This webinar addresses how a cloud email archiving solution can help you formulate a sound retention policy, protect all your email data and keep you away from the stinging costs of data breach.
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTIEryk Budi Pratama
UU No 27 Tahun 2022 tentang Pelindungan Data Pribadi (“UU PDP”) telah disahkan pada bulan Oktober 2022 dan saat ini telah memasuki masa tenggang. Ketiadaan peraturan teknis / turunan membuat banyak organisasi masih ragu dalam menetapkan arah dan mengimplementasikan UU PDP sesuai dengan peraturan perundang-undangan yang berlaku. Salah satu aspek penting dalam UU PDP adalah terkait penunjukan Pejabat/Petugas yang melaksanakan fungsi Pelindungan Data Pribadi (PPDP) atau Data Protection Officer (DPO) seperti yang diamanatkan oleh UU PDP Pasal 53 dan 54.
Melalui Keputusan Menteri Ketenagakerjaan Republik Indonesia Nomor 103 Tahun 2023 tentang Penetapan Standar Kompetensi Kerja Nasional Indonesia Kategori Informasi dan Komunikasi Golongan Pokok Aktivitas Pemrograman, Konsultasi Komputer dan Kegiatan yang Berhubungan dengan Itu (YBDI) Bidang Keahlian Pelindungan Data Pribadi yang ditetapkan pada tanggal 23 Juni 2023, maka standar kompetensi PPDP/DPO telah sah untuk dapat dijadikan rujukan dalam menentukan kompetensi SDM, kebutuhan rekrutmen, pelatihan, dan sertifikasi terkait dengan Pelindungan Data Pribadi.
Ringkasan Standar Kompentensi / SKKNI Pelindungan Data Pribadi ini disusun untuk memudahkan masyarakat dalam memahami secara ringkas 4 Fungsi Kunci, 8 Fungsi Utama, dan 19 Fungsi Dasar yang telah disusun oleh Tim Perumus dan Kementerian Komunikasi dan Informatika Republik Indonesia, serta disahkan oleh Menteri Ketenagakerjaan Republik Indonesia. Semoga ringkasan SKKNI PDP ini dapat bermanfaat dan memberikan panduan secara ringkas tidak hanya perihal kompetensi PPDP/DPO, namun juga hal-hal yang dapat dilakukan oleh organisasi dalam menerapkan Program Pelindungan Data Pribadi.
Salam,
Eryk Budi Pratama, CIPM, CIPP/E, FIP
Chairman - Institute of Digital Trust Indonesia (IODTI)
Tim Perumus SKKNI Pelindungan Data Pribadi
Tim Perumus Rancangan Peraturan Pemerintah Pelindungan Data Pribadi (“RPP PDP”)
eryk@digitaltrustid.org
How to Implement Data Governance Best PracticeDATAVERSITY
Data Governance Best Practice is defined as basis and guidelines for suggested governing activities. Organizations define best practices to be used as a point of comparison when determining their readiness, willingness and actions necessary to put a Data Governance program in place. But what are the best practices and how can they be implemented? This webinar will address these questions and more.
In this RWDG webinar, Bob Seiner will talk about how to create, validate, assess and implement Data Governance Best Practice with immediate impact on present and future Data Governance activities. The result of a Best Practice assessment is a thorough actionable plan focused on demonstrating value from your Data Governance program.This webinar will cover:
• Two Criteria for Data Governance Best Practice Development
• How to Assess against Best Practice to Build Program Success
• Examples of Industry Selected DG Best Practice
• How to Communicate DG Best Practice in a Non-Threatening Way
• How to Build DG Best Practice into Daily Operations
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
In 2016, the European Union (EU) approved its General Data Protection Regulation (GDPR) to protect European citizens’ data. As a regulation, the GDPR does not require the implementation of legislation, and will immediately become an applicable law as of the 25th of May, 2018.
What is GDPR exactly trying to accomplish? According to the official documents, the goal is the “protection of natural persons with regard to the processing of personal data and on the free movement of such data.”
In short, organizations that conduct business in the EU will need to be compliant with GDPR, and must come to terms with the huge fines that non-compliance can carry. Fines can be up to €20M or 4% of the annual turnover. For companies that experience breaches that result in the loss of personal data (such as Talk Talk, which lost 170,000 people’s data), the fines will be tremendous.
Join us for discussion about GDPR to learn more about:
The principles that organizations that use personal data need to adhere to
The consequences organizations can face if that do not adhere to this new regulation
How your organization can prepare for the future
My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall.Jerimi Soma
(Remarks) This presentation is not affiliated with any company I have been associated with, either now or in the past. Additionally, no copyrights have been violated. However, I cannot guarantee the accuracy of this information, and it may be subject to updates.
