ReSoft Blog - | ReSoft http://www.resoftco.com/blog Sat, 21 Jul 2018 07:39:39 -0400 Joomla! - Open Source Content Management en-gb Improved Exchange & Office 365 Reporting http://www.resoftco.com/blog/439-improved-exchange-office-365-reporting http://www.resoftco.com/blog/439-improved-exchange-office-365-reporting

New Mailscape version improves reporting on Office 365 and Exchange on-prem

The Mailscape develpment team work on four key product principles :

  • Help customers cut the mean time to resolution (MTTR) for Office365 and Exchange problems
  • Provide actionable insights, not just collections of data—we need to process and display the monitoring and reporting data we collect, and filter and prioritize it so that…
  • Trim the troubleshooting tree to eliminate wasted time (such as RDPing into a server and looking at its event log as a first step)
  • Accelerate migrations both to the cloud and between on-prem systems. We do this not by providing tools to migrate data but by applying #1 and #2 to migration operations.
 
The latest version of the Mailscape suite adds significant reporting improvements.  Insights, the reporting feature, marks the introduction of a new reporting engine that lets you see and work with the reporting data collected, using a modern, responsive interface. Starting with a dozen of the most frequently-used reports, all existing reports will migrate to the new Insights engine.
 
Reporting in Office365 and Exchange
 
You can sort columns, group data by dragging column headers into the grouping area, and export the report easily to PDF or Excel. Many of our enterprise customers use our products’ reports to help generate key performance indicators (KPIs) for their executive management or to track long-term trends over time, both of which get much easier with these new features.

Along with Insights, two new sets of reports have been added to Mailscape 365: one for Active Directory Federation Services (AD FS) usage and security, and one for Office 365 mail transport actions such as DLP rule hits. Reports on Office 365 license usage, suppressing expired trial licenses and handling the new workloads (including Customer Lockbox and Delve Analytics) have been improved.

In the “reducing MTTR” category, Mailscape will integrate with SNMP-based monitoring solutions—whenever we detect that a monitored parameter has gone into or out of an exception range, we can fire a trap to the destination of your choice. This makes it easy to tie our powerful application-aware logic to your existing Microsoft SCOM, HP OpenView, or other SNMP-aware components. In Mailscape, we also added monitoring for disk performance counters and the ability to set monitoring exclusions for individual Exchange databases.

This version offers full support for Exchange 2016 and Skype for Business 2016.

Read more

]]>
Exchange management Enterprise Email Management Thu, 09 Jun 2016 09:57:23 -0400
PST elimination uses Microsoft Azure and Azure SQL http://www.resoftco.com/blog/438-pst-elimination-uses-microsoft-azure-and-azure-sql http://www.resoftco.com/blog/438-pst-elimination-uses-microsoft-azure-and-azure-sql

FlightDeck PST eradication integrates with Microsoft Azure and Azure SQL

PSTMigrationNo hardware commitment, no licenses and less red tape for fast, reliable Office 365 migration support

PST FlightDeck from QUADROtech has been the solution of choice for eradicating offline PST files when migrating to Office 365, latest editions of Exchange Server or hybrid environments. 

PST FlightDeck 5.0 allows the whole process to be run remotely in Microsoft Azure using Microsoft SQL Database on demand, developed in collaboration with Microsoft’s own specialists.

You don’t have to purchase and provision separate hardware and databases yourself, maintain them, and keep them secure for the duration of the project. Neither do you need to carry the cost of decommissioning and repurposing them.

PST FlightDeck 5.0 uses a template-driven approach that allows it to be installed straight into Azure. PST FlightDeck 5.0’s capability means it needs no special preparation for use with Microsoft’s cloud Azure SQL Database.

The main benefits of using PST FlightDeck 5.0 with Azure and Azure SQL Database are:

  • No separate hardware, database or licenses needed: Easy administration and cost management.
  • Better change control: Should the project’s scope alter, modifications are assimilated faster and with less scope for error.
  • Efficient cost control: You don’t pay for more processing power than you actually need at any particular stage of the project.
  • Rapid TTPC (time to pilot completion) and TTFI (time to first migrated item): Fast, accurate, defensible and compliant migrations.
  • Stability of Microsoft Azure: A safe, secure, resilient and proven cloud platform.
  • Orchestration between Azure and Office 365: Many organizations choose to migrate PSTs into Office 365 mailboxes. PST FlightDeck 5.0 is optimized to speed up these migrations using technologies such as our Advanced Ingestion protocol (AIP).

