Tremendous Growth in Internet Usage – How Will That Affect Your Business?

I read an article that Intel published that had some shocking facts:
1. The number of network devices equals the global population.
2. 20 people every minute get their identity stolen.
3. 135 botnet infections every minute (network of private computers infected with malicious software and controlled as a group without the owners’ knowledge)
4. 135 new mobile users added every minute.
5. 47,000 mobile applications downloaded every minute.

internet security minnesota

http://www.intel.com/content/www/us/en/communications/internet-minute-infographic.html

Prediction – The number of internet devices will DOUBLE in the next two years.

Do you have:
1. a way to control your mobile users?
2. a way to protect your mobile devices?
3. a good method of preventing and remediating malicious software?
4. a acceptable use policy for your users?

If not, that is something I may be able to help you with.

Larry

Do you know what percentage of all data breach incidents affect the education market?

Kaspersky answers questions on data breaches in educational organizatonsDid you know that more than 25% of all data breach incidents affect the education market?

From financially motivated hackers to sophisticated nation-backed attackers looking for government research, threats are everywhere.

Are you prepared?

Join Kaspersky for a FREE, exclusive webinar Wednesday May 23 at 1:00 PM (CST).

You’ll learn everything you need to make sure your networks are protected including:
• Types of data sought by hackers
• Common threats and attacks for the education industry
• Simple ways you can protect yourself without breaking the budget
We think that this webinar will be useful to you as you plan next steps for your organization and budget for next year.

Hope you find it helpful.

Sincerely,

Larry

7 Tips for Creating Hacker-Proof Passwords- Solbrekk Network Service Minneapolis Minnesota

When it comes to protecting your company information, passwords are your primary line of defense. And yet password creation and management is often confusing and haphazard. Many of us don’t know where to begin.
That’s why integrating best practices and a password policy across your organization is so important. By setting some basic password parameters for your employees, you can ensure that your most valuable information will be more secure.
Click her for:
7 Tips for Creating
Hacker-Proof Passwords – Solbrekk Network Service Minneapolis Minnesota

Securence Email Filter/Anti-SPAM

Securence Email Filter was
just selected the State of North Carolina as their email filter solution. With over 100 domains, over 100,000 users, and millions of emails each year. This choice was made very carefully. Securence was up against every major competitor and scored a 98 out of a 100, the second place finisher, among about a dozen, scored a 68! Securence dominated all the big players. Since the implementation, the users are reportedly love the fact that the many junk mail messages they used to get are gone. And IT loves it because their is little to no maintenance required.

C2C Email Archiving – remote laptop access to archive

Here are some details on the capabilities of Offline Email Archiving for remote laptops. It is great to have your email archived on your server, but some users need access when they are not in the office or connected to the internet. C2C Archive One has this capability with an optional module. Hope it is helpful. Please let us know and we can demo these features for you.

Larry M Phelps
Solbrekk Inc,
Minneapolis, Minnesota
cell 612-382-4069

Preparing for Offline Synchronizing
ArchiveOne Enterprise (Policy) can be configured so that a laptop (or any other type of PC) that
is sometimes online and sometimes offline to the network that the ArchiveOne Service is on can
maintain a copy of the archive of a mailbox, which can be used when they are offline.
This has the following requirements and features:
o The laptop must be running an OST copy of the server based mailbox.
o On a regular basis, the laptop must be connected to the network that the ArchiveOne Service
is on, in such a way that they have the same access permissions as a standard PC that is
permanently connected – it is not sufficient just to have a dial-up connection, unless that
gives the laptop fully authenticated access. Specifically, they need to be able to see server
shares on the network.
o It requires Outlook 2000 or later on the laptop, and the Laptop Client component installed.
o When offline, laptop users will be able to view messages by viewing the message links in
their mailbox (which will then view from the local copy of the archive) but they will not be
able to search the archive.
o When online, laptop users will behave like any other user, including searching the archive.
o Archiving is only performed on the server. The laptop contains a copy of the server based
archive of the mailbox, but it is never updated on the laptop. If the laptop is lost or stolen, a
new laptop can be configured and can easily be brought up to date with the latest copy of the
archive, with no loss of data (except for any mail that was not archived and not on the server
copy of the mailbox).
o Whereas most mailbox archive data can be stored either on a hard drive or a storage
manager, archive data for mailboxes that are being synchronized must be located on hard
drive. This means it is the administrator’s responsibility to ensure they are suitably backed
up.
o If multiple users share the laptop or one user accesses multiple mailboxes, the Laptop Client
will keep local copies of the archives of all appropriate mailboxes up to date whenever it is
online.
The architecture is as follows:
o The administrator enables a mailbox for offline synchronization.
o They then archive the mailbox.
o During regular intervals (which can be scheduled), the ArchiveOne Service updates an offline
repository that contains items just for this mailbox. This offline repository is temporary and
is not required for backup.
o The ArchiveOne Service shares this offline repository as a network accessible share (viewable
only to users who are allowed to search into the mailbox) if it is not already in a shared
location.
o When the user logs into Outlook on the laptop, the Laptop Client software checks to see if the
user’s mailbox has an offline repository on the server.
o If so, it copies the offline repository data onto the laptop.
o It intercepts attempts to view message links in the mailbox, and if the laptop is currently
offline, it uses the local copy of the archive.