ISO27001:2022 must be applied to the organizations before October 2025 if your organization has currently certified with the previous version; 2013 !
ISO 20000-1 has been updated to version 2018. Learn about common terms and definitions, tips on preparing a transition plan, and what to if you are already certified for ISO 20000-1
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTIEryk Budi Pratama
UU No 27 Tahun 2022 tentang Pelindungan Data Pribadi (“UU PDP”) telah disahkan pada bulan Oktober 2022 dan saat ini telah memasuki masa tenggang. Ketiadaan peraturan teknis / turunan membuat banyak organisasi masih ragu dalam menetapkan arah dan mengimplementasikan UU PDP sesuai dengan peraturan perundang-undangan yang berlaku. Salah satu aspek penting dalam UU PDP adalah terkait penunjukan Pejabat/Petugas yang melaksanakan fungsi Pelindungan Data Pribadi (PPDP) atau Data Protection Officer (DPO) seperti yang diamanatkan oleh UU PDP Pasal 53 dan 54.
Melalui Keputusan Menteri Ketenagakerjaan Republik Indonesia Nomor 103 Tahun 2023 tentang Penetapan Standar Kompetensi Kerja Nasional Indonesia Kategori Informasi dan Komunikasi Golongan Pokok Aktivitas Pemrograman, Konsultasi Komputer dan Kegiatan yang Berhubungan dengan Itu (YBDI) Bidang Keahlian Pelindungan Data Pribadi yang ditetapkan pada tanggal 23 Juni 2023, maka standar kompetensi PPDP/DPO telah sah untuk dapat dijadikan rujukan dalam menentukan kompetensi SDM, kebutuhan rekrutmen, pelatihan, dan sertifikasi terkait dengan Pelindungan Data Pribadi.
Ringkasan Standar Kompentensi / SKKNI Pelindungan Data Pribadi ini disusun untuk memudahkan masyarakat dalam memahami secara ringkas 4 Fungsi Kunci, 8 Fungsi Utama, dan 19 Fungsi Dasar yang telah disusun oleh Tim Perumus dan Kementerian Komunikasi dan Informatika Republik Indonesia, serta disahkan oleh Menteri Ketenagakerjaan Republik Indonesia. Semoga ringkasan SKKNI PDP ini dapat bermanfaat dan memberikan panduan secara ringkas tidak hanya perihal kompetensi PPDP/DPO, namun juga hal-hal yang dapat dilakukan oleh organisasi dalam menerapkan Program Pelindungan Data Pribadi.
Salam,
Eryk Budi Pratama, CIPM, CIPP/E, FIP
Chairman - Institute of Digital Trust Indonesia (IODTI)
Tim Perumus SKKNI Pelindungan Data Pribadi
Tim Perumus Rancangan Peraturan Pemerintah Pelindungan Data Pribadi (“RPP PDP”)
eryk@digitaltrustid.org
How to Implement Data Governance Best PracticeDATAVERSITY
Data Governance Best Practice is defined as basis and guidelines for suggested governing activities. Organizations define best practices to be used as a point of comparison when determining their readiness, willingness and actions necessary to put a Data Governance program in place. But what are the best practices and how can they be implemented? This webinar will address these questions and more.
In this RWDG webinar, Bob Seiner will talk about how to create, validate, assess and implement Data Governance Best Practice with immediate impact on present and future Data Governance activities. The result of a Best Practice assessment is a thorough actionable plan focused on demonstrating value from your Data Governance program.This webinar will cover:
• Two Criteria for Data Governance Best Practice Development
• How to Assess against Best Practice to Build Program Success
• Examples of Industry Selected DG Best Practice
• How to Communicate DG Best Practice in a Non-Threatening Way
• How to Build DG Best Practice into Daily Operations
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
In 2016, the European Union (EU) approved its General Data Protection Regulation (GDPR) to protect European citizens’ data. As a regulation, the GDPR does not require the implementation of legislation, and will immediately become an applicable law as of the 25th of May, 2018.
What is GDPR exactly trying to accomplish? According to the official documents, the goal is the “protection of natural persons with regard to the processing of personal data and on the free movement of such data.”
In short, organizations that conduct business in the EU will need to be compliant with GDPR, and must come to terms with the huge fines that non-compliance can carry. Fines can be up to €20M or 4% of the annual turnover. For companies that experience breaches that result in the loss of personal data (such as Talk Talk, which lost 170,000 people’s data), the fines will be tremendous.
Join us for discussion about GDPR to learn more about:
The principles that organizations that use personal data need to adhere to
The consequences organizations can face if that do not adhere to this new regulation
How your organization can prepare for the future
My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall.Jerimi Soma
(Remarks) This presentation is not affiliated with any company I have been associated with, either now or in the past. Additionally, no copyrights have been violated. However, I cannot guarantee the accuracy of this information, and it may be subject to updates.
