Become litigation ready: Only retain what you need; Prevent the email oops!; Legal hold retention
Don’t fail your next security audit; Who had access to that? Cloud - leave no-one behind Unify your distribution lists
Improve SharePoint security and uptime: Simplify your library structure; Know your growth, use & uptime; Recover files quickly from backup
Ready for that search request?: Email, SharePoint and PST search; Early case assessment; Search social media and website
Recovery for discovery: Restore one message from backup; Recover lost mailboxes; Eliminate the backup window
Email always backs up when you least expect it: Reduce help desk problem escalations; End to end monitoring; Optimize email routing
Protect your data in-transit: Secure eForms; Secure large file transfer; Secure email
Get the most out of your current email storage: Reduce mailbox size by up to 40%; Set standards for email content; Filter email content as it is sent or received
Retention is now a way of life: Gather multiple archives into one; Website and social media archive; Secure, fast Cloud retention; Email archive and quota control; Regulatory compliance capture; Vault your email
Migration is not for the faint of heart: Upgrade obselete email archives; Assess the email stores first; Migrate Domino apps and Buddy Lists
The challenge of PST files: PST detection and backup; Migrate PSTs to Exchange 2013 or 365; Understand your PST content
Make Lync and Sametime IM enterprise-ready: Audit Lync conversation history; Lync emergency broadcasting; Accelerate Lync change requests; Leverage Sametime for help desk; Keep Buddy Lists up to date; Archive Sametime chats
Conference room, hot desk and signage: Accurate conference room booking; True team calendar sharing; Add digital signage to meeting rooms
Mobilize and virtualize: Triple your VM density; Clamp down on mobile usage; Mobile change management
Lotus Notes specific tools: Manage large email broadcasts; Strengthen email policies; Filter email in real-time
1. 2013 Buyer’s Guide
resoftco.com
Welcome to the 2013 Buyer’s Guide
Who are we?
ReSoft International is an
integrator and reseller of best-of-
breed software tools that address
email and data governance,
identity governance, regulatory
compliance and retention, Cloud
migration and storage relief.
Why work with us?
ReSoft has acted as a trusted advisor for
over 18 years to hundreds of organizations
across many industries. We apply the
relevant technologies and techniques from
our broad set of tools to reduce liability risks
and save time.
By partnering with ReSoft, you will enjoy the
results of thorough, considered research and
experience to help you to make informed,
timely decisions to meet emerging threats to
the smooth operation of your systems.
2. Who we are Page 2
The ReSoft methodology: helping you make informed
decisions and implement timely solutions
Our approach allows the provision of products and Making the Technology Work For You
services to fulfill your specific requirements; from In today's market, pre-packaged software solutions are
requirements definition, policy definition, solution & groaning with features that overwhelm even the most
architecture design, product and technology impressive IT department. The challenge is
selection to project planning, installation, training, understanding how to convert this software
health checks, site assessments, troubleshooting commitment into a measurable return-on-investment
and skills transfer. that addresses your requirements. ReSoft's approach
is to make the software work for you.
Our involvement in your project can range in duration
from a couple of days to months. At the end of the
assignment, we want you to be self-sufficient so we
typically incorporate documentation and skills transfer
into our assignments.
ReSoft International, LLC www.resoftco.com (203) 972-8462
3. Look Inside Page 3
Become litigation ready……………………………..……. 4 Retention is now a way of life…………………………. 12
• Only retain what you need • Gather multiple archives into one
• Prevent the email oops! • Website and social media archive
• Legal hold retention • Secure, fast Cloud retention
• Email archive and quota control
Don’t fail your next security audit……………………… 5 • Regulatory compliance capture
• Who had access to that? • Vault your email
• Cloud - leave no-one behind
• Unify your distribution lists Migration is not for the faint of heart………………. 14
• Upgrade obselete email archives
Improve SharePoint security and uptime …............6 • Assess the email stores first
• Simplify your library structure • Migrate Domino apps and Buddy Lists
• Know your growth, use & uptime
• Recover files quickly from backup The challenge of PST files………………………………. 15
• PST detection and backup
Ready for that search request?…………………………. 7 • Migrate PSTs to Exchange 2013 or 365
• Email, SharePoint and PST search • Understand your PST content
• Early case assessment
• Search social media and website Make Lync and Sametime IM enterprise-ready… 16
• Audit Lync conversation history
Recovery for discovery…...………………………………….8 • Lync emergency broadcasting
• Restore one message from backup • Accelerate Lync change requests
• Recover lost mailboxes • Leverage Sametime for help desk
• Eliminate the backup window • Keep Buddy Lists up to date
• Archive Sametime chats
Email always backs up when you least expect it….9
• Reduce help desk problem escalations Conference room, hot desk and signage...…........18
• End to end monitoring • Accurate conference room booking
• Optimize email routing • True team calendar sharing
• Add digital signage to meeting rooms
Protect your data in-transit……………………………… 10
• Secure eForms Mobilize and virtualize …..……………………………… 19
• Secure large file transfer • Triple your VM densiity
• Secure email • Clamp down on mobile usage
• Mobile change management
Get the most out of your current email storage…. 11
• Reduce mailbox size by up to 40% Lotus Notes specific tools……………………………… 20
• Set standards for email content • Manage large email broadcasts
• Filter email content as it is sent or received • Strengthen email policies
• Filter email in real-time
ReSoft International, LLC www.resoftco.com (203) 972-8462
4. Data Governance Page 4
Become litigation ready.
