattern-based encryption that can detect credit card numbers, social security numbers, dates of birth and other account-specific data.

Lexicon Keyword Matching – Lexicon dictionaries can contain words and word patterns that can trigger encryption mechanisms and protect from data leakage.

Corporate Encryption Mechanisms – Corporate encryption mechanisms can automatically encrypt messages or forward the contents to the administrator for the corporate review.

Comprehensive Reporting – Comprehensive reporting of all email activity as well as a Compliance Officer (CO) reporting with search capabilities provide proof of regulatory compliance and simplify reporting.

ExchangeDefender Corporate Encryption provides an easy and seamless way for organizations of all sizes to implement content protection and comprehensive control over information being sent through email. Powered by ExchangeDefender, Corporate Encryption complies with the SOX, HIPAA, SEC and local government requirements for information encryption while providing powerful audit and policy wizards to meet organizations unique goals. We provide all these features without you having to invest in expensive equipment and colocations fees. If you have additional question about our Corporate Encryption service or any of our ExchangeDefender solutions, give us a call at 877-546-0316. We will be more than happy to assist you in building a solid business solution portfolio.

We’ve released an update to the desktop version of ExchangeDefender LocalCloud. We’ve spent a few days sifting through bugs reported via (The bug section) @ support.ownwebnow.com for ExchangeDefender LocalCloud and those are the ones we focused on and fixed. Listed below are the hand full of bugs that were isolated and corrected. You can find the most recent version (v1.2), here.

· Fixed an issue that would cause the application to crash upon launch.

o This issue was caused by invalid .ICO files being supplied for branding. Even though it explicitly states that you must provide .ICO files for the Product Icon:, we had users uploading (jpg, gif, png) files.

clip_image001

· Fixed an issue that would prevent files from being deleted from the cloud upon request.

· Fixed an issue that would cause the application to continuously download/synchronize files.

While out team was busy correcting the issues reported for the desktop version of LocalCloud, we finalized our initial Web Version of the file sharing software. The web interface is a slightly trimmed down version of the Desktop Software, for what should be obvious reasons.

The Web Interface Offers, (Fully Integrated – into the admin.exchangedefender.com (USER) control panel.) the ability to view, download and upload files to your personal /shared LocalCloud accounts.

clip_image003

The accounts you have access to will be located in the left panel and their content is located to the right. You can easily transverse through the file structures to either upload or download a desired file. Complete with real time file upload & download status and located at the bottom of the screen is your storage quota. Now you can view & access your files from virtually anywhere.

If you’ve followed our blog for a while you have seen us mostly focus on the product development, support, marketing and all things related to ExchangeDefender. No change there, but I have something new: we have chosen to start adding more technology consulting content that can help you with our solutions.

As we have grown so have our partners. Many of whom are hiring technical and business staff that doesn’t have in-depth knowledge of the increasingly complex and legally challenging landscape of modern communications. As our solutions help businesses manage operations, communicate, store data and collaborate it’s on to us to help you tell a compelling story.

Simply put, we are doubling down on the educational and training resources at ExchangeDefender.

Our webinar on August 28th will feature a lot of new stuff and we will cover the new versions of ExchangeDefender, Shockey Monkey, Unicorn, LocalCloud and several new initiatives meant to help you grow your business and make your clients more efficient. We will use this blog as a run up to that webinar, posting educational content that will give you more background about everything we are doing, how we see our partners taking advantage of our solutions, where opportunities are and what potential pitfalls you need to avoid.

You have to pay attention. Or choose to ignore it. I have many conversations with our partners on the polar opposites of satisfaction with our content: To some our information and our people are priceless – for others there is just too much stuff and stuff is hard to find. Strategically, after much debate and internal arguing, we have chosen to continue putting out more content and Google search for specific questions that folks ask us for from time to time. If you can’t find it on the web site, call us or chat with us and we’ll track it down. I have to be honest with you – the business IT is now far more serious than it was 5 or 10 years ago, the legal exposure is great, dealing with liabilities and regulatory compliance is a challenge that is a part of our value proposition. We will take our time to train you and make you successful because if we cannot jointly solve these problems and help our clients succeed above those that don’t care… then there is no reason for us to be in business. I truly believe that and the whole team at ExchangeDefender believes that.

