SlideShare a Scribd company logo
1 of 2
Download to read offline
Policy Driven Control of Unstructured Content




                                    Trusted Edge ICE for Microsoft
                                    Outlook Web Access (OWA)
                                    Many corporations have a large population of remote users who access
                                    their corporation Microsoft Exchange mail via Microsoft Outlook Web
                                    Access (OWA) when not connected to the network and accessing the
                                    enterprise through the internet.
Highlights:
                                    Policy Driven Control
  Classification of Records at
                                    Trusted Edge lets the enterprise quickly define and implement its docu-
  creation
                                    ment retention and filing policies and refine those policies over time.
  Manage all document copies,       The Trusted Edge Information Classification Engine (ICE) Suite re-
  in-place, wherever they reside
                                    duces corporate risk by ensuring that those documents that need to be
  on the corporate network from
  creation through destruction      preserved are retained according to corporate policy, and that at end-
                                    of-life, all copies of expired documents are disposed.
  Email and Document branding
  and filing
  Centralized policy manage-        Problem:
  ment                              Lack of control on OWA created emails.
  Comprehensive application-
  independent document cap-         Solution:
  ture                              Manage OWA centric emails remotely according to corporate retention
  Litigation Hold—flag individual   policies.
  records or entire computers as
  “Under Litigation” using poli-
  cies that will prevent the        How:
  modification and deletion of        Centrally managed classification and filing policies.
  documents
                                      Simple interactive classification of emails on send or read.
  Seamless online and offline
  operation                           Classification is branded within the email.
  Digital Disposal—digitally          Emails are managed remotely until the end user logins back into the
  shred documents on desktops,      network and all email branded asset meta data are synchronized with
  laptops and file servers once     the TE Administrative server.
  their retention has expired         Enforcement of “Litigation Holds” on desktop for emails.
  within the repository
                                      All copies of emails are disposed according to retention policy.
 How to Contact Us
 FileTek, Inc
 9400 Key West Avenue
 Rockville, MD 20850
 Phone 301.251.0600
 Email info@filetek.com
 Web www.trustededge.com


                                                       www.trustededge.com
Policy Driven Control of Unstructured Content




Server Features:
  Centralized Policy Management

  Metadata Database

  Reporting, Analytics and Forensics

  Heterogeneous Infrastructure Sup-
  port



Desktop Client Features:
  Comprehensive and Application
  Independent Document and Email
  Capture

  Interactive and Automated
  Classification

  Intelligent Filing

  Digital Disposal

  Litigation Hold




  FileTek, Inc
  9400 Key West Avenue
  Rockville, MD 20850
  Phone 301.251.0600
  Email info@filetek.com
  Web ww.trustededge.com
                                                                        (C) 2008 FileTek, Inc.


                                          www.trustededge.com

More Related Content

What's hot

Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionRobert Crane
 
20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records ManagersJesse Wilkins
 
One name unify them all
One name unify them allOne name unify them all
One name unify them allBizTalk360
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarJohn Lewis
 
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud	SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud Adam Levithan
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
 
Seclore Decrypter For Email
Seclore Decrypter For EmailSeclore Decrypter For Email
Seclore Decrypter For EmailSeclore
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityInnoTech
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Radhakrishnan Govindan
 
Security In Web Conferencing
Security In Web ConferencingSecurity In Web Conferencing
Security In Web Conferencingpchen
 
Enterprise File Fabric for Genomics
Enterprise File Fabric for Genomics Enterprise File Fabric for Genomics
Enterprise File Fabric for Genomics Hybrid Cloud
 
Azure information protection_datasheet_en-us
Azure information protection_datasheet_en-usAzure information protection_datasheet_en-us
Azure information protection_datasheet_en-usKjetil Lund-Paulsen
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveDavid J Rosenthal
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityDavid J Rosenthal
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementRiwut Libinuko
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend
 

What's hot (20)

Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud	SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
SpTechCon OneDrive Success Part 1: Planning the Leap to the Cloud
 
Azure information protection
Azure information protectionAzure information protection
Azure information protection
 