ISO27001:2022 must be applied to the organizations before October 2025 if your organization has currently certified with the previous version; 2013 !
ISO 20000-1 has been updated to version 2018. Learn about common terms and definitions, tips on preparing a transition plan, and what to if you are already certified for ISO 20000-1
Records Retention And Destruction PoliciesRichard Austin
This presentation reviews the legal reasons for companies to establish a records retention and destruction policy and identifies the major steps in establishing a policy. It also presents a high level overview of the new Ontario e-Discovery rules.
Building an Effective Data Privacy Program – 6 Steps from TRUSTeTrustArc
Six practical steps to build an effective data privacy program from conducting an initial privacy risk assessment to implementing controls & ongoing maintenance.
Watch the complete webinar from leading privacy experts on 6 practical steps to build a data privacy program https://info.truste.com/lp/truste/On-Demand-Webinar-Reg-Page2.html?asset=KB5XQRQG-567
Pārdomas par daudzdzīvokļu dzīvojamo ēku ekspluatācijas uzraudzību
Aija Meļņikova Rīgas domes Pilsētas attīstības departamenta Būvniecības kontroles pārvalde
2021.gada 25.oktobris
ControlCase Discussed:
•What is ISO 27001
•How can companies get ready for ISO 27701 privacy standard
•What is the certification process to ISO 27701
•Common challenges
Here is an easy to use checklist for ISO 27001
if you require any advise please call CAW Consultancy Business Solutions on 01772 932058 or our 24 hour hotline 07427535662
The RBI constituted the Working Group on Information Security, Electronic Banking, Technology Risk Management and Cyber Frauds, which produced its report in January 2011. The Working Group was headed by Mr. G. Gopalakrishna and is popularly known as the Gopalakrishna Committee Report. The presentation below highlights some of the salient points, with special emphasis on Chapters 1 (IT Governance), 3 (IT Operations) and 4 (IT Outsourcing). The original report is available here http://rbidocs.rbi.org.in/rdocs/PublicationReport/Pdfs/WREB210111.pdf. Our analysis of this is available here http://www.niiconsulting.com/innovation/RBI%20Guidelines_Summary.pdf.
NII provides advisory services to Banks to help them comply with the Guidelines in the Report.
Daudzdzīvokļu dzīvojamo ēku īpašnieku tiesības un pienākumi siltumapgādes sistēmu uzturēšanā/Elvijs Kalnkambers, Ekonomikas ministrija
Vebinārs "Siltumapgādes sistēma daudzdzīvokļu ēkā. Normatīvais regulējums un tehniskie risinājumi"
2022.gada 2.maijs
video: https://youtu.be/lkWc5LHw2iE
Best Practices for implementing Database Security Comprehensive Database Secu...Kal BO
Best Practices for implementing Database Security
Comprehensive Database Security
Saikat Saha
Product Director
Database Security, Oracle
October 02, 2017
ตัวอย่าง ISO 27001:2013 Project Master Plan
ใช้เป็นแนวทางในการจัดทำแผนงานจัดทำระบบ ISO 27001-2013
ข้อมูลเพิ่มเติมอื่นๆ www.club27001.com - Blog for IT Security Professional
Webinar Mastery Series: Email Retention Regulations in India and How Business...Vaultastic
This email data management mastery series aims to educate and share Myths, Facts, Best Practices, Technologies along with live case studies.
This webinar takes a look at some of the regulations present in India that require long term email retention and how a cloud email archiving solution can help you formulate a sound retention policy and protect all email data.
Why Organizations Need to Archive EmailGFI Software
This white paper examines the different methods for deploying and managing email archive solutions in an organization. It also specifies key requirements that any full featured email archiving system should include.
Records Retention And Destruction PoliciesRichard Austin
This presentation reviews the legal reasons for companies to establish a records retention and destruction policy and identifies the major steps in establishing a policy. It also presents a high level overview of the new Ontario e-Discovery rules.
Building an Effective Data Privacy Program – 6 Steps from TRUSTeTrustArc
Six practical steps to build an effective data privacy program from conducting an initial privacy risk assessment to implementing controls & ongoing maintenance.