Understand what data exists, where it's located and who has copies. Identify what data should be
retained to comply with policy and legal hold requirements and what can be safely purged. Scan a wide
range of data sources including online networks, email servers and offline back-up tapes to provide a
content profile.
Use this knowledge to create data maps of the content. Define robust retention policies that will
support current litigation and prepare you for the future. Integrate new data into day-forward
procedures. Users will add classification labels to new documents and emails as they create them.
Only retain what you need
Contain a 6x expected growth in data storage in the
next 5 years. Rigorous Data Governance principles
with Index Engines will:
• Reduce growth in network storage by applying data
mapping to evaluate what data to retain for
business value and legal holds. Identify duplicate
data and what can be safely purged
• Save up to 80% of the cost of storing backup tapes
by removing duplicate data
• Allow fast response to legal and compliance needs
through fast, indexed content searching Web ID: www.resoftco.com/10
Prevent the email oops!
Improve compliance at time of document creation and
email send with the Titus Classification labeling and
policy enforcement software for Microsoft Office and
Outlook.
• Promote end-user accountability of sensitive data
• Increase accuracy of ediscovery and data loss
systems
• Enable ethical walls to limit distribution of emails to
inappropriate recipients
• Force encryption of sensitive email that needs to be
sent externally
Web ID: www.resoftco.com/20
Legal hold retention
Are you keeping too much email? Mail Attender will
manage legal holds, retention dates, quotas, email
content, mailbox size, and more.
• Automate your archive, purge and retention policies
• Target Exchange mailboxes, Public Folders, PST files
and Lotus Notes mail databases
• Manage email policy by providing flexible, yet
centralized, control over mail content, size and age
Web ID: www.resoftco.com/30
ReSoft International, LLC www.resoftco.com (203) 972-8462
5. Identity Governance Page 5
Don't fail your next security audit - apply sound IAM principles
A Failed security audit drives the need for high-level remediation skills and software, caused by:
• Independant legacy IAM solutions that do not communicate to each other
• Acquisition/merger/layoff plans driving a need for a short burst of specialist skill
• Cloud, Mobile & social media limitations in your audit policies
Our IAM offerings will help rationalize disparate directory, password and access solutions, migrate you to the
latest IAM technologies through experience in all major solutions such as SAP, Microsoft, Sun/Oracle, Siemens.
Who had access to that?
Collect access rights audit logs from all your systems
across the entire IT environment, from on-premise
enterprise applications to Cloud applications.
Consolidate into a single, central point using SailPoint
IdentityIQ.
• On-demand visibility into who had access to
what….and when
• Accelerate and improve audit process
• Meet compliance and regulatory mandates
• Change and terminate user access as needed Web ID: www.resoftco.com/40
Cloud: leave no-one behind
Provision and de-provision users in multiple Cloud
applications using PingFederate.
• Cloud single sign-on and federated identity
• Employees, customers and partners can access
multiple Cloud resources
• Secure mobile access to cloud resources
• No-one left behind: user de-provisioning across all
Cloud applications
• Use social networking sign-ons, such as Facebook,
LinkedIn, Twitter, Google Web ID: www.resoftco.com/50
Unify your distribution lists
Realize over 30% savings on IT admin and helpdesk
costs without compromising security with Unify
Distribution List Management.
