AppRiver

AppRiver Nautical PlatformAppRiver’s Nautical platform makes all aspects of security service provision manageable from a “single pane of glass”. We look at the benefits.

For security service providers, or resellers wanting to break into the MSP space, there is a double challenge at hand: selecting solutions whose performance will delight their customers, yet that are easy enough to “drive” on a day-to-day basis to prevent margins being eaten away by costly management overheads.

This is why the appearance of AppRiver’s Nautical platform has set our antennae a-twitching. It promises a unified management console that enables service providers to deliver and manage a raft of cloud-based security solutions from one place, without the profit-sapping expense.

Here are just a few ways in which that could benefit service providers and their business.

The business benefits of Nautical, (1): Devolved management

Managing everything from under a “single pane of glass” is a seductive sell, but (I hear you say) doesn’t that just make for a crammed and complex window onto your world, which in turn drives management and admin costs up?

But Nautical turns this on its head, by enabling role-based interaction, so that different users each have different views of what is under the pane and can exercise different levels of control over it – and this includes the end-users themselves.

In this way, management workflows are made more targeted and efficient, but also flexibly devolved to customers where possible - taking even more of the admin burden off the service provider’s desk.

AppRiver Nautical Management
A single pane of glass, multiple kinds of access and interaction - cost reduction through targeted workflows and customer self-service (Click to enlarge)

The business benefits of Nautical, (2): Easy upscaling

Theoretically, cloud-delivered services can easily scale up to meet the needs of increasing numbers of end-users, thus supporting service providers’ revenue growth.

But critical to this process is the ease with which those new users can actually be brought on board. All the cloud service capacity in the world is no money-spinner if it is difficult, time-consuming and costly to connect users to it.

One of the killer new features in Nautical is a configurable user account management function that enables new users to be brought on board, and the overall user count to be increased, very easily.

Previously, this would have entailed multiple workflows in multiple environments; using Nautical, however, it is now a far simpler (and therefore cheaper) process.

AppRiver easy upscaling
More users, more usage, more revenue – and bringing them on board’s a cinch (Click to enlarge)

The business benefits of Nautical, (3): App-style agility and healthchecks

To go back to a previous point, bringing on additional users also inevitably drives demand for more products and services. Any service provider that delivers on the first point but not the second is painting themselves into a corner.

Nautical, however, makes it possible for both service providers and their customers to add and integrate new products and services with the kind of pick-and-mix agility you’d expect from something like an app store.

But (I again hear you ask) doesn’t that, in itself, create another management challenge – namely, monitoring all those disparate products and services without excessive (and expensive) manual intervention?

Here, too, Nautical comes up with the goods, thanks to its cross-product diagnostics that deliver a single, regular, unified application healthcheck to service providers’ customers and all the solutions they’re using.

Apps on demand
Apps on demand – and a unified monitoring and management system to keep them profitable (Click to enlarge)

What else should you know about Nautical?

Nautical has been described as “an entire channel programme in one portal”, but what’s really striking is that this deep integration across all aspects of security service provision comes at no charge.

Nautical simply becomes automatically available when a service provider chooses to deliver AppRiver’s security solutions – including anti-spam / anti-virus, web protection, email encryption, Exchange and mailbox protection – and this of course covers existing AppRiver service providers, too.

All in all, Nautical takes the hard work out of delivering MSP services that can really boost service providers’ bottom line, by making all business activities manageable from one place.

Now that really is something you should know.

McAfee Security

It’s getting to that time of year when thoughts turn to peace and goodwill, and we look to reward those who have worked hard and the customers who have stayed loyal.

Which is why the big bag of coal that McAfee has dropped in your Christmas stocking this year is an especially nasty surprise. For you and your customers alike.

McAfee – the situation

Here’s the Christmas story, McAfee-style.

Firstly, you buy MX Logic to strengthen your digital security portfolio. Then, you get bought by Intel. Then Intel drops your name. Then Intel says that it’s working on a comprehensive new security package, and promptly puts McAfee’s SaaS email security into end-of-life.

It’s the gift that keeps on giving. Because although the announcement was originally reported at the end of October, we’ve since learnt that many other security offerings (like Nuvotera, Spam Soap, Spambrella, etc.) were white-labelling McAfee’s service, so end-of-life becomes a potentially huge issue for all of them – and the end-users they serve.


“What does this mean for me and for my customers?”