Learn more about FlightDeck here 

Read more

]]>
PST Mon, 06 Jun 2016 16:47:54 -0400
Digital Signage improves utilization of your meeting rooms http://www.resoftco.com/blog/437-digital-signage-improves-utilization-of-your-meeting-rooms http://www.resoftco.com/blog/437-digital-signage-improves-utilization-of-your-meeting-rooms

Using Digital Signage to improve meeting room utilizationUsing Digital Signage to improve Employee Communications

ReSoft applies sophisticated digital signage technology to make better use of your existing meeting spaces by:

  • reducing room booking conflicts and no-shows
  • improving visibility into the actual utilization of meeting room resources
  • contributing to smarter building initiatives
  • improving your image with visiting clients
Digital signage empowers your employee teams. With nothing new to learn, employees book meeting rooms using your existing calendaring system. Digital signage technology sits outside each room displaying its availability to everyone walking past.  If an organizer cancels or doesn't check in for a meeting, the room is put back into the availability pool. If a room is free or a meeting needs to be extended, the employee can book it on the digital sign.
 
Existing clients include Coca-Cola, Baxter Healthcare, Samsung and Airbus.

Read more

]]>
Conference room, hot desk and signage Wed, 06 Apr 2016 12:09:14 -0400
Data Security risks from Millennials vs Baby Boomers http://www.resoftco.com/blog/434-data-security-risks-from-millennials-vs-baby-boomers http://www.resoftco.com/blog/434-data-security-risks-from-millennials-vs-baby-boomers

It's 10pm... do you know where your Millennials are?

At that time of night there is a good chance they are at home, working, using a personal device to access corporate data.
 
Millennials (18-35) are the single largest generation in the US workforce; one in three employees is a millennial. By 2025 they will make up 75% of the workforce. This generation is different than the Baby Boomer (55+) generation - life priorities, loyalties, and ways of working, all of which results in Millennials posing the greatest risk to existing corporate data protection practices of any segment of the workforce.
 
The 2015 US Mobile Device Security Report from our partner Absolute Software compares the behavior of Boomers versus Millennials.  
  • 64% of Millennials use employer-owned device for personal use, versus 37% of Baby Boomers
  • 35% of Millennials modify default settings, only 8% of Boomers do
  • 27% of Millennials access “Not Safe For Work” content (e.g. online banking, shopping, personal email, Social Media, public WiFi, file sharing, etc.), vs. only 5% of Boomers
  • 25% of Millennials believe they compromise IT security, compared with only 5% of Boomers

As already reported, the 2015 Internet Trends Report confirms this trend where 87% of US Millennials never let their smartphone leave their side, day or night, and expect to be able to work when and where they want. As employees remain at the core of data breaches, so policies must change to accommodate these work practices by applying a risk management approach involving peopleprocesses and technology

Read more

]]>
Data Loss Prevention Compliance Data Governance Thu, 25 Jun 2015 19:18:56 -0400
New report: employee work habits risk data breaches http://www.resoftco.com/blog/433-employee-work-habits-risk-data-breaches http://www.resoftco.com/blog/433-employee-work-habits-risk-data-breaches

How the changing work environment is creating new data security challenges

The much anticipated Internet Trend 2015 report has been released by Mary Meeker, General Partner at Kleiner Perkins Caufield & Byers. The reports gives a great window into what is coming in tech.

It reports that that while Internet user growth has slowed, the impact of how Internet is being used continues to change rapidly. Whilst many changes appear to reflect consumer interests  - eg: Social Media, Netflix – these changes also have a major impact on enterprises.
 
Regardless of who owns a device, the need for mobility and use of personal devices impacts enterprise data security. The report says 6 out of 10 of the most used apps in the world are messaging based; WhatsApp, WeChat, Facebook Messenger, Kakao, Viber and Snapchat. Do these apps put corporate data at risk? Are passwords being shared with corporate networks?

Most telling, the 2015 Internet Trends Report analyzes the smartphone behavior of millennials, with 87% of US millennials sayiing their smartphone never leaves their side, day or night. Millennials spend more than 2 hours each day on mobile devices and want to do “everything” on their devices. They are demanding to be able to work whenever and wherever they want, preferring collaborating online over in-person. Worryingly, the report suggests people download their own apps for work use, likely outside of IT's control or awareness.

In tandem, our partner Absolute Software also reported  that the line between corporate and personal device use has become extremely blurred. Corporate data is readily available on personal devices whilst personal apps and data are easily accessed from corporate-owned devices. 
 
