Bi101 Blog … on cloud computing and SaaS, by Business Intelligence 101

How to Create Corporate Regulation Around BYOD

The Bring Your Own Device (BYOD) movement is changing expectations for businesses and employees. It has the ability to cut employer expenses and to give employees easier access to work materials anywhere they go. Unfortunately, it also creates a host of potential security concerns that your organization needs to be prepared for – particularly if compliance is an issue. You can combat these potential problems by creating and enforcing corporate regulations around how BYOD is going to work for your company – but how exactly to begin?

Whether you are thinking of implementing BYOD at your company soon or simply looking into the future of an increasingly connected workplace, it’s never too early to start thinking about how you’re going to handle the regulations that will keep your data secure. The regulations your company creates will be based on the specifics of your organization – your industry, business model, and the type of data assets you need protected. In most cases you’ll need to consult with your legal and compliance team for a more complete understanding of the ramifications of implementing BYOD at your firm.

STEPS TO CREATE CORPORATE REGULATION AROUND BYOD

Step 1 will be about gathering information. What kind of devices do you want to allow? What kind of (company) data will be stored on those devices? Which employees will be granted BYOD privileges?  What (if any) compliance standards does your company need to meet? Answering some or all of these questions first will provide an important framework for the regulations you’ll be putting in place.

Step 2 is making a comprehensive plan for data protection. You’ll need to ask yourself more questions like following: What data can and can’t be accessed via an employee-managed device? What specific brands and operating systems will my company support? What happens when a device is lost or when an employee leaves the firm? Simply, how can our employees protect their devices? The answers to these “deeper dive” questions will make up the meat of your corporate policy. Legal counsel can help explain some of the more nuanced aspects of data protection issues under the law and introduce you to some potential solutions – for instance “concierge” software exists which, when installed on a device, allows your company to control certain specific data and its security on that particular device.

Step 3 will be about enforcement of these regulations. Regulations don’t mean much if you can’t ensure that they are being consistently followed! You’ll need a solid plan for how to handle a number of different situations that are likely to arise. Keeping enforcement in mind will also help you draft realistic (and in some cases flexible) regulations for your company.

The bottom line about BYOD is that while it is increasingly becoming the norm it is not to be taken lightly – you will need policies in place to avoid the major pitfalls and your organization’s preparation is the key to a smooth rollout. Taking the time to create meaningful and enforceable corporate regulation around BYOD will definitely pay dividends in the long term.

If you have more questions we encourage you to contact Bi101 for a free consultation on your specific needs!

Enable BYOD at your organization with Office 365.

O365-trial

Teaching and Training Your Employees in BYOD

The “Bring your own device” (BYOD) movement is growing in popularity and can be a great help to companies in terms of reducing expense and in getting around-the-clock responsiveness from your employees. It makes sense because most of your employees already own an internet-ready device or three and if they do they probably know how to use it. Your company saves on hardware and on training, right? It’s not quite that easy – if you want to do BYOD the right way you’re going to need a comprehensive training plan to get everyone on the same page on a few important aspects of the BYOD work environment.

Teaching and Training Your Employees in BYOD

WHAT TO CONSIDER WHEN TEACHING AND TRAINING YOUR EMPLOYEES IN BYOD

[Step 1] is developing your specific corporate policies around BYOD. This is important for protecting your company’s data assets and for understanding some of the common scenarios that result from implementing BYOD. Addressing your corporate rules and regulations first will also help you outline what BYOD looks like for your firm. You’ll be forced to answer many of the most important basic questions and the following steps will be much simpler to execute. These regulations will provide a framework for much of the training to follow.

[Step 2] will be application-based training. What devices will your employees be bringing and what specific applications on those devices? It’s possible your development team will be creating new applications for different device types or modifying your existing software to suit a new range of access. Developing a new workflow system is great but having employees who truly understand how that system helps them do their work? Priceless. Although employees are likely to have an understanding of their current device they will still need specific training in order to maximize the effect of BYOD on your organization.

