Zantaz Update

Ericsson acquires Mobeon and strengthens multimedia strategy

Ericsson announced it will acquire Mobeon, a provider of IP-messaging components for mobile and fixed networks. read more »

Ericsson Enterprise Multimedia Server offers user-centric Unified Communications

Ericsson announced Enterprise Multimedia Server, its user-centric unified communications solution with mobile extension support. Key features: single point of contact for any form of communication, presence information, and preference management, among others. Available immediately. read more »

CeBIT 2007: Free Cortado push mail service launched

Cortado announced Cortado Free, its Exchange-based push mail service. Key features: personal Cortado email address with a 20 MB mailbox, spam filter with virus protection, and Outlook Web Access support environment, among others. read more »

Five Email and Document Management Strategies Key to Reducing Litigation Costs, Improving Preparatio

Open Text released a list of five key technology strategies for litigation and e-discovery readiness that can help companies be prepared. Strategies: define defensible policies, enforce policies with records management, centrally control all enterprise content, retain business records, and extend with litigation support. read more »

Fenestrae announces availability of Fenestrae Mobile Data Server Notification Service

Fenestrae released Fenestrae Mobile Data Server Notification Service, its solution for the personalized push of Exchange data. Checks content of Exchange Server events based on notification rules defined by the end user and, when an event matches, a notification SMS is send to the mobile device. Available immediately. read more »

New RSA Fraudactionsm Anti-Trojan Service to Provide Institutions with Comprehensive Crimeware Prote

RSA announced RSA FraudAction Anti-Trojan, its service designed to help companies secure against crimeware attacks. Designed to provide a proactive, layered approach to dealing with financial crimeware and advanced attacks with an end-to-end solution that covers the identification, analysis, blocking, and shutdown of attacks. Available April 2007. read more »