Ferris Research Free News
Wednesday, June 04, 2008
  Jun 4, Daily Compliance & Messaging News
Ferris Research Home

Sign up for the Ferris News Service here

News on messaging, content control, compliance, e-discovery, data leak prevention
Daily Digest: June 4, 2008
Content Control, Compliance, Archiving, E-Discovery, & Data Leak Prevention

IBM Extends Enterprise Content Management Software Portfolio With Business Content Services (Comments?)

AT&T Launches Encryption Services to Help Businesses Secure E-Mail and Data (Comments?)
AT&T Expands Managed Security Services Portfolio

CT Summation Announces Compliance with EDRM XML Import and Export Standard for e-Discovery (Comments?)  

Messaging & Collaboration

Ensim Announces Upgrade to Password Management Solution (Comments?)
New version of Unify Password Manager allows employees to reset their own passwords from any system or Windows log-in screen

MX Logic Debuts New Security Service Bundles (Comments?)
Combined Services Provide Better Email and Web Protection at Lower Overall Cost

Verizon Wireless Offers Another Great Corporate E-Mail Solution, Giving Customers Access to Business Information on Their Phones (Comments?)
Verizon Wireless Phones Can Now Access Corporate E-Mail with RemoSync

Brosix Launched Highly Secure Instant Messaging Tool Designed for Businesses (Comments?)  

New release of Yahoo! Messenger 9.0 Beta (Comments?)  

Blog Item(s)

Compliance in a Web 2.0 World
Web 2.0 technologies provide a plethora of places that data can reside. These present substantial compliance challenges. For example, it will be hard to know where all of your company’s data is, and whether and how intellectual property has escaped your organization today.

Fast-forward five years. Imagine hosting some of your email with Microsoft Exchange Online, some with Gmail, some being sent PIN-to-PIN on BlackBerry devices, and some in an on-premises email system. Add to that SharePoint hosted with a third-party hosting provider; layer in hosted Salesforce.com, backup in the cloud, and storage with Amazon S3; and season it with a bit of Live Mesh. And keep in mind that data could be in any of hundreds of file formats, including voice, video, or even purposely encoded messages within other documents.

To complete the picture, add one or two rogue executives or other employees with data that they feel a need to hide. In addition to the plethora of data silos on the Internet, data could be "hidden" on USB drives, in PSTs, even (gasp) in offshore data havens such as Havenco. And finally, those hiding their tracks and data may resort to any number of encryption technologies to make detection more difficult.

What does compliance and data control mean in this context? Think of the challenges this brings. Think of how laws around data protection will evolve in the coming few years. Regulations today-–such as the European Commission’s 1995 Directive on Data Protection (Directive 95/46/EC)--stipulate that certain types of data must only be transferred to countries meeting specific criteria. Other regulatory regimes or laws may prohibit certain types of data leaving the company, leaving the country, or being shared with individuals in certain restricted countries.

To address these challenges, organizations must:

  • Decide between the following starting points around security:
    • Anything not explicitly denied is permitted.
    • Anything not explicitly permitted is denied.
  • Establish realistic, enforceable, and well-implemented policies around appropriate and inappropriate use of corporate data.
  • Have the will to enforce breaches of policy, without showing favoritism.
  • Carefully screen all hosting and software as a service technologies from the perspectives of searchability, data access, data protection, and applicable laws and regulations.
  • Evaluate technologies that help establish safeguards against data leakage.
  • Track the plethora of new social media and collaboration technologies emerging on the market and understand how much of this is in their environment.
  • Define discovery requirements and implement technologies that enable discoverability within acceptable time frames.

... David Sengupta



Upcoming Reports & Events

Electronic Discovery: Helping General Counsel Understand IT's Role
Wednesday, June 4, 2008
8:30am Pacific, 11:30am Eastern, 4:30pm UK, 5:30pm CET. One hour.

In-house and external legal teams understand that IT now has an important role in e-discovery, but the details of the role are often unclear. In this webinar, Ferris analyst David Ferris and Fritz Mueller of MetaLINCS discuss IT's role and how general counsel can optimize its relationship with IT. The panel also includes Conrad Jacoby, founder of efficientEDD, a consultancy specializing in e-discovery and litigation information management issues, and MetaLINCS CTO Chuck Williams. The event concludes with a Q&A session.

To register for the webinar, click here. For more information, click here.

Cost-Effective Alternatives to Exchange
Wednesday, June 18, 2008
10:00am Pacific, 1:00pm Eastern, 6:00pm UK, 7:00pm CET. One hour.

Microsoft Exchange is the dominant messaging and collaboration server for in-house organizational use. However, some organizations are seeking alternatives to Exchange--perhaps because they are cost-sensitive, have a Linux strategy, or need to deploy larger mailboxes. In this webinar, Ferris analyst Richi Jennings and Sina Miri of PostPath map the landscape for Exchange alternatives. The webinar concludes with a Q&A period.

To register for the webinar, click here. For more information, click here.

Recent Research

Recent Reports Available:

For more reports, visit our reports page.

Recent Ferris Webinars:

About Ferris Research

Ferris Research studies messaging, and the control of electronic information. More specifically, we help IT staff evaluate and implement products and services that:

  • Provide messaging and collaborative technologies
  • Archive electronic information
  • Ensure compliance with corporate policy, industry regulations, and laws
  • Facilitate e-discovery, and contain its costs
  • Reduce the dangers of information leaks

Email is the most important type of electronic information that requires control today. Other important types include instant messages, Sharepoint teamspaces, images, voice, video, and miscellaneous desktop files.

We've been in business since 1990--longer than any other analyst firm in our field:

  • Clients include 300 of the world's 1,000 largest organizations, and computer vendors from the largest corporations to small startups
  • While other analysts have come and gone, we've published more than 200 formal reports and 1,100 short bulletins
  • Our news service covers more than 2,000 highly specialized announcements annually
  • We have nine experts in our research team, sharing many decades of experience in our core competencies

In short, our technology and industry depth helps you understand today's products, where they've come from and where they're going.

Have news you want to share with us or product or interest area that you would like us to cover? Send press releases to releases@ferris.com.

Copyright © Ferris Research 2008.



Links to this post:

Create a Link

<< Home
Lets anyone with a professional interest in messaging and collaboration keep up with the news and key trends ... To sign up, go to www.ferris.com ... If you want a version that includes analysis of the news and puts everything in a single email, subscribe to our Analyzer Information Service ... Got some news you want to share with us? Send press releases and conference announcements relevant to messaging to releases@ferris.com ... Copyright © Ferris Research 2005-2006.

September 2005 / October 2005 / November 2005 / December 2005 / January 2006 / February 2006 / March 2006 / April 2006 / May 2006 / June 2006 / July 2006 / August 2006 / September 2006 / October 2006 / November 2006 / December 2006 / January 2007 / February 2007 / March 2007 / April 2007 / May 2007 / June 2007 / July 2007 / August 2007 / September 2007 / October 2007 / November 2007 / December 2007 / January 2008 / February 2008 / March 2008 / April 2008 / May 2008 / June 2008 / July 2008 / August 2008 / September 2008 / October 2008 / November 2008 / December 2008 / January 2009 / February 2009 / March 2009 / April 2009 / May 2009 / June 2009 / July 2009 / August 2009 / September 2009 / October 2009 / November 2009 / December 2009 / January 2010 / February 2010 / March 2010 / April 2010 / March 2011 / March 2012 /

Powered by Blogger