• Delegate basic operational tasks to employees
through protected "smart distribution lists"
• Automate expiry of unused lists
• Manage regular and dynamic distribution groups
• Clone groups, set minimum membership
• Manage aliases and delivery restrictions
• Create ethical walls Web ID: www.resoftco.com/60
ReSoft International, LLC www.resoftco.com (203) 972-8462
6. SharePoint Search, Archive & Restore Page 6
Improve SharePoint security & uptime
SharePoint offers excellent collaboration and publishing facilities, but it can present challenges to
organizations needing to support regulatory compliance or regulatory-discovery initiatives or growth.
Administrators are overwhelmed trying to manage availability and litigation requests in a timely manner
and end up spending an increasing amount of time responding to requests, finding deleted files, and
recovering from hardware failures.
Simplify your library structure
Override the default "allow-all" access by adding
metadata properties to each document at posting time
using Titus Metadata Security for SharePoint.
• Eliminate errors created when manually setting
document access-permissions incorrectly
• Automatically enforce access security at the
document level, based on user-roles, trusted claims
and document metadata
• Control access to externally-facing library content by
user and group Web ID: www.resoftco.com/240
Know your growth, use and availability
Combine all the key elements for SharePoint
monitoring and reporting with Foresite.
• Everything you need in a single, concise tool.
• Optimize performance, improve SLAs, show growth.
• Over 25 built-in realtime data & historical trending
reports, plus the ability to create complex queries.
• Self-generating personalized dashboards gives key
roles their own dashboard with information relevant
to them
• Test critical services: site availability, timer jobs,
search and index service, content databases.
Monitor all underlying core technologies; IIS, Active Web ID: www.resoftco.com/250
Directory and SQL.
Recover files quickly from backup
Simplify the process of restoring individual documents,
sites, sub-sites and folders from backups using
DocRetriever for SharePoint. No longer spend hours
rebuilding the entire production database or a
temporary SharePoint recovery farm, just to recover a
single document.
Connect directly to native backups or any snapshot.
Browse SharePoint objects as if you were connected to
a live SharePoint site. Recover sites, site hierarchies,
list items, libraries and views directly to the production
Web ID: www.resoftco.com/260
servers, to alternate servers or to a file system.
ReSoft International, LLC www.resoftco.com (203) 972-8462
7. Electronic Discovery Page 7
Ready for that search request? • Live email files
• Web page and social media content
With over 37% of searches involving greater than 2.5TB of • Archives such as PST files, journal
data (IDC), there is substantial data to review once a archives and third-party Archives
document discovery request or subpoena is issued. Often, • Back-up tapes
requests must be completed under intense court-imposed • SharePoint libraries
deadlines. Consider these sources as e-discovery targets: • Files on user home drives
Email, Sharepoint, PST search
Perform dynamic keyword searches against Exchange
mailboxes, PST files, SharePoint libraries, Lotus Notes
databases and common file storage areas with
Discovery Attender.
Scan message subject, body and attachment content
using customizable search criteria. Results are
summarized in a report listing items matching keyword
criteria.
• Run legal, HR and corporate discovery searches
discreetly and transparently to end-users
• Search data for suspected evidence or breaches
• Secure potential evidence once it's located Web ID: www.resoftco.com/130
Early case assessment
Answer critical questions about the content, age, size,
and importance of electronically stored information in
your Exchange servers, PST files and files on the
network with Report Attender.
• Gather and distill data to identify the items stored on
network shares and email servers
• Make informed decisions for early case assessment,
administration, litigation and compliance needs
• Create summarized reports, drill-down views and
vibrant charts Web ID: www.resoftco.com/110
Search social media and websites
Search through a website exactly as it appeared live
online on a specified date using PageFreezer .
• Archive social media and website page changes
(Facebook, Twitter, LinkedIn etc.) every day
• Add a digital signature and timestamp to each
archived page, evidence of the time the page was
archived proving the page was not changed since it
was archived
Web ID: www.resoftco.com/140
ReSoft International, LLC www.resoftco.com (203) 972-8462
8. Recovery for Discovery Page 8
Restore one message from backup
Restore, copy & search un-mounted Exchange edb
databases using PowerControls. Restore a single
mailbox, individual folders, or any number of messages
and attachments to any mailbox on the network or
directly into an Outlook PST file on your local drive.
• Interact with backups just like you do with Microsoft
Outlook.