In January 2016, Intel Security will stop selling McAfee SaaS Endpoint and SaaS Email Protection and Archiving, with the majority of subscriptions and support ending in 2017.  As this table shows, some limited support will continue for certain subscriptions until 2021.

Now, Christmas hangovers don’t usually come this early in the month, but rest assured that the decision to discontinue McAfee SaaS products represents one ho-ho-ho-hell of a headache for partners.

They must now identify new solutions and then go through entire deployment and provisioning processes all over again - just so their customers can keep the endpoint and email security that they’ve previously enjoyed.

They have to factor in the time it takes to learn new technology and user interfaces (this includes both internal and customer training), how pricing models will be affected, and what support they need to give and receive.


A frenetic festive season for McAfee users

Needless to say, all this is a massive annoyance to end-user customers, too.

Apart from all the usual pain associated with sudden business and technology platform change, across potentially hundreds or thousands of users, email security often gives rise to complex requirements around archiving - as explained in guides like this one – through which Intel has now successfully driven a sleigh and reindeers.

While customers’ email archiving will continue until their subscriptions’ expiry dates, new emails will no longer be archived after the subscription has expired.

Additionally, customers will only have six months to import their archived emails into their new platform, and any emails that have not been moved at that point will be permanently deleted.


What should partners do next?

If there’s a cheering undertone to this seasonal lament, it’s this: SaaS is an enduringly and increasingly popular delivery model for email, security, and archiving, and is not going away anytime soon.

Add to this the fact that there are other vendors that can provide similar security solutions, and my advice to partners seeking new solutions providers boils down to these basic points:

  • Security pedigree: How long has the solution provider been in business?  Are they security-focused (i.e. how much of their business does security represent? Do they seem distracted by other revenue streams?)
  • Reputation: Who do they partner with (e.g. software distributors) and what level of respect do those partners have in the security space? What do their partners say about them publicly? Will they let you speak with partner references privately? If not, why not?
  • Support: Can you access live customer support whenever needed, provided by employees of that company? If the support expertise is coming from somewhere else, is that support provider trained and qualified? Where’s the proof (certification)?
  • Commitment to the Channel: Does the vendor offer good margins, friendly terms, competitive pricing? Do they have proven relationships with distributors and other partners who can add value through automated management tools, MSP options, dedicated account managers?

Wanting to move quickly to transition your customers to viable alternatives, don’t end up choosing alternative vendors who aren’t truly viable.

(That would be turkeys voting for Christmas.)


“So where do I point my McAfee customers now?”

As a specialist security software distributor who’s been working with some of the world’s biggest security names for over 15 years - and some very agile newer ones, too - I’m ideally placed to consider the choices that your customers can make.

I’m not going to tell you that any one vendor is now the definitive star on the top of the Christmas tree. (Intel has hastily named Proofpoint as a quick fix for McAfee customers, and to me it smacks of expediency, rather than suitability).

But consider this: if a security vendor’s business was born in the cloud, and has been established almost as long as my own, I regard it as being worth a look.

If it offers 24/7 support, is capable of securing much more than just email, and has innovative pricing plans that means savings can be passed on to the end-users, it’s worth a look.

If it protects more than 8.5 million mailboxes for over 47,000 corporate clients worldwide, but is still prepared to give you and your customers a free trial to try it out for yourselves, it’s worth a look.

So do you want to keep the present under wraps until Christmas? Or do you want to be the one to bear early gifts to all those desperate McAfee customers? It’s your call, but ripping off the paper is as easy as this.

And the Three Wise Men? That’ll be the first three partners who click on the link above…

AppRiver logo largerversion

What is your plan to stay protected?

In December of 2012, Microsoft announced changes to the roadmaps of some of its security solutions. Those changes included an announcement of the end of life for Forefront Protection 2010 for Exchange Server (FPE). Microsoft stopped offering the FPE product in 2012, but committed to supporting FPE subscriptions through December 31, 2015. Subscriptions expiring before December 31, 2015 will not be renewed. That means virus updates and signatures will not be made available after this date and the service will end. Are you ready?

AppRiver SecureTide as an alternative to Forefront

We recommend every company currently using Forefront on an Exchange server to review their licenses to find out when they expire. Then contact our Phenomenal Care team at AppRiver and discuss SecureTide™ spam and virus filtering as an alternative solution for your company. Our team will review every case and provide multiple migration options, from buy-out programs to migration support. We will make the transition as seamless and painless as possible for your users.