[Step 3] is about communicating your corporate policies and regulations clearly to all the employees which BYOD will affect – particularly in regard to security issues. Your data is a corporate asset and you need to ensure it is being handled properly and kept secure while stored on non-company devices. BYOD brings up issues of data security and also those of data ownership and accessibility. You will have already outlined your company’s policies and approaches to these issues and run through a number of hypothetical scenarios (likely with the help of legal counsel) in Step 1, so your goal is simply to ensure that affected employees have a good understanding of these policies before going forward. It’s of the utmost importance to communicate these regulations effectively so that everyone can be in compliance.

[Step 4] is to create support resources for employees to troubleshoot technical issues with their devices/applications or to ask questions about corporate policy. To make your transition smooth you’ll need these resources in place before the BYOD rollout so that your employees know where they need to go for answers. A pre-assigned group of experts who can troubleshoot technical issues and address data security questions both during and after the BYOD transition is key to the continual efficiency of your workforce.

NEXT STEPS FOR TEACHING AND TRAINING YOUR EMPLOYEES IN BYOD

If properly implemented BYOD empowers employees and can save businesses time and money – just remember to prepare accordingly to properly train your office on all the essentials! If you have more questions please don’t hesitate to contact Bi101 for a free consultation on your specific needs! And download a free trial of Microsoft Office 365, which makes it easy to work on multiple devices and PCs.

O365-trial

Looking for Postini Alternatives?

postini resellerGoogle has announced Postini’s transition to Google Apps Message Security. For some, this means going Google for email security. For others, it means finding a new cloud-based security solution. We are here to advise you on the best fit for your business, whichever alternative solution you choose. We want to empower you to make an informed decision.

Below we described the differences in the top SaaS security solutions.

 

YOUR POSTINI ALTERNATIVE OPTIONS

McAfee

McAfee

McAfee is the most direct replacement for Postini. McAfee has incredible influence and features created from past Postini employees, which is why the tool will look and feel very similar to what you’re used to with Postini. When you switch to McAfee, you get an established company and solution that has been around since 1987. McAfee proudly serves millions of business and home users around the globe.

The main difference between McAfee’s service and Postini’s is a “store and forward” approach for mail flow. Meaning that the sender has to go through McAfee’s store before it is received by the recipient. As a result, McAfee users may experience some delay in receiving mail. We recommend McAfee to Postini Customers who want the smallest impact to their business. Sign up for a free trial.

Proofpoint

Proofpoint

Long-time smaller enterprise customers of the Google Postini Security Service are often choosing to look at Proofpoint solutions to re-evaluate and solve their unique email security requirements. Proofpoint Essentials, Proofpoint’s SME focused solution, has been expertly created in order to fully address these customers’ specific email security needs.

Proofpoint is an innovative security-as-a-service vendor that delivers data protection solutions that help organizations protect their data from attack and enable them to effectively meet the complex and evolving regulatory compliance and data governance mandates that have been spawned from highly publicized data breaches.

Proofpoint, positioned by Gartner in the Leaders Quadrant in their 2014 Magic Quadrant for Secure Email Gateways, and 2014 Magic Quadrant for Enterprise Information Archiving, delivers an integrated suite of on-demand data protection solutions spanning threat management, regulatory compliance, data governance and secure communications—all of which are based on a common security-as-a-service platform.

We recommend to Proofpoint to companies who are looking for additional features and benefits that extend beyond Postini capabilities. Sign up for a free trial.

mimecastp

Mimecast

The comprehensive zero-drag cloud-based email security and compliance solution – supported by Mimecast’s purpose-built, highly secure and trusted cloud platform with 100% service availability SLA. Platform includes anti-malware including zero-day protection and anti-spam protection. Flexible real-time outbound email content and secure communication policies enable encryption and proactive data leak prevention (DLP) measures. Additionally, many users take advantage of the advanced account administration controls.

