E Mail Management At A Crossroad

1,784 views

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,784
On SlideShare
0
From Embeds
0
Number of Embeds
31
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

E Mail Management At A Crossroad

  1. 1. Ei+m. ir. ..r.1rl -l'Yl_l2fI. i*; EIl§lEJj‘_i7fI’; %I_i*_lit: _1" © Copyright Grey Consulting 2006. All rights reserved. :32: at Ci2_r'«; ‘1:‘! ;~r: jr'«; rzguil Maurene Caplan Grey Founder, Principal Analyst {Grey Consulting
  2. 2. Which Direction is “Right”? Ll © Copyright Grey Consulting 2006. All rights reserved. 6 reY Consult‘ ng
  3. 3. Addressing 2006 Challenges I Security threats: Pervasive and pernicious I Compliance: More mandates and more ambiguity I Infrastructure: Persistent stability and perpetual change I What you need to do now © Copyright Grey Consulting zoos. All rights reserved. @ reV Consulti ng
  4. 4. Addressing 2006 Challenges I Security threats: Pervasive and pernicious I Compliance: More mandates and more ambiguity I Infrastructure: Persistent stability and perpetual change I What you need to do now © Copyright Grey Consulting 2006. All rights reserved. € rey Consultj ng
  5. 5. phishing yam browser exploit "/ k}, social / ' ' engineering i‘ © Copyright Grey Consulting 2006. All rights reserved. W rms zero-hour l attacks intrusion malicious code Lomb1 s -71*‘ DOD xiv trojan horse ransomware (Grey Consulting
  6. 6. .. ,lfi, l£. _l, l.fCl§’I, l’f£t F”j§lflifl; I§: i.i(§J. l?é‘Ifi_: _ * ge; g;, @,/ e, "l L“ ‘ 3:: :4 -i, :;»- . e.r. *-‘g_A: .i L Z0 _ attacks , -mms, -0,, , l_l_l. .l, l£'. _L. l,l. _. r _l1r_l_Il~_. ., [1F—'_r _, ,l1l. ._l. r’. y moms spam man A. worms hofse . U ~ b"0Wsermali0‘° _ _DoD exp/ air code J » . e°’vq. _ ____ __ “Li W 7''- _. °’‘‘ An”. SMTP GW SMTP GWs ‘.30 . ... .,_. .. T/ ', Re€iPi9"t'5 sender's es E-Mail E-Mail zgxjl . -. / = (C s°“’°' One inbound SMTP s°"V°" / -_ " V, Gateway per domain _ :1 J5 Can be multiple outbound ~. : ""5 SMTP Gateways per domain © copyright Grey consulting zoos. All rights reserved. (G reV CO nsulti ng
  7. 7. Addressing 2006 Challenges I Security threats: Pervasive and pernicious I Compliance: More mandates and more ambiguity I Infrastructure: Persistent stability and perpetual change I What you need to do now © Copyright Grey Consulting 2006. All rights reserved. € rey Consultj ng
  8. 8. Information Management Is Not Sil -Driven El Privacy —r M! Informa ion ‘M __’__. :;’/ "E Civil Liberties Financials © copyright Grey consulting zoos. All rights reserved. E 7eV Consulti ng
  9. 9. Compliance Affects Everyone . « . .e ——-—’ / is ’ ' _/ If : u.—‘ ‘I _f<lZ/ A -/ I Regional _ : ‘5J—’( Public Sector ; —«/ I I V 1 National / T I’ / /I / H _v>_, .—"/ Y’ / Ill: ‘y-‘. ': 9 / _/'>/ Ill‘ ’ / “ >1‘ . ... ...5>r~’‘T . , Providers so -A? 3* I » I +<— — . lg” Employees s——- / _ J ‘K ' ‘ X IL / ‘-—’“ L—e, 'e-_ " / ‘7 7J_ _ Verticals -; "~ > my ->_<_¥ , . ____ _ xx ‘ ___, -l'r; — §_‘”’ , ,-» / ' _, ’ ‘L » Employers -'-_—""_f T“ s x I / ” : _i / »’: _f: -—-<. ___> , y‘ X*: .__ “‘ 7(/ .—— : _~ 1/ X >_: .'/ V'/ / Consumers X‘+C/ ___>: 1/ — I . __~__» f . © Copyright Grey Consulting 2006. All rights reserved. rey Consult] ng . __ / /X _> Ii _ __< ll / __, __| ::. ‘V. // I H . __ 7/’ Lb g_ Private Sector _/ / ,«~~—. .1 o a . x- / ’ / .-/ ~- / /.7/ II , _ in V' I/ »______ X / ” V---
  10. 10. Addressing 2006 Challenges I Security threats: Pervasive and pernicious I Compliance: More mandates and more ambiguity I Infrastructure: Persistent stability and perpetual change I What you need to do now © Copyright Grey Consulting 2006. All rights reserved. (Grey Consulting
  11. 11. How Much Can You Juggle? Reliability I © Copyright Grey Consulting 2006. All rights reserved. E rey Consultl ng
  12. 12. Strengthening the Foundation f: 'lIi_: I|L| l|li'II‘: «. ‘l"= .:lll FiIl‘~. l"l~. “~. ‘». Lower fl Reliability rco A A 0’ E-Mail Infrastructure Services © Copyright Grey Consulting 2006. All rights reserved. @ "eY Consult‘ ng
  13. 13. Addressing 2006 Challenges I Security threats: Pervasive and pernicious I Compliance: More mandates and more ambiguity I Infrastructure: Persistent stability and perpetual change I What you need to do now © copyright Grey Consulting 2006. All rights reserved. (Grey Consulting
  14. 14. What You Need To Do Now I Evaluate a technology’s ability to satisfy ° 1) business requirements 0 2) operational strength I Deploy extensible management technologies ° Messages come in many forms I Inventory points-of-failure ° They multiply © copyright Grey consulting zoos. All rights reserved. @ reV Consulti ng
  15. 15. For further information on this topic, contact Grey Consulting maurene. grey@grey—oonsuIting. com 845.531.5050 www. grey-consultingcom making messaging and collaboration work © copyright Grey consulting zoos. All rights reserved. @ reV Consulti ng

×