Switch now to AppRiver SecureTide and benefit from:

  • Real-time protection from today's IT threats
  • Simple implementation
  • No hardware or software installation
  • Inbound and outbound email protection
  • Daily Held Spam Reports
  • Disaster email recovery service included*
  • 99-percent effectiveness in blocking spam and viruses
  • Phenomenal Care™, 24 hours a day, every day

Want to know more about AppRiver solutions? Contact our sales team today on 0118 9898 222 and they’ll help with your queries or arrange a free trial.

In preparation for print (CMYK and RGB), the greens and blues were edited. These would need to be extracted (icons and their color adjustment layers) from 175032_8_R3.psd, the schawk master.

Originally posted on the AppRiver Blog

Researcher David Leo of Deusen.co.uk has announced a proof of     concept vulnerability that was active, until recently, in both Chrome and Safari browsers that allows attackers to spoof legitimate URLs in their address bar while taking web surfers to a completely different site.

Chrome has since patched this vulnerability, but Safari has not. This leaves all devices that rely on the Safari browser vulnerable to this exploit. This includes current Macs running OSX, iPhones and iPads.

This exploit works by running a quick and tiny code snippet in the browser when a supposed legitimate link is provided to end users. The actual “legitimate link” is requested and the browser begins to head in that direction, however before it can, the exploit redirects the browser to the false destination. The original URL destination remains in the address bar, making it appear as though the user has ended up at the legitimate site. The code is very simple and very light weight making it possibly very enticing to those who would like to offer up a very convincing phishing attack.

Through spoofing, attackers already utilize legitimate sites and news stories to make their attacks more convincing, usually by stealing graphics and headlines. A couple of safety precautions, or things to look out for in these attacks, would be to mouseover the link provided to make sure it was pointing where it says it is pointed. Otherwise ending up at a destination that was not advertised is another bright red flag. However in this style of attack, everything would simply appear normal and correct on the surface.

Here's an example of the code that executes this exploit:

safair

This particular PoC attack makes the user believe they are headed to the news site dailymail.co.uk, however the hidden redirect takes viewers back to the research page on www.deusen.co.uk while maintaining dailymail.co.uk in the address bar.

To test this exploit out on your system, David Leo has provided a test page to see if you are a potential victim located here:  http://www.deusen.co.uk/items/iwhere Simply press “Go” and if Dailymail shows in your address bar, you are still vulnerable to this attack and are encouraged to be extra careful while browsing the internet or following links within emails from unexpected sources.

AppRiver provide email & web security solutions, helping businesses to communicate securely and protect their networks from malicious web content. Contact our sales team on 0118 9898 222 to learn more about AppRiver solutions.

 

selective swip 1

 

 

 

 

Originally published by AppRiver

New Mobile Device Management (MDM) features are coming home to AppRiver Office 365 Plus, including the ability to selectively wipe mobile devices. Selective wipe of mobile units allows an administrator to revoke access to and delete corporate email that has been synced to a device, as well as specific data associated with Office 365 apps on the device, while retaining any unassociated personal data.

admin 1

Selective wipe will work across a diverse range of phones and tablets, including iOS, Android and Windows Phone devices and is included at no additional cost for all AppRiver Office 365 Plus plans. The addition of the selective wipe capability and MDM features listed below to the already robust Office 365 Plus arsenal ensures that your Office 365 experience remains easy, effective and affordable

mobile device management 1

Mobile Device Management options include:

Selective wipe

Ability to perform either a full remote wipe of a corporate smartphone or tablet or a selective wipe of Office 365 company data from an employee’s device while leaving any personal data in place.

Conditional access

Set up security policies to ensure that Office 365 corporate email and documents can be accessed only on phones and tablets that are managed by your company and that are compliant with your IT policies.

Device management

Set and manage security policies, such as device-level pin lock and jailbreak or root detection, to help prevent unauthorized users from accessing corporate email and data on a lost or stolen device. 

Mobile Device Management Options introduced to AppRiver Office 365 Plus

Cloud-based management for devices that run on iOS (iPhone, iPad), Android and Windows Phone will be supported and the roll out for these capabilities will be completed in 4-6 weeks. All features will be included with all AppRiver Office 365 Plus and bundle licenses.

Contact our Sales Team today on  0118 9898 222 to find out more about Office 365

comptia-logo

The managed service best practice offerings template is intended to provide a list of the most common offerings that are currently being deployed by newly formed managed service practices.