Mimecast does continuity better than other providers. You never have to leave Outlook. The flexibility to easily add email continuity and email archiving services either now or in the future, all managed from a single administration console. The service runs by leveraging the local cache. When the server crashes email still flows with an internet connection. Even if the local mail server is temporarily out of service, the Mimecast server can sync mail and limit disruption to the users. Customers should acknowledge that added benefits come with an added price. Sign up for a free trial.

office-logo-orangeMicrosoft-Silver-Partner-

Office 365

Backed by Microsoft and the giant in the marketplace. No other solution is created as one platform except Office 365. While it’s much more than just a Postini Alternative, some of our clients have forgone additional email security once they choose to go to Office 365. We encourage our clients to choose the filtering solution that best fits their business.

With Office 365 all features are integrated: spam, encryption, business continuity, and filtering.

Spam filtering and virus protection are automatically enabled on all inbound and outbound email messages by Microsoft Exchange Online Protection (EOP), the anti-spam and anti-malware service included with Office 365. The EOP service applies multi-layered filters and scanning engines to help protect your organization from email-borne threats.

Although no admin setup or management is required for Office 365 Small Business, you can customize anti-spam settings for your organization. Individual users can also manage the spam settings for their own mailbox. We recommend Office 365 to those who are looking for an entire cloud platform and want to eliminate the pain of maintaining an onsite Exchange server.

Note: It is worth mentioning the Office 365 can be tied in with McAfee, Mimecast, or Proofpoint to add additional protection. Some of our customers prefer both.

google-thumbnailsmb-reseller

Google Apps Message Security Platform

If no action is taken, Postini will transition into the Google Apps Message Security Platform. For the smoothest transition possible to Google’s Security Platform we recommend a few small steps (click here for details).

What you get:

  • The same pricing (continued as honored)
  • The same services as with Postini :
  • Spam
  • Filtering
  • Archiving
  • Upgrades include: message center, online reporting, admin quarantine, admin undelete, and end user access to vault

Google Apps

Google Apps, similarly to Office 365 has one platform where you can find: spam, encryption, business continuity, and filtering.

Postini will be directly integrated into Google Apps, ensuring you and your users full continuity. Benefits behind switching to Google Apps from Postini include:

  • seamless transition
  • same service, as what you had before with Postini
  • same cost
  • fully integrated platform

For a full list of feature upgrades through the Google Apps Security Platform compared to Postini, please visit the following link to the Postini Transition Resource Center Google Apps New Features.

Switching over to Google Apps from Postini can be a very smooth transition. If you are concerned about moving your archived mail, we recommend contacting a partner to migrate the sensitive data for you. Additionally, this is a great option for companies looking to throw out their old Exchange server. We have many customers who have already chosen this option. Check out their success stories here.

bi101-logo-2014

Business Intelligence 101

We serve to guide you through IT decisions. Whether it’s around cloud email or email security, we’re here to help.

Please feel free to reach out to one of our experts, if you’d like to talk through our Postini Alternatives further.

talk-to-expert

Business Intelligence 101 Achieves a Microsoft Silver Cloud Productivity Competency

Microsoft-Silver-Partner-Business Intelligence 101 earns distinction through demonstrated technology success and customer commitment.

Livermore, CA — December 1, 2014 — Business Intelligence 101, Top Cloud Solutions, Bottom Line Results, today announced it has achieved a Silver Cloud Productivity competency, demonstrating its ability to meet Microsoft Corp. customers’ evolving needs in today’s dynamic business environment. To earn a Microsoft silver competency, partners must successfully demonstrate expertise through rigorous exams, culminating in Microsoft certifications. And to ensure the highest quality of services, Microsoft requires customer references for successful implementation and customer satisfaction.

“This Microsoft Silver Cloud Productivity competency showcases our expertise in today’s technology market and demonstrates our knowledge of Microsoft and its products,” said Kevin Lalor, CEO. “Our plan is to accelerate our customers’ success by serving as technology advisors for their business demands.”

“By achieving a silver competency, organizations have proven their expertise in specific technology areas, placing them among the top 5 percent of Microsoft partners worldwide,” said Phil Sorgen, corporate vice president, Worldwide Partner Group at Microsoft Corp. “When customers look for an IT partner to meet their business challenges, choosing a company that has attained Microsoft competencies is a smart move. These are highly qualified professionals with access to Microsoft technical support and product teams.”