When it comes to data security, an approach involving people, processes and technology goes far in addressing vulnerabilities created through mobility and employee behaviour. 

Curious about how you can address this?
 
Technology comes to the rescue of the end user and the end-point.
 
Deploy the most complete encryption -  enforce encryption on all laptops, tablets, phones, USB sticks. Seamlessly manage keys and recovery functions on BitLocker and FileVault 2 encrypted drives.
 
Test your employees with mock phishing - address the challenge that employees continue to click on emerging phishing threats as they hit their inbox, thereby risking loss of corporate data. 
 
Give your laptops the same MDM protection as your tablets and phones - gain comprehensive visibility into the devices usage, configuration, location and loss. Persistently control and secure all these endpoints from a single cloud-based console. 
 
Detect evasive APTs in real time  - utilize in-depth analysis and actionable intelligence to assess, remediate, and defend your organization against targeted attacks.

 

Read more

]]>
Data Loss Prevention Compliance Data Governance Thu, 18 Jun 2015 16:26:12 -0400
The real data-breach cost of your careless users http://www.resoftco.com/blog/431-the-real-data-breach-cost-of-your-careless-users http://www.resoftco.com/blog/431-the-real-data-breach-cost-of-your-careless-users

Data breaches from employee carelessness can be substantial

The 2015 Cost of Data Breach Study: United States released by IBM and Ponemon Institute is the 10th release focusing on cost of data breaches for US companies. Key findings include the total average cost paid by breached organizations has increased from $5.4 million to $6.5 million. The average cost for a stolen record has increased from $201 to $217, of which $74 represents direct costs and $143 indirect costs.

We have already reported that 90% of security incidents are still be tied back to people behavior, reinforcing the need for employee training and awareness to reduce security incidents and data breaches (whether from lost devices or phishing attacks).

As data breaches and stories of identity theft feature more frequently in the news, organizations are increasingly demanding better protection of the security of their personal information. Abnormal customer turnover ends up being a substantial contributor to higher costs of a data breach – demonstrating the effect reputational damage can have; as customers will take their business elsewhere. This helps explain why 20% of security professionals claim their organization had concealed a data breach.
 
Concealment can be not only illegal, but unethical. And an organization that has to to notify affected customers, district attorneys, or consumer reporting agencies of a data breach, will see significant costs increases.

 

Read more

]]>
Data Loss Prevention Compliance Data Governance Thu, 04 Jun 2015 22:26:15 -0400
Using persistence to drive down data-loss from your end-points http://www.resoftco.com/blog/422-using-persistence-to-drive-down-data-loss http://www.resoftco.com/blog/422-using-persistence-to-drive-down-data-loss
wordlossGiven that End-User device loss remains one of the largest contributors to data-loss, one of your biggest challenges after you have rolled out a secure laptop and desktop environment is how do you keep that configuration consistently protected from threats?

Subsequent changes to the employee's computer can easily affect the security of your locked down environment, or worse, your users start to install unauthorized applications like Dropbox on their workstations. Or even worse, they decide to switch off encryption 'just for a while' because it is slowing down the machine.

What is persistence?

Persistence is one of the big attractions to the Absolute Computrace solution. This technology is already embedded in the firmware of most computers you already use today. Its presence on the machine triggers an automatic reinstallation if the software client is removed from a device. The software client reinstalls even if the firmware is flashed, the device is reimaged, the hard drive is replaced, or if a tablet or smartphone is wiped clean to factory settings. No other technology can do this.

Computrace uses this persistence technology to provide you with confidence that you can connect with each device so you can undertake management and security actions regardless of user or location. No other technology can do this:
  • Data & Device security: If a device has become unsecure, then the data it contains is at risk. Computrace alerts you to such a  change and allows you to remotely contact the device so that data can be safeguarded or removed.
  • Geotechnology: The physical location of a device can often predict if it is secure or at risk, so knowing where it is (and where it’s been) can be an important factor.
  • Asset Administration: Manage your entire deployment (desktops, laptops, ultra-portable devices) regardless if the device is on or off the network.  
  • Endpoint Forensics: Understand why and how something happened, especially when proving chain of custody or when criminal activity is suspected. 
Curious about how you can apply this?
You can learn more here about solutions like Computrace end-point management.

Read more

]]>
Data Loss Prevention Fri, 20 Mar 2015 15:38:41 -0400
Rein in Your 5 high-risk data-loss employee types http://www.resoftco.com/blog/421-rein-in-your-5-high-risk-data-loss-employee-types http://www.resoftco.com/blog/421-rein-in-your-5-high-risk-data-loss-employee-types
headofsecurityOver the past year the number of data breaches has grown significantly, the majority due to internal errors, such as data sent to the wrong email recipient or employees losing an unencrypted device.