Seclud it polesc_sjuly7
Seclud it polesc_sjuly7Seclud it polesc_sjuly7
Seclud it polesc_sjuly7
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Seclore Decrypter For Email
Seclore Decrypter For EmailSeclore Decrypter For Email
Seclore Decrypter For Email
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your Identity
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Security In Web Conferencing
Security In Web ConferencingSecurity In Web Conferencing
Security In Web Conferencing
 
EAGLEYE Data Sheet
EAGLEYE Data SheetEAGLEYE Data Sheet
EAGLEYE Data Sheet
 
Enterprise File Fabric for Genomics
Enterprise File Fabric for Genomics Enterprise File Fabric for Genomics
Enterprise File Fabric for Genomics
 
Azure information protection_datasheet_en-us
Azure information protection_datasheet_en-usAzure information protection_datasheet_en-us
Azure information protection_datasheet_en-us
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDrive
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights Management
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
InfoFort enVision.PDF
InfoFort enVision.PDFInfoFort enVision.PDF
InfoFort enVision.PDF
 

Viewers also liked

Viewers also liked (7)

CAR Email 3.20.03 (d)
CAR Email 3.20.03 (d)CAR Email 3.20.03 (d)
CAR Email 3.20.03 (d)
 
Renee's Assessment Philosophy
Renee's Assessment PhilosophyRenee's Assessment Philosophy
Renee's Assessment Philosophy
 
2009: In de war / uit de kilte vooruitblik 2013 ev
2009: In de war / uit de kilte vooruitblik 2013 ev2009: In de war / uit de kilte vooruitblik 2013 ev
2009: In de war / uit de kilte vooruitblik 2013 ev
 
Gulf News - Article
Gulf News - ArticleGulf News - Article
Gulf News - Article
 
Popup quiz1 a
Popup quiz1 aPopup quiz1 a
Popup quiz1 a
 
Indian Express August 12, 2009
Indian Express August 12, 2009Indian Express August 12, 2009
Indian Express August 12, 2009
 
CAR Document CEI Petition
CAR Document CEI PetitionCAR Document CEI Petition
CAR Document CEI Petition
 

Similar to Trusted Edge Ice For Owa 2009

Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009Alexis Brown
 
Trusted Edge Ice For Microsoft Share Point 2009
Trusted Edge Ice For Microsoft Share Point 2009Trusted Edge Ice For Microsoft Share Point 2009
Trusted Edge Ice For Microsoft Share Point 2009Alexis Brown
 
Trusted Edge Ice For Content Addressable Storage
Trusted Edge Ice For Content Addressable StorageTrusted Edge Ice For Content Addressable Storage
Trusted Edge Ice For Content Addressable StorageAlexis Brown
 
Trusted Edge Ice For Retention Managed Email
Trusted Edge Ice For Retention Managed EmailTrusted Edge Ice For Retention Managed Email
Trusted Edge Ice For Retention Managed EmailAlexis Brown
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Private Cloud
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
 
Jsp Presentation Ev Trusted Edge Final 3 13 09
Jsp Presentation Ev Trusted Edge Final 3 13 09Jsp Presentation Ev Trusted Edge Final 3 13 09
Jsp Presentation Ev Trusted Edge Final 3 13 09Alexis Brown
 
The new office 365
The new office 365The new office 365
The new office 365Allan Bury
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express finalDataExpress
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express finalDataExpress
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptxkovec2684
 
Restore brochure optimising document management through technology
Restore brochure optimising document management through technologyRestore brochure optimising document management through technology
Restore brochure optimising document management through technologyNicola (Grice) Tatters
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonJoel Oleson
 
Enterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataEnterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataSoftControl.net Ltd.
 