The list has been developed based on the experience of IPED consultants, research conduct with numerous channel partners and direct discussions with partners that have successfully built an MSP practice. Although the customer offerings vary from MSP to MSP, most of the solution providers that have built a successful MSP practice have started their practice with one or more of a variety of managed services.  You can read the CompTIA Managed Service Best Practice Offerings study here.

Need more help with finding the right solutions for your MSP business? Call our sales team today on 0118 9898 222.

 

 

AppRiver logo largerversion

Infosecurity Europe will take place on 2nd June 2015 and we’d like you to join us for our short Email Security and Migrations Workshop, on the same day, at Hilton London Olympia, (near Infosecurity – London Olympia) from 11.30am to 3.30 pm. Can’t attend the whole event? That’s ok, you can drop-in to the Workshop at a time suitable for you, where we’ll also provide you with lunch. At the event, you’ll be able to:

  • Have a hands-on demo of email encryption, file sharing, tracking and DLP technology and how it can be applied to solve daily problems for organisations.
  • Try Hosted Exchange and Office 365 migration with BitTitan.
  • See how email archiving works with Global Relay.

You’ll also meet AppRiver product specialists, who will answer any questions about keeping businesses secure and how to provide added value solutions to your customers and increasing their satisfaction levels. The Blue Solutions team will be available to discuss pricing and the contact details of our team. We’re also going to enter all attendees into our prize draw to win an iPad, so we hope you’ll take this opportunity to win the prize! As the event will be by invitation only, please follow this link to register your interest and then we’ll send you an invite at a later stage. We hope to see you at our event.

Yes reserve my space

AppRiver logo largerversion

Article published on the AppRiver Blog

Google continues to phase out Postini services in favor of the Google Apps platform.  Consequently, we continue to receive requests to migrate Postini filtering accounts to SecureTide by AppRiver.  In this post, we will discuss the process through which your Postini mailboxes and settings can be easily migrated to SecureTide.

To export all mailbox senders lists (approved and blocked), as well as the associated settings, you will need to follow some simple steps both to retrieve the data and to prepare it for our  Support team will assist you during the migration to SecureTide.  After the data is in place, we’ll help you change your MX records to redirect your mail through our data centers.  Once the process is complete, your domains, mailboxes, approved senders and blacklists will be available through the Customer Portal and your spam and malware will be captured in our quarantine areas.

To export Postini mailboxes and settings, follow these simple steps:

1.  Export Mailboxes and Aliases

Exporting the complete set of data is a two-step process that produces two separate source files.  The first file to be exported contains mailboxes along with their aliases:

  • In the Postini interface, go to Orgs and Users > Orgs.
  • Click on the domain you wish to export. (For this example, we will use domain.com as shown in Figure 1.

Figure 1.  Select Domain

  • In Organization Management, note the Organization ID number located in the Settings section (see Figure 2).

 

Figure 2.  Note the Organization ID Number

 

  • Select the Batch link at the top of the page, enter the following command into the Manual Input field (see Figure 3), using the Organization ID number noted previously as the value for targetOrg and complete the on-screen instructions:

listusers ALL, targetOrg=1000012345, childorgs=1, fields=PRIMARY_ADD|ADDRESS, aliases=1, sort=primary_add:nd

Figure 3.  Export Aliases from Postini using the Batch Command

  • Select the batch results, copy and paste the data and save as a text file called domain.com_alias.txt.

2.  Export Approved/Blocked Senders Lists

Continue as follows to export all associated Approved/Blocked Senders Lists:

  • Go to Orgs and Users > Users.
  • Choose the top Account-level org from the Choose Org list.
  • Click the Download Users/Settings link as shown in Figure 4.

Figure 4.  Export Approved/Blocked Senders List

  • Select the Batch results, copy and paste the data from the popup window and save the data as a text file called domain.com_Users_Settings.txt.
  • The exported data will contain such information as the # address, user_id, junkmail_filter to set email filtering active, category filtering levels, virus scanning settings, approved_senders, approved_recipients, blocked_senders, as well as other available inbox settings (see Figure 5).

Postini Exported Settings Shown

3.  Provide data to AppRiver for Migration

Now that you have all data exported into two separate files, send both files to support@bluesolutions.co.uk.  Our support team will import your data to our platform and provide a walkthrough on AppRiver’s SecureTide service.

Call our sales team on 0118 9898 222 for more information about AppRiver secure email messaging solutions.

