Mail for Exchange 2.0 boosts the power of Nokia Eseries Devices

Nokia announced version 2.0 of Mail For Exchange, its mobile email solution. Key enhancements: support for meeting request handling, and directory look-ups, among others. Available immediately. read more »

Log Shipping for Exchange

EMC Buys Mozy for $76 Million

EMC has purchased Berkeley Data Systems, the creators of Mozy, for $76 million. Mozy was one of several companies focused on hosted backup that started over the past 18 months. It has proved itself to be a fast and reliable service; the entry-level MozyHome service is free for 2GB of storage. With only $1.9 million […]... read more »

CommuniGate Upgrades Unified Communications Client

Article discussing the Communigate Pronto Flash client which supports email, calendaring, IM, contact management, and voice mail management. read more »

Engate Enhances Network Profiling, Connection-level Anti-Spam Solution with Comprehensive Phish Protection

Engate announced version 3.5 of MailSentinel, its anti-spam solution. Adds Phishfilet technology to protect against phishing attacks. Available immediately. read more »

Prolify Launches Email Collaboration and Data Integration Solution at DEMOfall

Prolify announced Email Collaboration, its email productivity tool. Key features: contextual display of information, document control, and workflow management, among others. Available immediately. read more »

New Whitepaper: Password Policy for Directories

Isode released “Password Policy for Directories”, its whitepaper. Discusses the implementation of secure password policies and argues that the directory is the correct place to store passwords. Available immediately. read more »

Polivec Study Shows Growing Acceptance of Regulatory Compliance but Disagreement on Who’s Responsible and Who Pays

Article discussing the results of a poll regarding the strategy, responsibility, and cost involved in introducing reliable compliance policies. read more »

What Is E-Discovery?

The E-Discovery Hype Continues

New Trend Micro Internet Security Products Strengthen Personal Information Protection and Deliver Enhanced Performance

Trend Micro announced Internet Security Pro, its transaction and identity protection solution. Key features: malware and spam protection, Website authentication, and WIFI verification, among others. Available September 27, 2007. read more »

Build yourself a botwall

Article discussing the need for a wall of devices with the ability to identify and shut down botnets, and other security solutions. read more »

Pump-and-dump spam changes image

Article discussing pump-and-dump spam and how older techniques such as image and PDF spam are being replaced by new obfuscation techniques. read more »

FilesAnywhere ”Attach Link” Brings Unlimited-Size Email Attachments to Outlook

FilesAnywhere.com announced “Attach Link”, its add-in for Outlook. Provides the ability to link to files located on the FilesAnywhere service directly within Outlook. Available immediately. read more »

Inbox/Outbox 2007

Article announcing Inbox/Outbox 2007 email management and marketing conference. Located in London, England, it runs from November 27–28, 2007. read more »

MIT Spam Conference 2008

Article announcing the MIT 2008 Spam Conference which runs from March 27–28, 2008. read more »

How to Spam Proof your Email Marketing

Article discussing email marketing deliverability and how to ensure your email reaches the intended recipients. read more »

Orchestria: A Content Control Leader

Enterprise Security Tactics: E-Mail, Applications & Web Security

One-day conference discussing enterprise security tactics with particular reference to email, applications and web security. Located in Rosemont, Illinois, it runs on October 25, 2007.... read more »

CSP Summit Boston 2007: Driving Value Through Innovation – the Face of the New Collaboration Service Provider

Article announcing CSP Summit 2007 conference, for collaboration service providers. Located in Boston, it runs on October 29, 2007.... read more »

Infosecurity Europe 2008

Article announcing Infosecurity Europe 2008 conference. Located in London, England, it runs from April 22–24, 2008.... read more »

VerticalResponse Adds Most Powerful Tool since its Email Marketing Service Inception

VerticalResponse announced the release of a List Segmentation add-on to its service. Allows the creation of targeted mailing lists based on selected criteria from standard and custom database fields. Available immediately.... read more »

Cloudmark Announces Cloudmark Gateway for Hosted Messaging Providers

Cloudmark announced Gateway for Hosted Messaging Providers, its perimeter MTA. Key features: carrier grade scalability, flow control, and integrates with Cloudmark Authority, among others. Available immediately.... read more »

FaceTime Logs and Archives Instant Messages to deliver MiFID Regulation Compliance

Article discussing how FaceTime IMAuditor enables financial organizations to comply with the new Markets in Financial Instruments Directive (MiFID) that comes into effect November 1, 2007 within the EEC.... read more »

Esna technologies inc. converts Microsoft Outlook 2007 TM Collaboration software into a telephony, mobility and presence platform

Esnatech announced version 7.0 Service Pack 3 of Telephony Office-Linx, its unified communications solution. Adds support messaging, presence and mobility directly within Outlook 2007. Available October 2007.... read more »

Attensa Makes it Easy to Get Started with Enterprise 2.0 Managed RSS with Attensa Feed Server Virtual Appliance

Attensa announced a virtual appliance version of Attensa Feed Server, its solution for managing RSS feeds within the enterprise. Available immediately.... read more »

Presensoft IM Caller ID Unlocks New Business Opportunities with Major Breakthrough in Instant Messaging Security

Presensoft announced Presensoft IM Caller ID, its IM security solution. Prevents identity hijacking and guards against information leaks by authenticating both internal and external IM users. Available immediately.... read more »

Esna technologies inc. converts Microsoft Outlook 2007 TM Collaboration software into a telephony, mobility and presence platform

Esnatech announced version 7.0 Service Pack 3 of Telephony Office-Linx, its unified communications solution. Adds support messaging, presence and mobility directly within Outlook 2007. Available October 2007. read more »

CSP Summit Boston 2007: Driving Value Through Innovation – the Face of the New Collaboration Service Provider

Article announcing CSP Summit 2007 conference, for collaboration service providers. Located in Boston, it runs October 29, 2007. read more »

VerticalResponse Adds Most Powerful Tool since its Email Marketing Service Inception

VerticalResponse announced the release of a List Segmentation add-on to its service. Allows the creation of targeted mailing lists based on selected criteria from standard and custom database fields. Available immediately. read more »

Email Adds Confusion to Sunshine Laws

Open meeting laws, also known as “sunshine” laws, require that meetings held to discuss public business be open to the public. Exemptions exist in cases of security or privacy, and these are documented by each state. The purpose of sunshine laws is to allow the public to participate, or have access to, matters of public […]... read more »

What’s wrong with Instant Messaging? Part 1

Article discussing the growing security threats posed by the rise in IM usage, and how the IM development community is partly to blame. read more »

What’s wrong with Instant Messaging? Part 1

Article discussing the growing security threats posed by the rise in IM usage, and how the IM development community is partly to blame.... read more »

Yuuguu Transforms Web Collaboration and Conferencing Market

Yuuguu announced Yuuguu Collaboration Tools, its web collaboration solution. Key features: screen sharing, chat, and voice conferencing, among others. Available immediately.... read more »

Going Undercover in the Slimy World of Phishing

Article discussing the sale of phishing kits, and the ease with which they can be obtained. It goes on to detail the ease with which the author infiltrated the phishing community, the language used by phishers, and the various roles required to perpetrate a successful phishing scam.... read more »