• Restore directly from your backups
• Remove time consuming and expensive single
mailbox (brick-level) backups Web ID: www.resoftco.com/270
Recover lost mailboxes
Restore deleted, lost and archived emails from any un-
mounted Exchange data store, EDB, without the need
to perform expensive & time consuming brick level
backups using MailRetriever.
• Recover private and public information data stores
from any off-line EDB with Recovery Wizard
• Identify email for e-discovery and recovery with
Search Wizard
• Make better use of existing Exchange snapshots
• Check the EDB for corruption .
• Synchronize the un-mounted EDB with the online
server. Web ID: www.resoftco.com/280
Eliminate the backup window
Protect the whole Exchange application - operating
system, configuration, data, Active Directory and
Blackberry Servers using REPLAY - it continuously
creates a volume block-level, point-in-time image of the
entire Exchange environment.
• Replicate changes of the entire server footprint to a
VM machine.
• Perform discovery & restoration tasks against the
Replay backup without impacting the production
Exchange server
• Replicate to a failover site
• Validated backups for corruption each time
• In the event of a failure, restart the server as the
primary Web ID: www.resoftco.com/290
ReSoft International, LLC www.resoftco.com (203) 972-8462
9. Availability, Metrics & Alerting Page 9
Email always backs up when you least expect it
Internet connectivity crashes, a server stops responding, a mobile device doesn’t connect.... and you are
always the last to know. To know that mail is flowing properly you need to implement end-to-end server
delivery monitoring. If a link slows or stops, it tells you!
Another part of managing messaging is the ability to track and trend usage and identify anomalies to help
in capacity planning, load balancing and usage accounting. Important to this is setting up a central
collection point for all the messaging related resources - email servers, SMTP Sendmail servers, anti-
spam devices, anti-virus plug-ins, fax servers, instant-messaging servers etc.
Reduce help desk escalations
Monitor your Exchange, mobile device & AD components
with a quick glance at a single screen. Mailscape is a
suite of Exchange & Active Directory monitoring tools
with a 'one-look' dashboard that enables you to :
• Increase help desk resolution capabilities thereby
reducing escalation calls for messaging and AD issues
• Lower support costs and easier deployment than other
tools like SCOM
• View intuitive, accurate real-time dashboards, filtering
relevant information for that user role Web ID: www.resoftco.com/300
End-to-end server monitoring
End-to-end or heartbeat server delivery monitoring
observes realtime email flow between internal email
servers, mobile devices and connections to the Internet.
If a link slows or stops, Topper tells you.
• Remove the need to deploy agents on monitored
servers.
• Reflect the current status of your network
• Take action on outages before users are impacted.
Web ID: www.resoftco.com/310
Optimize email routing
Optimize email routing and report on service levels and
usage for cost recovery by delivering metrics on all
messaging traffic, server availability, mail delivery times,
replication and mail store content for messaging
systems like Microsoft Exchange and Lotus Notes using
OmniAnalyser.
• Demonstrate compliance with service levels
• Track individual messages
• Calculate cost chargeback for organizational units
• Report on mail flow statistics, estimate usage trends
• Check email system configuration correctness Web ID: www.resoftco.com/320
ReSoft International, LLC www.resoftco.com (203) 972-8462
10. Secure Data Delivery Page 10
Protect your data in-transit
Secure data delivery services from DataMotion is hosted in either a private or public cloud, increasing compliance
and control while reducing cost and complexity of delivery.
All modules, SecureMail, FileTransfer, SecureContact and eForms share the same core platform architecture and
interconnect with each other to provide a unified encryption solution.
Secure eForms
Deliver eForms securely and directly to a customer's
inbox, bypassing portal logins
• Web-enable offline workflows, e.g., loan
applications, processing, benefits enrollment,
health insurance claims, medical forms
• Create eForms with your organization's logo to
ensure a seamless user experience
• Allow customers to receive, fill out and submit
eForms as emailable PDF forms, right into your
back-end application
• Integrate Web eForms (hosted, secure HTML forms)
right into your website Web ID: www.resoftco.com/70
Secure large file transfer
Transfer large files between business partners,
employees and customers while providing governance
to track and monitor all activity.
• Send and receive any file type
• Pick up interruptions through checkpoint restart
capability
• Drag and drop interface
• Remove the need to exchange encryption keys
• Trigger encryption from pre-defined rules
• Automatically provision accounts for recipients Web ID: www.resoftco.com/80
Secure email
Meet HIPAA requirements, deliver sensitive financial
documents, protect client confidentiality.