Watch the complete webinar from leading privacy experts on 6 practical steps to build a data privacy program https://info.truste.com/lp/truste/On-Demand-Webinar-Reg-Page2.html?asset=KB5XQRQG-567
Pārdomas par daudzdzīvokļu dzīvojamo ēku ekspluatācijas uzraudzību
Aija Meļņikova Rīgas domes Pilsētas attīstības departamenta Būvniecības kontroles pārvalde
2021.gada 25.oktobris
ControlCase Discussed:
•What is ISO 27001
•How can companies get ready for ISO 27701 privacy standard
•What is the certification process to ISO 27701
•Common challenges
Here is an easy to use checklist for ISO 27001
if you require any advise please call CAW Consultancy Business Solutions on 01772 932058 or our 24 hour hotline 07427535662
The RBI constituted the Working Group on Information Security, Electronic Banking, Technology Risk Management and Cyber Frauds, which produced its report in January 2011. The Working Group was headed by Mr. G. Gopalakrishna and is popularly known as the Gopalakrishna Committee Report. The presentation below highlights some of the salient points, with special emphasis on Chapters 1 (IT Governance), 3 (IT Operations) and 4 (IT Outsourcing). The original report is available here http://rbidocs.rbi.org.in/rdocs/PublicationReport/Pdfs/WREB210111.pdf. Our analysis of this is available here http://www.niiconsulting.com/innovation/RBI%20Guidelines_Summary.pdf.
NII provides advisory services to Banks to help them comply with the Guidelines in the Report.
Daudzdzīvokļu dzīvojamo ēku īpašnieku tiesības un pienākumi siltumapgādes sistēmu uzturēšanā/Elvijs Kalnkambers, Ekonomikas ministrija
Vebinārs "Siltumapgādes sistēma daudzdzīvokļu ēkā. Normatīvais regulējums un tehniskie risinājumi"
2022.gada 2.maijs
video: https://youtu.be/lkWc5LHw2iE
Best Practices for implementing Database Security Comprehensive Database Secu...Kal BO
Best Practices for implementing Database Security
Comprehensive Database Security
Saikat Saha
Product Director
Database Security, Oracle
October 02, 2017
ตัวอย่าง ISO 27001:2013 Project Master Plan
ใช้เป็นแนวทางในการจัดทำแผนงานจัดทำระบบ ISO 27001-2013
ข้อมูลเพิ่มเติมอื่นๆ www.club27001.com - Blog for IT Security Professional
Webinar Mastery Series: Email Retention Regulations in India and How Business...Vaultastic
This email data management mastery series aims to educate and share Myths, Facts, Best Practices, Technologies along with live case studies.
This webinar takes a look at some of the regulations present in India that require long term email retention and how a cloud email archiving solution can help you formulate a sound retention policy and protect all email data.
Why Organizations Need to Archive EmailGFI Software
This white paper examines the different methods for deploying and managing email archive solutions in an organization. It also specifies key requirements that any full featured email archiving system should include.
Email Archiving and the EU’s General Data Protection Regulation (GDPR)
Email archiving is a crucial element of any data governance policy. Professional email archiving makes it significantly easier to carry out data governance at a company. Without using a professional
email archiving solution, many companies have little control of where and how email is used and accessed. It is often unclear where email is stored, whether additional local copies exist, and
whether email records are complete.
How does MailStore Server support customers to enable GDPR compliance or a corresponding data compliance policy?
It is a duty of the entire company to comply with the organizational, technical and administrative
provisions of the GDPR. In this regard, MailStore Server can help you immensely with implementing
data compliance for email communications.
Several requirements in the GDPR are based on requirements from other local regulatory bodies.
The point is to provide a high level of coverage in terms of the protection goals for IT security.
MailStore Server enables you to ensure the completeness of your company email archives. It has
featured functions that support you in your data compliance and in turn with compliance with the GDPR. Here are some ways the MailStore Server helps you manage your email archives, and comply with GDPR:
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfCIOWomenMagazine
In an increasingly digital world, where personal data has become a valuable commodity, data privacy compliance has emerged as a critical concern for organizations across industries.
The Financial
Balance Sheet
Part I
This slideshow reviews the Financial
Balance Sheet (FBS). The foundational
information in this slideshow will be
used throughout the text.
• A model of the corporation used to visualize the financial
functions and objectives of a firm.
The Financial Balance Sheet (FBS)
• Deals with a firm’s investments, such as:
– accounts on the accounting statement
– tangible and intangible assets
The Left-Hand Side (LHS)
• Deals with a firm’s sources of financing, which are
divided into two kinds of claims:
– Fixed claims are legally protected
– Residual claims are not legally protected
The Right-Hand Side (RHS)
• Capital gained from RHS claims is used to make LHS
investments. Cash generated by investments is then used
to satisfy claims and/or reinvested in the company.
LHS and RHS Interaction
• The three methods of acquiring capital are trade credit,
secondary trading, and retention of residual cash flows.