We believe that our most profitable days are ahead of us which is why we are spending money on these solutions just as others are trying to sell theirs for scrap: The difference now is that the easy money may have already been made and the most profitable projects ahead will require skill beyond IT and ability to provide guidance beyond what can be found in a quick Google search.

We will help you as little or as much as you need us and on behalf of the entire team here, thank you for your business.  

Sincerely,
Vlad Mazek
CEO, ExchangeDefender
vlad@ownwebnow.com
877-546-0316 x500

Over the past year you have seen us integrate our suite of communication applications under a single interface in the ExchangeDefender family. We’re making Exchange, ExchangeDefender Antispam, LocalCloud, Web File Sharing, Encryption, Compliance Archiving and Reporting, Web Filtering and even Shockey Monkey come under a single beautiful and seamless user interface. Our clients live inside of an interface that helps them communicate with each other, customers, vendors and outside partners and having bits and pieces of the functionality spread across many platforms is just not an optimal experience anymore.

On September 12th we will be unveiling changes to our reporting, unifying the control panels and creating a full seamless experience across all of our applications. We are extending the experience to the mobile and Outlook plugins so that you can get access to the same information no matter what sort of device or location you are in. It’s what we are working towards.

Email SPAM Quarantine Reports

To understand the necessary changes it’s important to note how ancient some of these ideas are:

When I originally designed email SPAM reports people didn’t live inside of Outlook. There were no iPads or iPhones and the smartest portable device was the 3com Palm Pilot V. Originally the only problem I had was making sure that technically inept people had a seamless way of seeing the junk mail that we quarantined.

We will first unveil the consolidated SPAM Quarantine reports. Email reports were the first technology that gave users insight into what ExchangeDefender was quarantining as SPAM but over time they have not been able to keep up with the more efficient, realtime, searchable and managed reporting we have available on our web site, Outlook plugins, desktop agents, mobile software and so on. While many have moved on from the legacy email reports platform, many have kept the old email reports running in parallel with the new software and for the most part those reports get ignored and just contribute to wasted space and bandwidth for the user.

We have changed the behavior and style of email reports to address this problem. If a user does not review their SPAM reports (doesn’t click on anything) for over 30 consecutive days, the mail reports will continue to flow but will not include the usual full quarantine message listing. They will instead be presented with a link to their ExchangeDefender web control panel where with one click they will have full access to the realtime SPAM data with the ability to read, respond and release messages, manage whitelists and settings.

But Vlad, my clients need access to this it’s the most important part of your solution!

I understand. The email reports are not going away for people that actually use them. But if they don’t use the email report to release a single message in more than 30 days… Let’s face it, they aren’t using them. And if they are only using them to look at stuff then the more optimal experience is through the Outlook Addin or the desktop agent. If we’re mistaken – go ahead and reenable their full reports – but if another 30 days goes without a single message release/whitelist, it will be reset to consolidated message.

We believe this change will address the complaints frequently raised by our clients and our partners about the wasted storage and mailbox resources that go towards SPAM reports that nobody opens. Even worse, users at times look at a SPAM report that is weeks old and attempt to locate SPAM messages that are long gone.

With the new SPAM reports they will have a convenient and quick way to access SPAM quarantines and settings. Furthermore, the system will automatically track their usage and adjust the SPAM reports from Full to Consolidated to make sure we aren’t slowing their experience down. Of course, if at any time the users feel they need more detailed access to the SPAM quarantines we urge our partners to install the Outlook addin or Windows Desktop addin or configure links to the control panel or HTML5 mobile app to give the user full and realtime control over their mail.

In October we will be beta testing native apps for ExchangeDefender as well so I hope we can continue to expand the solution portfolio to our clients both in a way that is meaningful and with the times.