• Install on-premise or in the secure Cloud
• Apply pre-built regulatory and best-practices filters
• Fault-tolerant and clustered
• Enable secure messaging for employees, call centers
• Automate data delivery such as eStatements, eBilling
• Seamlessly integrate into your existing website
design
Web ID: www.resoftco.com/90
ReSoft International, LLC www.resoftco.com (203) 972-8462
11. Email Content Management Page 11
Get the most out of your current email storage
Growth in the number of e-mails generated and stored in your email system may be inevitable, but ReSoft can
help you to reduce their impact on resources and make the most efficient use of e-mail in your organization.
For organizations that need to minimize expenditures on storage and reduce disaster recovery windows,
implementing an effective mailbox size management strategy will reduce server loads, shorten restore times,
increase ROl on storage expenditures, and slow the consumption of new storage as it is made available.
Reduce mailbox size by up to 40%
Automatically and invisibly compress and
decompress attachments in Outlook and Exchange
using MaXCompression.
• Save on network bandwidth
• Reduce mailbox storage requirements
• Reduce transmission times for remote users
• Reduce backup and restore time for mailboxes
• No change in work procedure; no staff training
• Set compression rules centrally Web ID: www.resoftco.com/220
Set standards for email content
Are you keeping too much email? Mail Attender will
manage retention dates, quotas, email content, mailbox
size, and more.
• Automate your archive, purge and retention policies
• Target Exchange mailboxes, Public Folders, PST files
and Lotus Notes mail databases
• Manage email policy by providing flexible yet
centralized control over mail content and size
Web ID: www.resoftco.com/30
Filter email content as it is sent or received
Filter email in realtime in Microsoft Exchange and Lotus
Notes/Domino using securiQ.
Server-based security policies block undesired email,
prevent the spreading of enterprise-critical data and
ensure secure e-mail transmission. Automatic e-mail
disclaimers and intelligent e-mail processing increase the
quality of service. Actions can be triggered based upon:
• Email content
• Attachment
• Presence of a disclaimer Web ID: www.resoftco.com/230
• Encryption
ReSoft International, LLC www.resoftco.com (203) 972-8462
12. Archiving and Retention Page 12
• Journaling of all email
Retention is now a way of life • Data in mailboxes and local archive/PSTs
The persistence of the electronic record and the • Draft emails yet to be sent
recovery of electronic communications in connection • Social Media (Facebook, LinkedIn, etc.)
with almost every business dispute means litigation • Calendar appointments
complications resulting from problematic email and • Cloud-based email
social media activity are commonplace. Consider • Instant Messaging
what information to capture as part of your retention • External email such as Blackberry
policy: • Specialist email solutions (Bloomberg, etc.)
Gather multiple archives into one
Consolidate all your email-generating applications into a
single archive to give a single point of search and
retention. Data Parser formats content into
compliant .eml or .msg files which may then be ingested
into your primary archive.
Archive email from:
• Blackberry SMS
• Bloomberg and Reuters
• NewsGator, Symantec MessageLabs
• Facebook and Twitter
• SharePoint Wiki, blogs and list Content
• Microsoft Lync, Microsoft LiveMeeting Web ID: www.resoftco.com/170
Website and social media archive
Browse through a website exactly as it appeared live
online on a specified date using PageFreezer.
• Archive social media & website page changes
(Facebook, Twitter, LinkedIn, etc.) every day
• Add a digital signature and timestamp to each
archived page, evidence of the time the page was
archived proving the page was not changed since it
was archived Web ID: www.resoftco.com/140
Secure, fast Cloud retention
Simplifiy infrastructure and reduces costs with unlimited
storage with Proofpoint's hybrid Cloud email archive.
• SLA-driven eDiscovery/Compliance and end user
searches result in 20 seconds or less (average search
is 6.8 sec): search against a mailbox, group of
mailboxes or entire archive
• Allow mobile device access to archive
• Automate legal holds: a single compliant legal hold
repository for messages relevant to a given matter
• Encrypt data at time of collection. Only you have the
encryption key
• Automated policy enforcement: for PCI, PII, SOX,
FDA, HIPAA Web ID: www.resoftco.com/180
ReSoft International, LLC www.resoftco.com (203) 972-8462
13. Archiving and Retention Page 13
Email archive and quota control
Enforce email policy through flexible yet centralized
control of the Exchange Information Store and PST files
with Archive Attender
• Automate retention so email is moved to the archive
from the user’s primary mailbox based upon age or
how close the user is to their Exchange quota
• Identify inappropriate, confidential or threatening
emails
• Improve legal discovery: search email containing
particular keywords.