Capital Acquisition
• Financial managers make decisions related to both sides
of the FBS:
– LHS decisions include investments a firm makes
– RHS decisions include sources of capital used to fund
investments
Management and the FBS
Slide Number 1Slide Number 2Slide Number 3Slide Number 4Slide Number 5Slide Number 6Slide Number 7Slide Number 8
ITS 833 – INFORMATION GOVERNANCE
Chapter 11 – Information Governance
Privacy and Security Functions
[email protected] Asante 2019
1
1
CHAPTER GOALS AND OBJECTIVES
[email protected] Asante 2019
2
Things To Know:
Sources of Threats to protection of data
Solution
s to threats to protection of data
Identify some privacy laws that apply to securing an organization’s data
What is meant by redaction
What are the limitations on perimeter security?
What is IAM?
What are the challenges of securing confidential e-documents?
What are the limitations on an repository-based approach to securing confidential e-documents?
Things to Know:
What are some solutions to securing confidential e-documents?
What is stream messaging?
How is a digital signature different from an electronic signature?
What is DLP Technology?
What are some basic DLP methods?
What are some of the limitations of DLP?
What is IRM?
What are some key characteristics or requirements for effective IRM?
What are some approaches to security data once it leaves the organization?
2
Who are the victims ?
Government
Corporations
Banks
Schools
Defense Contractors
Private Individuals
Cyberattack Proliferation
[email protected] Asante 2019
3
Who are the perpetrators?
Foreign Governments
Domestic and foreign businesses
Individual Hackers/Hacking societies
Insiders
3
INSIDER THREATS
[email protected] Asante 2019
4
Some malicious/some not malicious
Insider threats can be more costly than outside threats
Nearly 70% of employees have engaged in IP theft
Nearly 33% have taken customer contact information, databases and customer data
Most employees send e-documents .
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessOsterman Research, Inc.
Archiving can be used as a primarily “defensive” capability to protect an organization from the variety of legal, regulatory and other external requirements that it will inevitably be called upon to satisfy. However, archiving can be used proactively to make employees more productive, enable a better understanding of how a business operates, and to manage risk effectively.
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Delphix
With the California Consumer Privacy Act (CCPA) going into effect in 2020, organizations must comply with a new set of sweeping provisions designed to protect the privacy of consumer data. Organizations inside and outside of the state must assess their exposure to CCPA, then quickly transform how they process, share, and protect sensitive data.
This may feel like a long way off but the obligations on businesses are onerous and the time to prepare is now. The hefty fines that GDPR promises will come into force immediately so businesses are being given plenty of warning to put procedures in place to ensure they are compliant with the regulation. Read this essential guide to getting GDPR ready.
Accounting Information Systems Australasian 1st Edition Romney Solutions Manualxexunidop
Full download : https://alibabadownload.com/product/accounting-information-systems-australasian-1st-edition-romney-solutions-manual/
Accounting Information Systems Australasian 1st Edition Romney Solutions Manual
Consensus Policy Resource CommunityEmail PolicyFree Use .docxbobbywlane695641
Consensus Policy Resource Community
Email Policy
Free Use Disclaimer:This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is no prior approval required. If you would like to contribute a new policy or updated version of this policy, please send email to [email protected].
Things to Consider:Please consult the Things to Consider FAQ for additional guidelines and suggestions for personalizing the SANS policies for your organization.
Last Update Status: UpdatedOverview
Electronic email is pervasively used in almost all industry verticals and is often the primary communication and awareness method within an organization. At the same time, misuse of email can post many legal, privacy and security risks, thus it’s important for users to understand the appropriate use of electronic communications. Purpose
The purpose of this email policy is to ensure the proper use of <Company Name> email system and make users aware of what <Company Name> deems as acceptable and unacceptable use of its email system. This policy outlines the minimum requirements for use of email within <Company Name> Network. Scope
This policy covers appropriate use of any email sent from a <Company Name> email address and applies to all employees, vendors, and agents operating on behalf of <Company Name>.
Policy4.1 All use of email must be consistent with <Company Name> policies and procedures of ethical conduct, safety, compliance with applicable laws and proper business practices. 4.2 <Company Name> email account should be used primarily for <Company Name> business-related purposes; personal communication is permitted on a limited basis, but non-<Company Name> related commercial uses are prohibited.4.3 All <Company Name> data contained within an email message or an attachment must be secured according to the Data Protection Standard.
4.4 Email should be retained only if it qualifies as a <Company Name> business record. Email is a <Company Name> business record if there exists a legitimate and ongoing business reason to preserve the information contained in the email.