Sincerely,
Vlad Mazek, MCSE
CEO, Own Web Now Corp
vlad@ownwebnow.com

In today’s traditional small business office, the best managed in-house servers are still a liability. Unmanaged in-house servers are time bombs. Why do I say this? Because the hardware used to manage your business is still onsite. From my experience, most hardware is unfortunately sitting unsecured in a closet that also houses cleaning products and printer toner or somewhere under a desk with a Post-It note on it stating, “Do Not Power Off.” With LOB applications and other SMB services such as hosted email, compliance archiving, and file sharing in the cloud; your business has nothing onsite to own, update, maintain, or repair. This makes your availability and accessibility to data and services accessible from any Internet connected device.

Availability of Data and Services

No matter how redundant you think your onsite technology is, your efforts will pale in comparison to the most basic Tier 1 data center requirements, standards, and uptime. Consider this: There are 525,800 minutes in a year. Tier 1 data center are required to maintain an uptime of 99.671%, or 523,870.78 of those 525,800 minutes. That means that the lowest tier data center (Tier 1) cannot exceed a downtime of 1,729 minutes annually. For those of you converting the number into hours or scared of math, this equates to no more than 28 hours a year of downtime. While you may be thinking a day plus 4 hours is a lot of downtime, the majority of this time is scheduled maintenance that would be needed anyway regardless where your equipment was located. Even with a minimal guaranteed uptime of 99.6%, your company is still minimizing downtime by utilizing cloud services.

What if the onsite equipment started to fail. If you are a company with no one on staff dedicated to technology issues, you now have to add additional hours to your downtime to locate and schedule professionals to diagnosis, repair, and test a fix. This doesn’t include any additional hours for physical equipment that may need to be order to complete the repair. If you’re an I.T. professional, wouldn’t it be great not to have to worry about monitoring, maintaining, updating or repairing in-house servers on a consistent basis? Imagine the time you could then dedicate to working on your business.

Accessibility of Data and Services

I, like many others I know in various industries, work remotely. There are times when I’m summoned to the office for special events, meetings, or conferences; but other than that, I work in the cloud. From my home office and using something as small as my iPhone, I can access tickets in our support portal, make and receive business calls, send and receive company email–and if necessary, even compose a blog post. Although the majority of time is spent performing these activities on my iMac strictly out of comfortability, point being our company can operate anywhere with minimal technology. Traditional desktop and LOB applications are being redesigned to operate in a cloud environment–thus breaking the symbiotic relationship between software and desktops/servers. With cloud computing, gone are the days of blue screens, random restarts, and incompatibilities between OS and applications.

If you are a Trusted Advisor in technology for your clients, you can no longer afford to carry around the liability of maintaining data or services on a retiring platform. The wheel has been created. The cloud is here to stay. You can’t continue ignoring the future and pushing your clients on technology you are only familiar with, i.e. SBSers. You have to relinquish the “Admin” ego and implement the best solution for your clients need. Today, those needs no longer involve bloated expenses for hardware purchases. By offering cloud services, you can offer your clients a worry-free environment where their data is available and easily accessible.

Businesses globally are adopting cloud services and solutions to merge communications across multiple platforms. The days of convoluted practices to remotely access information, documents, and people are long gone and mobile communications with tablets, smartphones, laptops, and even consumer appliances are now accessible from anywhere, at any time.

The biggest problem with this new frontier of technology accessibility is the fact that it is run very much like the “wild wild west.” There are not yet business standards or practices for the solutions, applications, communications platforms, or security, which creates what some might deem as a lawless environment for mid-sized businesses that once held ultimate control over their networks.

Though this description may seem extreme or far-fetched, the reality is that it is not that far off, especially given the state of mobile device adoption in the workplace or what some might call BYOD.

ExchangeDefender is providing ways for VAR’s, MSP’s, Master MSP’s, Solution Providers, Cloud Brokers, and distributors to provide customers with a set of standardized business practices and solutions, that can help clean up the mobile and technology driven wild wild west.