• Offload messages from mailboxes to a separate
archive to meet email retention regulations
Web ID: www.resoftco.com/190
Regulatory compliance capture
Meet SEC, NASD, Sarbanes-Oxley, ISO, DOD, HIPAA and
other email compliance requirements with Archive One.
• Reduce legal risks by retaining and recovering e-mail.
• Improve awareness of legal exposure
• Extract email from the mailboxes of nominated users
to a separate archive store from which users can
retrieve
• Improve Exchange email server performance by
ensuring only the optimum level of messages are held
on the server
• Increase productivity by giving search and retrieval Web ID: www.resoftco.com/200
of archived email to end users
Vault your email
Vault adds archiving, ediscovery and information
governance to the Google Apps cloud.
Retention policies: archive email and chat messages
according to policy, preventing inadvertent deletions
E-discovery: be prepared for litigation and compliance
audits with powerful search tools that help you retrieve
relevant email and chat messages
Legal hold: place legal holds on users. Email and chat
messages can't be deleted by users on hold
Export: export specific email and chat messages to Web ID: www.resoftco.com/210
standard formats for additional processing and review
ReSoft International, LLC www.resoftco.com (203) 972-8462
14. Cloud Migration, Virtualization, Modernization Page 14
Migration is not for the faint of heart
There is a strong business case for moving existing processes, such as email and collaboration, into a
Cloud infrastructure, but does it apply to you?
There are many moving parts that must be considered before embarking on a migration to the Cloud. Our
diagnostic methodologies will analyze your existing environment to identify those applications that best sit
in the Cloud and migrate only the application functionality that is used.
Upgrade obsolete email archives
Migrate and consolidate email and related records from
one email archiving system to another or back into the
user mailbox. Ensure future accessibility, regardless of
archive, messaging platform or storage using
TransVault.
• Consolidate different archive repositories into a single
platform or split a single archive into new groups
• Eliminate the significant costs, complexity and risks of
managing data in a series of uncoordinated silos
• Export any mailbox from an archive whether the
message came from Notes, Exchange or is trapped in Web ID: www.resoftco.com/100
an obselete archive
Assess the email stores first
Make smart decisions about data migration. The Report
Attender Data analysis tool will answer critical questions
about the content, age, size, and importance of
electronically stored information in your Exchange
servers, PST files and files on the network.
• Use as an early data assessment tool to understand
age and size of mailbox items
• Gather and distill important details to identify the
items stored on network shares and email servers Web ID: www.resoftco.com/110
Migrate Domino Apps, Buddy Lists
Leverage your current investment in Lotus by transforming
existing business logic into X-Pages with Transformer.
• Save up to 90% of the cost of rewriting applications
• Remove most Notes pre-reqs to avoid data migration
Update, rename, and modify Sametime buddy lists for
people, groups, or networks with BuddyList Deployment
Manager.
• Remap all user ids from Domino to LDAP or AD
• Migrate Buddy Lists from Sametime to Microsoft Web ID: www.resoftco.com/120
Lync
ReSoft International, LLC www.resoftco.com (203) 972-8462
15. PST Elimination and Backup Page 15
The challenge of PST files
PST files containing valuable or confidential information that needs to be accessible to other users can
be saved anywhere on the network and, most likely, will not be regularly backed up, risking data loss.
• Identify where PST files reside, who owns them, how large they are and when were they last accessed
• Backup PSTs across the network so you have a solid copy for any subsequent searches or restores
• Move PSTs to the best network location for access
• Filter PST content so you only keep the data you need
• Eliminate PST files by ingesting back into the email system or to a third-party archive.
PST detection and backup
Automatically detect PST files with PSTStation
Corporate. Detect all PSTs stored on workstations or
shared file servers, in live Outlook profiles, or by
scanning directories to find empty,or hidden PSTs.
• Backup PSTs fully or incrementally, where only
email created since the last backup will be saved,
reducing the volume of data and backup time
• Ingest PSTs into an archiving repository;
deduplicate, compress and move to a long term
archive. Select one PST, a group or an entire server.