Watchguard Firewall Review

Security Magazine reviews the Watchguard XTM 505 firewall. If you are looking for a firewall, Watchguard is one that I would recommend.
Solbrekk is one of the largest valued added resellers for Watchguard in Minneapolis Minnesota. We have been installing and servicing Watchguard firewalls for over seven years.

Here is complete article:
Watchguard Firewall Review Minneapolis Minnesota

Watchguard Product Matrix – Minneapolis Minnesota

Watchguard Education Promotion – Minneapolis Minnesota

C2C and Solbrekk partner to provide email archiving – Minneapolis Minnesota

C2C, a leading provider of email, file and messaging management solutions, today announced it has signed Solbrekk, Inc., based in Minneapolis, Minnesota, to supply email archiving, e-Discovery, and compliance solutions.

“C2C ArchiveOne® software is an excellent archiving solution that is extreemly simple for the user and extreemly flexible and powerful to handle the needs IT and compliance officers. It can handle the needs of large enterprise clients yet simple to understand and use for small to midsized businesses,” said Larry Phelps, director of sales and marketing, Solbrekk, Inc. “C2C’s eDiscovery and retention management for live, PST and archived data is unique among email archiving products.”

“Email and file volumes grow dramatically in some of the industries Solbekk serves, such as insurance and legal services, so our ArchiveOne platform will be welcomed by their customers as a way to tame and control runaway storage costs while also delivering regulatory compliance for retained and archived data,” said Dave Hunt, CEO at C2C.

C2C’s ArchiveOne solutions are simple yet sophisticated tools that are field-proven to help organizations with archiving, retention and eDiscovery of email and files, compliance management, intellectual property containment and storage management tools. ArchiveOne employs Zero-Training User DesignTM and is completely transparent, installing in about one hour. ArchiveOne for email provides secure access to archived emails through iPhone or download lucky patcher apk BlackBerry devices and through web and web service technologies for offsite workers. Sophisticated features include the ability to search and take action on data before it is archived, which provides assurance against “data fingerprints” being stored in the index, reduces capacity needs, speeds backups, and optimizes TCO. Advanced PST management allows administrators to discover, search, delete or consolidate PST files across the organization and integrated Bates Stamping streamlines the e-discovery process. ArchiveOne is not dependent on SQL databases, so it offers best-in-class flexibility and scalability, as well as reducing risk and improving system usage. A live online demonstration, references from ArchiveOne users, and a 30-day trial are available.

About C2C
C2C Systems has earned the trust of its four million software users since 1992 by consistently delivering high-value, dependable core messaging system enhancements. Microsoft® Exchange, SharePoint®, and Windows® File Server together with IBM® Lotus® Domino® form the heart of our commercial and governmental customers’ businesses worldwide. C2C’s ArchiveOne® product family is the trusted choice for their email and file archiving, e-discovery, compliance management, legal forensics and storage management tools to enhance these platforms.

Email Archiving – Which Method is Best?

Email archiving is fairly easy concept to understand, but how it is accomplished using the underlying technologies is not as easy to grasp. These technologies include; MAPI, Exchange Web Services, Transaction Log Parsing, and Single Instance Storage. Most product demonstrations typically spend time explaining the benefits of their products as they should. But, an understanding of the underlying technologies can help you make a more informed decision.

Some have said that Microsoft plans to move away from MAPI. I don’t believe Microsoft is moving away from MAPI any time soon. Currently, there are an estimated 500 million Microsoft Outlook users. Outlook uses MAPI to connect to Exchange. Even using Outlook remotely (RPC over HTTP), you are still using the MAPI protocol via plain RPC or RPC embedded within an HTTP data stream.

For this reason I recommend a email archive product that uses MAPI technology.

Other products use Transaction Log parsing. Although, this works, it is not using Microsoft’s best practices approach. Essentially developers are reverse engineering the Exchange undocumented Transaction Logs to extracting data for archival. Using this method can result in a major problems for this type of archive product if for some reason you need to restore Exchange data from a backup.

For this reason I recommend that you do not select an email archiving product that parses the Exchange Transaction Logs.

Many people are worried about email archiving adding extra overhead to your Exchange server. Both archiving methods, using MAPI or Parsing Transaction Logs , do add a certain additional load to a server. But we have not seen this cause problems. In most cases, most organizations have too much data in their Exchange server and using a good email archiving product eliminates this unnecessary data and actually makes the Exchange server perform better.

If you have questions or would like to look at email arching, please feel free to contact me.

Larry Phelps
Solbrekk
Minneapolis Minnesota