We're organizing the following webinars. If you would like to speak at any of them, or provide a speaker, please let us know. At this stage, we just need to know that you'd like to speak or provide a speaker; we do not need followup details such as speaker bio or picture. Contact Mona Cohen, mona.cohen@ferris.com. Unscheduled events will be scheduled once sufficient qualified speakers have been identified.
Title, Description | What Participants Learn | Date |
Hosted Exchange. Many organizations would like to outsource their email system. But, with the exception of individuals and small organizations, this hasn't happened. There have been technical challenges, such as slow WAN links and overly chatty client-server protocols, as well as organizational challenges. Now outsourcing Microsoft Exchange is becoming more practical. We discuss major offerings. | The main product/service options; product/service selection criteria; key trends; implementation tips | Nov 15, 2006 |
Emerging Messaging Technologies. Short presentations from interesting new firms with promising and innovative technology. Industry leaders and messaging managers comment on the technologies that have the greatest potential. | IT staff learn about new technologies; vendors learn what customers are looking for; investors learn about new opportunities | Nov 29, 2006 |
Email Encryption Implementation. Regulations compliance, along with vendor innovation, is reinvigorating IT investment in email encryption. We discuss the main implementation issues and how the technology is evolving. | Implementation issues; how email encryption is evolving | Dec 6, 2006 |
Email Archiving and Usage Policies. Many organizations are developing or revising their email archiving and usage policies. Messaging managers and industry consultants present their perspectives on effective policies. Topics include identifying resources for policy development, determining policy needs, implementation, communication, training, and monitoring. | Best practices; implementation tips | Dec 13, 2006 |
Sender Authentication. Sender authentication (or authorization) allows domain owners to publish information to help expose forged messages. It authenticates mail that legitimately comes from that domain. Industry leaders and messaging managers comment on the use of sender authentication. Topics include what the various authentication schemes are, how they work, their history, their future, how they assist with reputation services, how to choose which to use; how to implement on the sender side. | How to publish sender authentication information; how to use it to reduce spam | Jan 17, 2007 |
Emerging Messaging Technologies. Short presentations from interesting new firms with promising and innovative technology. Industry leaders and messaging managers comment on the technologies that have the greatest potential. | IT staff learn about new technologies; vendors learn what customers are looking for; investors learn about new opportunities | Feb 21, 2007 |
Email Disaster Recovery. Solutions are now becoming available to keep email going in the event of disasters, such as fires and earthquakes. We discuss the main product/service offerings and how the technology is evolving. | The main product/service options; product/service selection criteria; key trends; implementation tips | Mar 21, 2007 |
Phishing Control. Phishing control is now an important part of malware defense. We discuss how solutions are evolving. | The main product options; product selection criteria; key trends; implementation tips | TBD |
Email Archiving Product Shootout. In 30 minutes, several email archiving vendors concisely present their solution, its key strengths, and unique selling proposition(s). The remaining half hour is a Q&A session moderated and interpreted by a Ferris analyst. | The main differences between leading products | TBD |
Mass-Emailers/Email Campaign Managers. You can't use products like Exchange, Notes, or GroupWise to conduct volume emailings. Instead, you use special services or special products, sometimes known as email campaign managers. We discuss the various options and how they differ. | The main product/service options; product/service selection criteria; key trends; implementation tips | TBD |
Content Control. Regulations and policy compliance are driving a demand for technologies that scan emails, instant messages, HTTP flows, and other electronic content to ensure that information is used appropriately, for example, that intellectual property is kept within the organization and that resumes aren't sent to competitors. Here we're not concerned with malware control but rather the application of policy to information. Vendors are responding with innovative product offerings. We discuss what's happening. | The main product/service options; product/service selection criteria; key trends; implementation tips | TBD |
Email Statement Delivery. It's natural to send statements to customers by email. However, doing so has proved difficult, and most organizations have had to opt for the tactic of requiring customers to visit their website. We review the obstacles and the latest vendor offerings that provide for email statement delivery. | Current obstacles; the main product/service options; product/service selection criteria; key trends; implementation tips | TBD |
Message Store Search and Analysis. Email search has improved significantly over the last two years. It still has far to go. Today e-discovery and compliance are major drivers for investment. We discuss new capabilities for intelligently browsing through and reporting on large multi-user message stores. | The new capabilities; the main product/service options; how they'll evolve over the next five years | TBD |
SharePoint Competitors. SharePoint is stimulating significant interest in teamspace technology and is validating the marketplace. However, SharePoint is young and lacks many important features. SharePoint competitors briefly outline their offerings and explain their strengths compared with SharePoint. | Important SharePoint limitations; alternative teamspace solutions | TBD |
Miscellaneous Notes
- We normally have 3 or 4 speakers. Speakers speak for 5 to ten minutes each on the topic; then we have 30 minutes of Q&A.
- There is no charge to attend the webinars, which are aimed at IT staff and vendor product managers.
- We get at least 500 registrants.
- Vendors normally provide CTO-level or product management staff, customers, or members of their professional services team.
- IT support staff are welcome as speakers.
- Vendors are invited to help promote these events; information on all registrants coming in through a vendor's efforts is passed to the vendor concerned (and not to other vendors).
- There is no charge for speaking, but the speaker must be properly qualified and prepared.