Web ID: www.resoftco.com/150
Move PSTs to Exchange to 2013
Find PSTs and migrate them to an archive, Exchange
on-premise or Cloud 365 using PST Enterprise.
• Search for and find all PSTs
• Selectively extract unwanted data
• Place data on Legal Hold without archiving first
• Establish location, size, age, owner of all PSTs
• Ingest PSTs to archive or to Exchange 2010, 2013 Web ID: www.resoftco.com/160
or 365
Understand your PST content
Answer critical questions about the content, age,
size, and importance of electronically stored
information in your Exchange servers, PST files
and files on the network with Report Attender.
• Gather and distill details to identify the items
stored on network shares and email servers
• Make informed decisions for PST migration,
administration, litigation and compliance needs
using summary reports, drill-down views, vibrant
charts, and custom options
Web ID: www.resoftco.com/110
ReSoft International, LLC www.resoftco.com (203) 972-8462
16. Lync and Sametime Page 16
Make Lync and Sametime enterprise-ready
Audit Lync conversation history
Monitor and audit Microsoft Lync IM conversations for
policy enforcement or regulatory needs using Instant
OCS Archive Viewer .
• Enterprise search and discovery - enable a user with
‘super admin’ privileges to conduct organization-wide
audits of all conversations
• Departmental search and retrieval - give managers
the ability to monitor the conversations of employees
• End User search and retrieval - let users see their own
conversation history without intervention from the
help desk Web ID: www.resoftco.com/330
Lync emergency broadcast
Turn Microsoft Lync into a real-time news broadcaster
to accelerate the delivery of critical or transient
information with Instant Alert Manager
• Quickly create IM broadcast messages and instantly
send them to specific users, groups or system-wide
• Schedule IM broadcasts for auto-delivery
• Set messages to expire if offline users do not
retrieve them within a certain time frame.
• IT can inform users of unexpected events and
provide updates on service re-establishment
• Business Units can relay transient information to
staff; an impromptu meeting, a new client Web ID: www.resoftco.com/340
Accelerate Lync changes
Deployment and capacity planning for Microsoft Lync
is time-consuming and labor-intensive because native
interfaces do not support bulk updates to user
configurations.
Unify Lync Manager overcomes these Lync
provisioning and administration issues through its
template-based provisioning. This allows the definition
of various different ‘flavors’ of Lync functionality
according to the usage requirements of different
groups.
Web ID: www.resoftco.com/350
ReSoft International, LLC www.resoftco.com (203) 972-8462
17. Lync and Sametime Page 17
Sametime for the help desk
Reduce help desk costs by using IM for help desk
contact using Instant Queue Manager
• Create virtual queues that sort Sametime chat
requests and direct them to the next available help
desk agent
• Route incoming requests to the correct person or
group
• Contact help desk using mobile devices
• Track all queue activity through database logging
• Let help desk staff appear as a single entity to
outside parties and can be anonymous Web ID: www.resoftco.com/360
Keep Buddy lists up to date
Lotus Sametime Buddy lists are created by users as an
easy means of building team contacts. But when a
Buddy’s name changes, a user leaves, or a directory OU
is redefined, none of these will be updated in the user’s
Buddy list.
Allow administrators to centrally index, view, update,
rename, and modify buddy lists for people, groups, or
entire networks of Sametime users using Instant
BuddyList Deployment Manager.
• Instantly update Buddy lists
• Build dynamic Buddy lists
• Migrate & co-exist between Sametime & Microsoft
Web ID: www.resoftco.com/370
Lync
Archive Sametime chats
Log and archive IBM Lotus Sametime Connect client
chats, and send dynamic, customizable company
disclaimer messages to IM chat parties using Instant
IMtegrity.
• Audit and log who says what, what was promised
and when and for how long people chatted on-line
• Authenticate and Identify anonymous AOL screen
names and match them to real user names from
your LDAP directory
Web ID: www.resoftco.com/380
ReSoft International, LLC www.resoftco.com (203) 972-8462
18. Conference Room Booking & Team Calendars Page 18
Conference room, hot desk booking and signage
Natively, Microsoft Exchange has only a rudimentary capability for managing conference rooms. There is
no way to view the properties of a meeting room such as location, capacity or capabilities such as video
conferencing or digital signage and no way to order services such as catering for the rooms.
Accurate conference room booking
Integrate advanced conference room scheduling and
meeting room booking capabilities into Outlook and
Exchange with Resource Central. Remove the confusion
surrounding conference room scheduling requests by
providing planning and organizing services within the
Microsoft interface.