The Cloud Productivity competency is designed to reward, recognize, and support our top performing cloud sales and deployment partners. Partners will be able to earn this competency by meeting specific deployment thresholds for Office 365 and Exchange Online (and in the future, SharePoint Online and Lync Online), completing a relevant set of technical exams and obtaining customer references.

The Microsoft Partner Network helps partners strengthen their capabilities to showcase leadership in the marketplace on the latest technology, to better serve customers and, with 640,000 Microsoft partners in their ecosystem, to easily connect with one of the most active, diverse networks in the world.

Cloud-computing solutions can be a terrific boost to your company’s productivity or an unfortunate drain on your resources – the difference is in how you manage the process and Bi101 is here to help. Above all – Bi101 believes in the power of the cloud and in what it can do for your business. Bi101 runs on the same cloud-based software we’re recommending to you. With cloud-based software solutions upgrades are a thing of the past. Bi101 provides the bridge between technical concepts and your business’s practical requirements. High-touch service for high-tech solutions.

 ###

For more information, press only:

Lindsay Donohue

Lindsaydonohue@bi101.com

866-552-4101

 

Popular Email Archiving Solutions: Google Vault, Microsoft Archiving, Proofpoint, McAfee, Mimecast

email security Are you finding that a local index just isn’t enough to keep up with your emails anymore?

An increasing number of businesses are falling under regulations that require them to keep emails for longer amounts of time, and that’s bad news for companies still storing their mail locally.  As local mail archives grow in size, Exchange and other local email programs start slowing down, sometimes drastically, as searching that big database becomes a bottleneck.

The only locally-based solution to this is multiple indexes, which can radically increase the size of the database and require multiple terabytes of local storage.

Either way, storing years of emails is becoming increasingly costly.  That’s why cloud based email archiving is so attractive:  you get effectively unlimited storage, backed by top-grade search routines, at a fraction of the cost of local storage.

Five Great Options In Online Email Archiving

1 – Microsoft Archiving

If you’re using Office 365 or Exchange Online, you get access to Microsoft’s own archive system and huge amounts of per-user storage and possibly unlimited, per user, depending on the plan.  Plus, Microsoft has one of the most reliable cloud systems on the market.  If you’re in the Microsoft system, there’s no real reason to look elsewhere.

2 – McAfee SaaS Email Archiving

As one might expect, McAfee’s online SaaS offerings put security at the forefront.  McAfee offers unlimited online storage and simplified Outlook integration, backed up by comprehensive encryption and other security measures that meet or beat all commercial regulations on proper email storage.

3 – Proofpointspam email

Proofpoint has spent years on the forefront of anti-spam heuristics, creating highly intelligent mail delivery systems with high levels of discernment.  They were one of the first companies to respond to the security challenges of HIPAA regulations, with a hybrid cloud system designed for organizations with a need for both local and remote access.

4 – Mimecast

Mimecast’s focus is on creating a single unified platform for email delivery and storage, both local and remote.  Their software suite handles security in your office as well as at their network of remote data centers, ensuring complete continuity of security throughout the process.  Their administrative software is also easy to work with and aimed at simple implementation.

5 – Google Apps Vault

The newest appearance on the cloud email archiving scene, surprisingly, is Google.  However, in mid-2014, they introduced Google Apps Vault, which is also included in their Apps Unlimited package.  This brings Google’s industry-defining search and data collection processes to your email archive.  Their entirely web-based interface makes file transfers and eDiscovery easy, at least within Google’s systems.  However, as is typical for their Apps, compatibility with Microsoft systems is minimal.

Which Email Backup Is Right For Your Needs?

It’s a crowded market, with plenty of niche vendors appealing to every archiving need.  But which backup system meets your needs?  Bi101 can help!  Contact us today for a free consultation on SaaS archiving solutions.

 

Screen Shot 2014-11-06 at 11.39.35 AM

photo credit: AJC1 via photopin cc
photo credit: Skley via photopin cc

Copyright 2014 Business Intelligence 101. All Rights Reserved.

Top Cloud Solutions. Bottom Line Results.