Ferris Research Free News
Thursday, August 14, 2008
  Aug 15, Daily Compliance & Messaging News
Ferris Research Home

Sign up for the Ferris News Service here

News on messaging, content control, compliance, e-discovery, data leak prevention
Daily Digest: August 15, 2008
Content Control, Compliance, Archiving, E-Discovery, & Data Leak Prevention

Sherpa Software Takes PST Management One Step Further
Sherpa Software Releases Mail Attender for Exchange Version 4.2

Messaging & Collaboration

Gerrish Honda Protects Customers and Employees with AVG Anti-Virus
New Hampshire Honda Dealership gets help from Walling Data when the big-name anti-virus solutions fail

Survey of Archiving Products -- Let us know what you think about the archiving products you use. If you add your own data, we will send you a summary of the findings. The survey just started--great if you can help get this off the ground by contributing your own policies

Survey of Retention Policies -- See the retention policies for various organizations here. If you add your own data, we will send you a summary of the findings

Interactive Networks Announced A New Version Of Its IM Application For Financial Institutions  

Blog Item(s)

Microsoft IT Stops Using SANs for Exchange

For a while now, Microsoft and its larger consulting partners -- such as HP -- have been telling customers that direct-attached storage makes a lot more sense than shared disk arrays for their Exchange mailbox stores. This has been greeted with a certain amount of incredulity in some quarters. However, Microsoft has now put its money where its mouth is, so to speak.

Microsoft IT has always been a key player in the Exchange team's "dogfood" strategy (as in, "We eat our own dogfood"). So it was natural that it should follow the advice to ditch its expensive storage-area networks (SANs) and move to less expensive direct-attached storage.

The key was to make full use of Exchange 2007's continuous cluster replication (CCR) feature. CCR allows Microsoft IT to build clusters of mailbox servers that ship database logs in near-real time, so that there's always an up-to-date logical replica of the database available, should there be a hardware failure.

This does mean that Microsoft is essentially duplicating all of its mailbox hardware -- i.e, 50% of its servers are sitting almost idle, just maintaining a database replica and being a source of "nearline" backups. However, the economics are still attractive -- duplicating servers turns out to be less expensive than buying SANs.

For more on this topic, Microsoft IT offers this white paper, talking about its experience -- albeit in rather sanitized tones. ... Richi Jennings


Compliance in Virtual Worlds: Extension of Identity Management

In our world, reality and virtual reality are coalescing at an alarming rate. On a simple level, we enter instant messaging (IM) conversations with those in the same office as ours, preferring a virtual conversation to a physical one. On the other end of the spectrum, we can invent characters in Second Life where we live entirely parallel lives unbeknownst to those around us.

Does compliance find meaning in virtual worlds? We believe it does.

If someone in your organization takes on a Second Life personality, and uses that to breach your corporate policies, the Second Life personality is simply another identity used by the employee. The compliance enforcement challenge, of course, is that many of the new virtual worlds are virtually invisible to the corporate world.

We predict that, over time, the concept of "identity" will extend to include a map of any aliases used by a given employee. So the "david.sengupta" corporate account could, for example, be associated with IM handles including anand@msn.com, pOstmaster@aol.com, and jibber@jabber.com. David's Second Life persona could be Fritz Finkenstein, and his phone number could be 613.123.4567. The challenge, of course, is developing technologies that automatically discover all the identities associated with all the accounts in your organization.

As compliance breaches start to emerge in virtual worlds, it is only a matter of time until companies decide to either block them, or attempt to extend the long hand of compliance enforcement technologies from the physical world into the virtual one. ... David Sengupta



Upcoming Reports & Events

Call for Speakers
"Emerging Technology: Compliance, Content Control, and Data Leak Prevention"
September 24, 2008

We invite up-and-coming vendors of products or services in compliance, content control, and data leak prevention to speak at this Ferris Research webinar:

  • Detailed event description is here
  • Audience is mixture of IT planners, corporate compliance and legal staff, vendor management, investors
  • Typical size: 100 to 200 registrants
  • Normally your CEO or CTO will present

To participate, email david.ferris@ferris.com, indicating:

  • Name and title of your proposed speaker
  • Top three reasons what you're doing is emerging and/or innovative and/or interesting

If we accept your proposal, we will ask you to promote the event to your customers and prospective customers.

Emerging Technology: Compliance, Content Control, and Data Leak Prevention
Wednesday, Sept. 24, 2008
8:30 a.m. Pacific, 11:30 a.m. Eastern, 4:30 p.m. U.K., 5:30 p.m. CET. One hour.

In this event, David Ferris introduces three new or newish vendors that he finds interesting or innovative in the overlapping fields of compliance, content control, and data leak prevention. Each vendor's CEO briefly describes the company's business; then he or she and David discuss the business and its industry context. A Q&A period follows.

To register for the webcast, click here. For more information, click here.

Recent Research

Recent Reports Available:

For more reports, visit our reports page.

Recent Ferris Webcasts:

About Ferris Research

Ferris Research studies messaging, and the control of electronic information. More specifically, we help IT staff evaluate and implement products and services that:

  • Provide messaging and collaborative technologies
  • Archive electronic information
  • Ensure compliance with corporate policy, industry regulations, and laws
  • Facilitate e-discovery, and contain its costs
  • Reduce the dangers of information leaks

Email is the most important type of electronic information that requires control today. Other important types include instant messages, Sharepoint teamspaces, images, voice, video, and miscellaneous desktop files.

We've been in business since 1990--longer than any other analyst firm in our field:

  • Clients include 300 of the world's 1,000 largest organizations, and computer vendors from the largest corporations to small startups
  • While other analysts have come and gone, we've published more than 200 formal reports and 1,100 short bulletins
  • Our news service covers more than 2,000 highly specialized announcements annually
  • We have nine experts in our research team, sharing many decades of experience in our core competencies

In short, our technology and industry depth helps you understand today's products, where they've come from and where they're going.

Have news you want to share with us or product or interest area that you would like us to cover? Send press releases to releases@ferris.com.

Copyright © Ferris Research 2008.


Links to this post:

Create a Link

<< Home
Lets anyone with a professional interest in messaging and collaboration keep up with the news and key trends ... To sign up, go to www.ferris.com ... If you want a version that includes analysis of the news and puts everything in a single email, subscribe to our Analyzer Information Service ... Got some news you want to share with us? Send press releases and conference announcements relevant to messaging to releases@ferris.com ... Copyright © Ferris Research 2005-2006.

September 2005 / October 2005 / November 2005 / December 2005 / January 2006 / February 2006 / March 2006 / April 2006 / May 2006 / June 2006 / July 2006 / August 2006 / September 2006 / October 2006 / November 2006 / December 2006 / January 2007 / February 2007 / March 2007 / April 2007 / May 2007 / June 2007 / July 2007 / August 2007 / September 2007 / October 2007 / November 2007 / December 2007 / January 2008 / February 2008 / March 2008 / April 2008 / May 2008 / June 2008 / July 2008 / August 2008 / September 2008 / October 2008 / November 2008 / December 2008 / January 2009 / February 2009 / March 2009 / April 2009 / May 2009 / June 2009 / July 2009 / August 2009 / September 2009 / October 2009 / November 2009 / December 2009 / January 2010 / February 2010 / March 2010 / April 2010 / March 2011 / March 2012 /

Powered by Blogger