Recognize that certain employee bad behaviors are one of the major data-loss threats to your business, which are amplified by Bring Your Own Device, data storage location options and cloud computing.

Your 5 high risk employee types

The Millennial:  Staying connected is rule number one in this employee’s world. Going without WiFi, apps and Social Media is not an option and all personal and corporate information must be available in one place, at their fingertips. Corrupted or hacked, their device is a potential gateway into the business network and can leave data up for grabs.

The Scatter-Brained:  Every business has that forgetful employee that has ramped up a number of replacement work passes or lost their expenses receipts. But what might be a running joke in the office, can also cause major issues when this carelessness evolves into a lost device, personal documents left lying around or a misplaced USB stick.

The Snooper: Feeling spurned, troublesome or just looking for another way to make money, these employees are snakes in the grass. They will attempt to steal your company data straight from under your nose for malicious intent or personal gain.

The Gadget Man:  There’s always that one person who has the latest gadget. Wearable tech and Google Glass are just some of their latest desires, which they will own in a heartbeat. The result: a business is left grappling a snowballing number of devices and subsequently, a growing number of threats.

The Extra-Miler: This employee just can’t resist getting in that extra hour or two of work outside of the office. But by simply drop-boxing or emailing work to a home computer or saving it in the cloud can leave the data at risk in unsecure environments.

Data lost by the Millennial, Gadget Man, Scatter-Brained or The Extra-Miler, although accidental, can be as severe to the business as loss to the Snooper who does it deliberately. 

Keeping your eyes on the asset
To stay on the right side of this data-loss challenge, businesses must address several issues surrounding laptop and tablet computers: 
  • Know when employees disable encryption or threat management software
  • Know when a user installs unauthorized apps like Dropbox
  • Be able to freeze or wipe a device, regardless of location, when alerted to a suspicious activity event
  • Track geolocation of where your assets have been and alert when out-of-territory or out-of-country
  • Increase asset audit accuracy by historically auditing configuration changes and wipe events in cases of theft or employee termination

Curious about how you can combat this?
  You can learn more about solutions like Computrace endpoint management and PhishGuru employee phishing testing.

Read more

]]>
Data Loss Prevention Fri, 13 Mar 2015 15:36:44 -0400
Behind Microsoft's cloud numbers http://www.resoftco.com/blog/420-behind-microsofts-cloud-numbers http://www.resoftco.com/blog/420-behind-microsofts-cloud-numbers

Microsoft's cloud business is expecting to be a $4.5 billion business.  But a Business Insider article suggests this $4.5 billion number isn't as straightforward as it would seem.

One source says "What Microsoft is doing is claiming a certain percentage of their Enterprise Agreements — these are renewals of their big licensing agreements — as cloud revenue. They bundle the rights to use Azure or Office 365 as part of their overall agreement. The  secret is that very few customers are actually taking Microsoft up on using Azure in any meaningful way."

So, when an enterprise signs a new contract to buy software such as Windows, SQL and Microsoft Office, the salesperson may include for free (or almost free) access to Microsoft's cloud Azure (including a cloud version of the database) and Microsoft's Office 365.

Don't forget that Microsoft had gross margins in the 90% range for Office and Windows. There is no way to sustain that type of monopoly pricing in cloud when competing against Amazon and Google, a source says.

 

Read more

]]>
Office 365 Tue, 10 Mar 2015 13:37:10 -0400
Spoofing the Boss for $315,000.. almost http://www.resoftco.com/blog/419-spoofing-the-boss-for-315-000-almost http://www.resoftco.com/blog/419-spoofing-the-boss-for-315-000-almost

Krebs On security posted an excellent article highlighting the results of socially engineered scams.  The blog discusses “CEO fraud,” and the “business email compromise,” that is increasingly common in targeting a specific businesses working with foreign suppliers businesses that do regular wire transfers.  The FBI warned in January that cyber thieves stole nearly $215 million from businesses in the previous 14 months through these scams, activated by the hijack of  email accounts of business executives.

In one example quoted, the Scoular Company, an employee-owned commodities trader lost $17.2m when they wired money in installments last summer to a bank in China after receiving emails ordering it to do so.

Read more

]]>
Data Loss Prevention Tue, 10 Mar 2015 12:02:02 -0400