AppRiver logo largerversion

 

Article published by AppRiver

With the release of iOS 8.2, Apple fixed the “GMT bug” that caused dual time zones to display in Calendar events. It is possible to edit and fix your individual calendar events that were displaying dual time zones in your iPhone or iPad’s Calendar after receiving the iOS 8.2 software update. This is a huge improvement over the previous iOS update, but you may have hundreds of events added to your calendar before the update that are still displaying the second time zone.

There is a method to remove the existing second time zones in bulk described by user JG in SB in Apple Support Communities forum that we were able to replicate, and tested with success even after the update to iOS 8.2.

Removing the second time zone from all events created prior to the update can be accomplished by performing these steps as follows:

1. From the Home screen tap Settings.

image1

2. In the Settings app tap Mail, Contacts, Calendars.

image2

3. Tap the Exchange email account

image3

4. Toggle Calendars synchronization Off by sliding the dialer from right to left (green to white)

image4

5. Tap Delete from My iPhone to delete all existing Exchange calendar appointments. These events are backed up with Exchange.

image5

6. Check the Calendar app to confirm all of the old events are deleted from the device then turn Calendars sync back on in the Settings.

image6

This should reload all of the Exchange calendar events from the server back to the iPhone without the second time zone displayed in the previous version.

Click here to view the original post detailing the “GMT Bug” displaying dual time zones in Calendar events.

Want to find out more about AppRiver solutions for your business? Contact our Sales Team today on 0118 9898 222.

AppRiver logo largerversion

 

 

 

Article contributed by AppRiver

A common question that's often discussed when migrating customers to AppRiver Secure Hosted Exchange or Office 365, is understanding the differences between public folders and shared mailboxes and when to use each one. If that wasn’t creating enough confusion, site mailboxes were recently introduced to combine SharePoint’s resource sharing features with emails and conversations processed by Exchange. So this post will explain in a simple manner the differences between each option and when each can best be used to meet each requirement.

Public Folders
Public folders are designed for shared access and provide an easy and effective way to collect, organize, and share information with other people in your workgroup or organization. Public folders can also be used as an archiving method for distribution groups. When you mail-enable a public folder and add it as a member of the distribution group, email sent to the group is automatically added to the public folder for later reference. Main features are:

  • Public folders are stored in Exchange.
  • Public folders work well for enterprises with older versions of Office still deployed as well as brand new deployment.
  • Documents stored in Exchange don’t have the benefits of SharePoint document libraries (e.g. workflows, version control, metadata, etc.) and aren’t visible within SharePoint.
  • A common option used with public folders is to set an email account that will rout all incoming traffic to a public folder for a shared access.

Note: Office 365 has increased the limit on the number of public folders available to 250,000 folders.

Shared Mailboxes
Shared mailboxes make it easy for a specific group of people to monitor and send email from a common account, like public email addresses, such as sales@appriver.com or info@appriver.com. When a person in the group replies to a message sent to the shared mailbox, the email appears to be from the shared mailbox, not from the individual user. Shared mailboxes are a great way to handle customer email queries because several people in your organization can share the responsibility of monitoring the mailbox and responding to queries. Your customer queries get quicker answers, and related emails are all stored in one mailbox. Main features are:

  • Shared mailboxes provide a generic email address that can be used to send emails to a team.
  • Access to shared mailboxes is set under Exchange permissions.
  • Allows multiple users within an organization to monitor and reply to an email.
  • Reply email address is the shared mailbox address.

Site Mailboxes
A site mailbox can be used from a SharePoint team site to store and organize team email. It can also be used from Outlook 2013 (included with Office 365 ProPlus or Office Professional Plus) for team email, and as a way to quickly store attachments and retrieve documents from the team site. Main features are:

  • Emails are stored in Exchange.
  • Site mailbox is an app that you add to your SharePoint site.
  • It’s important to pick the right naming since once you have created a site mailbox, you can’t change its email address.
  • Invoking the site mailbox is done by cc’ing the email address of the site mailbox.
  • You can add folders from your site mailbox to your outlook favorites so that it is directly visible in Outlook.
  • When viewing a site mailbox from outlook, both email and documents are visible.
  • You can add documents by attaching them to an email message.
  • Security is driven by SharePoint team site permissions.
  • Integrates with Outlook and can be also accessed through the Office 365 web app.

Still have questions about your mailboxes? Contact our sales team on 0118 9898 222 for help with finding a solution to manage your mailboxes securely.