• Manage services for conference rooms such as
catering, table arrangements, name badges, AV
equipment and internet access
• Handle changes or cancellations and send order
receipts
• Select rooms in the same Outlook booking process
as you invite attendees removing free-busy problems Web ID: www.resoftco.com/390
True team calendar sharing
View and manage many Outlook calendars and/or
Outlook resources on one screen using Exchange
Central.
• Give a consolidated view over many calendars
• Perfect for the front-desk clerk, reception or the
”back-end“ for planning, booking, statistics of
Outlook calendars
• Plan employees, meeting rooms and other
Outlook resources
• Color-code and filter appointment views Web ID: www.resoftco.com/400
Add digital signage to meeting rooms
Inform visitors and coworkers of present and future
events outside meeting rooms with Digital Sign Service.
Book, change, and end meetings directly on the touch
screens of your digital signs. Guide and welcome visitors
while enhancing corporate branding.
• Integrate interactive signage directly and seamlessly
with Microsoft Exchange and Outlook
• Create templates to brand your company
• Review, book, confirm, expand, end, and delete
Outlook meetings directly on the touch screen
Web ID: www.resoftco.com/410
ReSoft International, LLC www.resoftco.com (203) 972-8462
19. Mobile and virtualization Page 19
Triple your VM density
Using existing security solutions to protect the Virtual
Machine environment can threaten performance, cause
undue complexity, leave unintentional security gaps, and
hinder the ability to fully benefit from Virtualization. Trend
Micro Deep Security offers a lighter way to secure VMs
with an agentless anti-malware, intrusion prevention and
integrity monitoring platform, built for VMware that will:
• deliver 11X more efficient resource utilization
• support up to 3X the number of VM machines
• reduce the need to continually patch agents.
• allow continuous and optimized protection of virtual
servers as they move between data center and
public cloud Web ID: www.resoftco.com/460
Clamp down on Mobile usage
Capture real time data of all the core components of your
mobile infrastructure including automatically testing to
ensure everything is working normally. Prevent outages &
helping determine the root cause of issues quickly with
Mailscape:
• ActiveSync Connectivity Testing
• Folder sync verification
• Data sync
• Get item sync test
• Ping test
• Autodiscover verification Web ID: www.resoftco.com/470
Mobile change management
Easily manage your entire mobile access infrastructure,
including your users’ various devices of choice, with Unify
Mobility.
• Customize provisioning and de-provisioning policies
• Securely delegate administrative tasks down to your
help desk and/or your end users (device activation,
password reset, 24/7 remote lock/wipe)
• Increase the number of supported devices and allow
user self service
• Ensure security of sensitive corporate data
• Set alerts, thresholds and notifications
Web ID: www.resoftco.com/480
ReSoft International, LLC www.resoftco.com (203) 972-8462
20. Lotus Notes Solutions Page 20
Manage large email broadcasts
E-mail broadcasts are a special class of electronic
messaging typically containing large address lists. A user
can easily abuse the system by mailing ill-timed or
inappropriate messages to large groups. A recipient only
has to hit REPLY ALL to create havoc!
• Intercept Lotus Notes broadcast requests with
Castcadia
• Review, approve and schedule each broadcast and
then move into a traffic stream
• Set delivery schedules, routing strategies and
formatting adjustments with predefined rules.
• Add opt-in opt-out capability using Subscription
Manager Web ID: www.resoftco.com/420
Strengthen Notes email policies
Provide centralized control over Lotus Notes mail
databases using Mail Attender for Notes.
• Automate quota, document retention/deletion so the
user takes an action to keep a document beyond the
retention time
• Identify inappropriate or threatening emails or
attachments already residing in the email system
• Save disk space by offloading attachments into a
separate archive leaving a link in the original message
• Prevent users from saving, sending or deleting
messages they shouldn’t
Web ID: www.resoftco.com/430
Filter Notes email in real-time
Provide fine-tuned control over all sent and received
messages in Lotus Notes email with Compliance
Attender.
• Capture messages before they are routed, allowing the
collection, quarantine, archive and disclaiming of
messages in response to compliance requirements
• Run discreet rules from a central location to all or a
select group of users.
• Comply with increasingly stringent industry regulations,
government legislation and internal corporate
compliance policies
Web ID: www.resoftco.com/440
ReSoft International, LLC www.resoftco.com (203) 972-8462