4.5 Email that is identified as a <Company Name> business record shall be retained according to <Company Name> Record Retention Schedule. 4.6 The <Company Name> email system shall not to be used for the creation or distribution of any disruptive or offensive messages, including offensive comments about race, gender, hair color, disabilities, age, sexual orientation, pornography, religious beliefs and practice, political beliefs, or national origin. Employees who receive any emails with this content from any <Company Name> employee should report the matter to their supervisor immediately.4.7 Users are prohibited from automatically forwarding <Company Name> email to a third party email system (noted in 4.8 below). Individual messages which are forwarded by the user must not contain <Company Name> confidential or .
Having a clear set of IT policies will help your business make effective use of IT. Additionally, it can protect your company from legal problems, security risks and unnecessary costs.
What does GDPR laws mean for Australian businessesiFactory Digital
Chances are that you’ve noticed a deluge of emails and app updates all centred around privacy updates. It’s not that every company on Earth has simultaneously grown very concerned about the issue. Instead, it’s to make sure that they meet the requirements for GDPR compliance.
https://ifactory.com.au/news/what-does-gdpr-laws-mean-australian-businesses
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
Preparing for the new General Data Protection Regulation? Here is a presentation to help you to engage your employees with their new information security requirements. In this ppt presentation, you will find out: why GDPR, steps to manage compliance, important information security facts and some of the key articles.
Webinar mccia sm_bs_ how cloud backup can help you reduce risks and gain...Vaultastic
About this Webinar
The Digital SMEs
Surveys worldwide suggest that up to 70% of SMEs, barring the born-in-the-cloud or digital-first businesses, have intensified their use of digital technologies (especially post COVID-19). However, many businesses have not had the time or received the advice needed to plan this transition well.
For these firms, the transition to digital is not yet complete, potentially expensive, and risky.
The diverse IT Landscape of SMEs
Thus, the operating systems of SME/Bs are typically a collection of loosely integrated diverse solutions from multiple vendors spanning multiple clouds, on-premises solutions, and manually run pieces.
And How email ties it all together
Email is the primary office tool to tie it up, run operations, handle exceptions, and quickly share knowledge, communicate proposals, invoices, agreements, purchase orders, and more.
In other words, EMAIL is the overarching operating system for small businesses.
Thus, protecting email data is the #1 priority for SMEs
But this can be challenging for SMEs
SMEs do not have the resources or capacity to handle the ever-growing email volume, variety, and velocity.
In addition, Hackers are more likely to target small companies.
"43% of cyberattacks are aimed at small businesses, & unfortunately, only 14% are able to mitigate such risks effectively.” - Small Business Trends
And, inadequate protection can lead to data loss, unavailability, which in turn may lead to poor business continuity, litigations, rising costs, loss of productivity, reputation, and trust.
Hence, for an SMB, there is a heavy price to pay if their email is not preserved or not well managed.
The Solution
We discussed how cloud data backup/archiving can help reduce these risks and optimize costs for small enterprises. We also covered Email communications Dos and Don'ts. AWS speaker shared how AWS is an IT platform for SMEs.
In this webinar we covered.
Section 1:
Small businesses & Email use
The need to protect email data
Traditional methods & Challenges
An Elegant solution
Live case study and Demo
Your queries - answered
3 simple strategies to preserve and manage unstructured data of former emplo...Vaultastic
Handling Employee exits
Typically, when an employee leaves, the IT and HR teams STOP ACCESS for the employee to the corporate systems and ARCHIVE all their DATA in case it is needed in the future. The former is a Security best practice while the latter is Data Management best practice.
Why Retain data of former employees?
1. Legal perspective (data can be used as evidence in case a suit is filed either by the company or by the employee)
2. Knowledge management perspective (the communication by the employee can hold a lot of useful and reusable IP)
3. Operational hygiene perspective (to ensure business continuity, the communication which may contain sales records, half-finished projects, notifications, commitments, etc may need to be passed on to the next in charge of the role).
What's the challenge here?
The structured data, generated within the corporate business systems are typically not a big challenge to retain.
Its the unstructured data, which is giving IT teams nightmares.
Of all the data records, the communication channels such as email, chat, voice carry the most un-structured and also sometimes the most valuable of records.
An average employee generates 4GB of email in a year, about 70% of which carries business-critical information such as agreements, contract negotiations, commitments, issues, invoices, reports, notifications, contacts, etc.
In this webinar we covered.
Why retain data of former employees?
Common methods deployed today and their drawbacks
A few ideas to help manage data for extended periods
How the cloud can aid in your data management strategy
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Vaultastic
"Email security guidelines 2019, by RBI"
For banks, email has become the primary form of communication with customers, partners and other banks, carrying critical, private information such as bank statements, transaction confirmations, notifications, answers to queries by customers, and more.
Key takeaways included an actionable plan to refactor and upgrade your IT systems in bite-sized phases, to meet the updated requirements.