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...ILYA ROITMAN
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory ProposalMJ Ferdous
 
Microsoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterMicrosoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterDavid J Rosenthal
 

Similar to Trusted Edge Ice For Owa 2009 (20)

Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009Trusted Edge Ice For Desktop Documents 2009
Trusted Edge Ice For Desktop Documents 2009
 
Trusted Edge Ice For Microsoft Share Point 2009
Trusted Edge Ice For Microsoft Share Point 2009Trusted Edge Ice For Microsoft Share Point 2009
Trusted Edge Ice For Microsoft Share Point 2009
 
Trusted Edge Ice For Content Addressable Storage
Trusted Edge Ice For Content Addressable StorageTrusted Edge Ice For Content Addressable Storage
Trusted Edge Ice For Content Addressable Storage
 
Trusted Edge Ice For Retention Managed Email
Trusted Edge Ice For Retention Managed EmailTrusted Edge Ice For Retention Managed Email
Trusted Edge Ice For Retention Managed Email
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services Whitepaper
 
Overview of Microsoft Exchange Online
Overview of Microsoft Exchange OnlineOverview of Microsoft Exchange Online
Overview of Microsoft Exchange Online
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
Jsp Presentation Ev Trusted Edge Final 3 13 09
Jsp Presentation Ev Trusted Edge Final 3 13 09Jsp Presentation Ev Trusted Edge Final 3 13 09
Jsp Presentation Ev Trusted Edge Final 3 13 09
 
Vaultize corp three-pager v14
Vaultize corp three-pager v14Vaultize corp three-pager v14
Vaultize corp three-pager v14
 
The new office 365
The new office 365The new office 365
The new office 365
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
 
Restore brochure optimising document management through technology
Restore brochure optimising document management through technologyRestore brochure optimising document management through technology
Restore brochure optimising document management through technology
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
Share Point Server Security with Joel Oleson
Share Point Server Security with Joel OlesonShare Point Server Security with Joel Oleson
Share Point Server Security with Joel Oleson
 
Enterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing dataEnterprise solution for backup, access and sharing data
Enterprise solution for backup, access and sharing data
 
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...CloudControl - Enterprise backup, access and collaboartion solution from Soft...
CloudControl - Enterprise backup, access and collaboartion solution from Soft...
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory Proposal
 
Microsoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterMicrosoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite Poster
 

Trusted Edge Ice For Owa 2009

  • 1. Policy Driven Control of Unstructured Content Trusted Edge ICE for Microsoft Outlook Web Access (OWA) Many corporations have a large population of remote users who access their corporation Microsoft Exchange mail via Microsoft Outlook Web Access (OWA) when not connected to the network and accessing the enterprise through the internet. Highlights: Policy Driven Control Classification of Records at Trusted Edge lets the enterprise quickly define and implement its docu- creation ment retention and filing policies and refine those policies over time. Manage all document copies, The Trusted Edge Information Classification Engine (ICE) Suite re- in-place, wherever they reside duces corporate risk by ensuring that those documents that need to be on the corporate network from creation through destruction preserved are retained according to corporate policy, and that at end- of-life, all copies of expired documents are disposed. Email and Document branding and filing Centralized policy manage- Problem: ment Lack of control on OWA created emails. Comprehensive application- independent document cap- Solution: ture Manage OWA centric emails remotely according to corporate retention Litigation Hold—flag individual policies. records or entire computers as “Under Litigation” using poli- cies that will prevent the How: modification and deletion of Centrally managed classification and filing policies. documents Simple interactive classification of emails on send or read. Seamless online and offline operation Classification is branded within the email. Digital Disposal—digitally Emails are managed remotely until the end user logins back into the shred documents on desktops, network and all email branded asset meta data are synchronized with laptops and file servers once the TE Administrative server. their retention has expired Enforcement of “Litigation Holds” on desktop for emails. within the repository All copies of emails are disposed according to retention policy. How to Contact Us FileTek, Inc 9400 Key West Avenue Rockville, MD 20850 Phone 301.251.0600 Email info@filetek.com Web www.trustededge.com www.trustededge.com
  • 2. Policy Driven Control of Unstructured Content Server Features: Centralized Policy Management Metadata Database Reporting, Analytics and Forensics Heterogeneous Infrastructure Sup- port Desktop Client Features: Comprehensive and Application Independent Document and Email Capture Interactive and Automated Classification Intelligent Filing Digital Disposal Litigation Hold FileTek, Inc 9400 Key West Avenue Rockville, MD 20850 Phone 301.251.0600 Email info@filetek.com Web ww.trustededge.com (C) 2008 FileTek, Inc. www.trustededge.com