This has been accomplished by identifying key areas in which businesses today require standardization and best practices to control and manage their internal networks, communication, and documents through cloud-based solutions.

These are:

Communications – Email, messaging services, file sharing, collaboration, and content management solutions.

Communication is the lifeblood to any business. By standardizing on a hosted exchange solution, businesses can rest assured that they will have access to their information from anywhere in the world at anytime. This coupled with Sharepoint, Lync, and CloudShare services provides a complete email and messaging solution that can be provided, to give customers business grade messaging across all device platforms.

Security, Business Continuity, and Compliance – Antispam, encryption, compliance, archiving, and backup solutions.

The importance of keeping communications secure, free from outside eyes, constantly backed up, and available when needed is key to any business practice. Some businesses require specific levels of compliance in order to maintain legal requirements. Having this information can significantly increase an IT companies credibility by assuring that their customers meet all of the compliance, archive, and ecryption requirements set forth by their industry.

Infrastructure – Dedicated Servers, Virtual Servers, colocation services, and Web hosting.

Cloud infrastructure solutions provide businesses with cost effective ways of providing global resources without the high costs of hardware and maintenance. Virtual servers significantly decrease energy consumption and overhead costs, while increasing productivity, redundancy, security, and availability for workers across multi office or single location deployments.

As medium sized businesses continue to flourish and remote offices, mobile workers, and interconnected personnel continue to thrive; cloud services will be at the frontline of standardization practices for business.

ExchangeDefender partners will remain ahead of the game and able to provide all of the necessary solutions to take away any concerns customers may have about having a secure global network, whether it is a traditional, mobile, or hybrid network.

Having discussions and marketing about the growing wild wild west of technology and rogue nature of introducing mobile solutions into environments must be done now. Waiting for a breach or security issue to inform customers of readily available solutions may inadvertently cause downtime, high risks, or worse yet cost business revenues.

For this reason it is important to thoroughly study the types of issues that are facing medium sized companies, as well as creating awareness around solutions that can overcome any potential issue today. With tablets, mobile, and alternative devices connecting to networks everyday, the influxes of unknowns are overwhelming to network managers, so education becomes the key. Utilize your ExchangeDefender team to help point you in the right direction and feel free to ask questions if there is something you don’t understand.

We are holding a very special webinar on August 28th to announce the launch of a new service to supplement our ExchangeDefender Exchange, SharePoint and Lync offering. If you currently work with ExchangeDefender and have a growing business I cannot possibly encourage you more than to attend this event and learn what we are doing to make it possible for you to grow faster. Please register as soon as possible as seating is limited and recording will be available only to active partners:

Wed, Aug 28, 2013 12:00 PM – 1:15 PM EDT

https://www1.gotomeeting.com/register/343852577

Seriously, if you attend one webinar of ours this year.. make it this one. People have been begging us to offer these services through our partners since the launch of Managed Messaging last year and we’re going at it 100%.

We have a limited availability of the new services we will be announcing and they will be limited to our active partners as we hire on more people and scale the service out to meet the demand that we expect to be off the charts.

If you have not had a chance to hear our last webinar, please take a look at it. We have spent the past 9 months on reengineering our new solutions and implementing a new level of discipline across the organization including the SSAE16 audit. The amount of work, efford, training and migrations we have executed has prepared us to take this next leap into helping our parters grow faster.

As you will hear me say repeatedly during the webinar, the time to gain a massive market share in the cloud is now. This is likely the only time you will get to properly position your solution as the one that has support backing and is designed and managed for business, not for freebie advertising sales. While we do not have anything against the solutions offered by Microsoft and Google, the problem businesses have with communications are far different than those of consumers and everyday email consumers. Communication is critical to a business, as is compliance, protection from lawsuits and ability to enforce corporate policies, encrypt sensitive information and have an organization that will answer the call and help with an email issue any day.

Please join us. We feel that the hundreds or thousands of dollars you will earn on the very first deployment are well worth being there. You need to understand the business model and we are here to help you build around it.