In this webinar Sunil Uttam, Co-founder of Mithi covered:
1. Why email has to be secured and preserved in banks.
2. Understanding RBI's 2019 cyber security guidelines for email use in banks.
3. Common queries asked by RBI auditors and how to prepare for them.
4. Best practices to build a secure email platform.
Webinar: Keep legacy email data safe and search ready with zero hardwareVaultastic
In this pure solution-centric webinar, we discussed one simple strategy to help users manage their legacy email data effectively. Learn more: https://bit.ly/2Ib3BKQ
Webinar: Small businesses and the cost of poor data management Vaultastic
This webinar discusses the importance of data management for an SMB, the impact of neglecting this and some common myths/queries raised by SMBs in our conversations.
Webinar: Worried about privacy of your data on public cloud - Bring your own keyVaultastic
In this webinar, Mr. Sunil Uttam, Co-founder, Mithi Software Technologies discussed how a Bring your own key strategy can help you achieve the best of both worlds - Complete Data Privacy as seen with in-premise setups while still using a SaaS on public cloud. Learn More: https://bit.ly/2R8uQZU
Topics Covered:
- Recap of the benefits of SaaS on cloud
- What is a Dedicated Private SaaS
- What is BYOK
- How Vaultastic’s Dedicated SaaS works
- Unlimited Q&A
Email Mastery Series: How an Email Archival Solution can improve an Organisat...Vaultastic
This email data management mastery series aims to educate and share Myths, Facts, Best Practices, Technologies along with live case studies.
In this webinar, we take a look at the different types of quick fix backup solutions that organisations commonly deploy, why these are not effective in the long run and how a cloud email archival solution can help fix these problems and improve productivity in a cost effective manner.
Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...Vaultastic
This email data management mastery series aims to educate and share Myths, Facts, Best Practices, Technologies along with live case studies. Learn More: https://bit.ly/2JVAaZ5
Part 2 takes a look at how opting for a cloud email archiving solution can help lower your IT expenditure by 30%, whilst also providing better security and durability.
Mastery Webinar Series: Strategies to Simplify Email Data ManagementVaultastic
This email data management mastery series aims to educate and share Myths, Facts, Best Practices, Technologies along with live case studies. Learn More: https://bit.ly/2zwANZ0
Part 1 takes a look at how using a hierarchical storage architecture reduces email bloat and increases mail service performance.
Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...Vaultastic
In this webinar, speakers from Mithi, Amazon and Mahanagar Bank shared their insights on the fundamentals of email archiving, how it can be used to secure and leverage email data and how cloud solves challenges of an in premise infrastructure.
Topics covered during the webinar:
* Why Backup is not the same as Archival and understanding 5 key business uses of email archiving
* How email archiving and ediscovery can help with business intelligence, supervision, improving quality of communication, and more
* Mahanagar Co-Operative Bank’s story of moving their email storage to the cloud
* Amazon speak on how cloud solves challenges of an in-premise infrastructure
* You Ask We Answer
Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat Vaultastic
Mr. Makarand Dhumak featured as a guest speaker for a Vaultastic webinar on "How Mahanagar Co-Operative Bank uses Cloud Email Archiving to reduce risk of data loss and control email storage bloat".
In this presentation, Mr. Makarand Dhumak tells us about how Mithi Software's Email Archiving Solution - Vaultastic, helped Mahanagar Bank solve some of its business problems. To learn more about how Vaultastic has helped other organisations visit https://www.vaultastic.com/success-stories/
Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...Vaultastic
In this webinar, speakers from Mithi, Amazon and Alembic Pharma shared their insights on the fundamentals of email archiving, how it can be used to secure and leverage email data and how cloud is the best platform for managing large data. Learn More: http://bit.ly/2iVSHg5
Topics covered during the webinar:
* Why Backup is not the same as Archival and understanding 5 key business uses of email archiving
* The best practices and key criteria while choosing and deploying an email archiving solution for your organisation
* How email archiving and ediscovery can help with business intelligence, supervision, improving quality of communication, and more
* Alembic Pharma's story of moving their email storage to the cloud
* Amazon speak on why cloud is the best platform for securely managing large data
* You Ask We Answer
AWS - Why cloud is the best platform for securely managing large dataVaultastic
Mr. NInad Phatak, Solutions Architect, Amazon Internet Services, features as a guest speaker for a Vaultastic Webinar on "How Alembic Pharma Secures and Leverages Email with Archival and Ediscovery for higher productivityl"
In this presentation, Mr. Ninad Phatak speaks about how the AWS platform can help securely manage large volumes of data
Note:
For the complete webinar presentation also featuring Mr Gopal Rangaraj Head - IT, who shares How Alembic Pharma increased productivity using Vaultastic, please click here: http://bit.ly/2iVSHg5
Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery Vaultastic
Mr. Gopal Rangaraj featured as a guest speaker for a Vaultastic webinar on "How Alembic Pharma Secures and Leverages Email with Archival and Ediscovery for higher productivity".
In this presentation, Mr. Gopal Rangaraj tells us about how Mithi Software's Email Archiving Solution - Vaultastic, helped Alembic Pharma solve some of its business problems. To learn more about how Vaultastic has helped other organisations visit https://www.vaultastic.com/success-stories/
Note:
For the complete webinar presentation and recording also featuring Mr. Ninad Phatak, Solution Architect, Amazon Internet Services Pvt. Ltd., who shares with us 'why cloud is the best platform for securely managing large data'' please click here http://bit.ly/2iVSHg5
Case Study: T and T Motor's Success Story With VaultasticVaultastic
This case study gives a quick snapshot of the challenges faced by T and T Motors and the subsequent benefits provided by switching to Vaultastic Cloud Email Archival. To learn more, visit: www.vaultastic.com.
Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...Vaultastic
In this webinar, speakers from Mithi, Amazon and T&T Motors shared their insights on the fundamentals of email archiving, how it can be used to control data leakage and why cloud is the safest storage today. Learn More: http://bit.ly/2gGwfD5
Topics covered during the webinar:
* The Fundamentals of Email Archiving
* How Vaultastic, a true SaaS, can help
* How ediscovery can be used as a supervision tool
* Customer speak on how Vaultastic helped in controlling data leakage
* Amazon speak on why cloud storage is the safest storage now
* Q and A Session
Case Study: Cashpor Micro Credit's Success Story with Vaultastic Vaultastic
This case study gives a quick snapshot of the challenges faced by Cashpor Micro Credit and the subsequent benefits provided by switching to Vaultastic Cloud Email Archival. To learn more, visit: www.vaultastic.com.
Featured Webinar: How Cashpor increased their mail service performance by ado...Vaultastic
In this webinar, speakers from Mithi, Amazon and Cashpor Micro Credit (a microfinance firm) shared their insights and experience on the benefits of the cloud infrastructure and what actions you can take to ensure email data security with quick recovery and durabilty on cloud. Learn More: http://bit.ly/2wAJuea
Topics covered during the webinar:
*Basics of Email Archiving
*Why the Vaultastic platform is a preferred choice for email archival on cloud
*Performance impact of using Hierarchical Storage Architecture
*Customer speak on How Cashpor increased mail service performance with Cloud Email Archival
*Amazon speak on How the AWS platform is designed to deliver consistent performance, hands free
*Q and A Session
Cashpor Micro Credit - Increasing mail service performance with cloud email a...Vaultastic
Mr. Anjan Kumar Kar - Head, Software Developement, featured as a guest speaker for a Vaultastic webinar on "How Cashpor increased their mail service performance by adopting cloud email archival".
In this presentation, Mr. Anjan Kumar Kar tells us about how Mithi Software's Email Archiving Solution - Vaultastic, helped Cashpor Micro Credit solve some of its business problems. To learn more about how Vaultastic has helped other organisations visit https://www.vaultastic.com/success-stories/
Note:
For the complete webinar presentation and recording also featuring Mr. Krishnan Mani, Solution Architect, Amazon Internet Services Pvt. Ltd., who shares with us 'How the AWS infrastructure is so Elastic'' please click here http://bit.ly/2wAJuea
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus
As part of the DOE Integrated Research Infrastructure (IRI) program, NERSC at Lawrence Berkeley National Lab and ALCF at Argonne National Lab are working closely with General Atomics on accelerating the computing requirements of the DIII-D experiment. As part of the work the team is investigating ways to speedup the time to solution for many different parts of the DIII-D workflow including how they run jobs on HPC systems. One of these routes is looking at Globus Compute as a way to replace the current method for managing tasks and we describe a brief proof of concept showing how Globus Compute could help to schedule jobs and be a tool to connect compute at different facilities.
Unleash Unlimited Potential with One-Time Purchase
BoxLang is more than just a language; it's a community. By choosing a Visionary License, you're not just investing in your success, you're actively contributing to the ongoing development and support of BoxLang.
In software engineering, the right architecture is essential for robust, scalable platforms. Wix has undergone a pivotal shift from event sourcing to a CRUD-based model for its microservices. This talk will chart the course of this pivotal journey.
Event sourcing, which records state changes as immutable events, provided robust auditing and "time travel" debugging for Wix Stores' microservices. Despite its benefits, the complexity it introduced in state management slowed development. Wix responded by adopting a simpler, unified CRUD model. This talk will explore the challenges of event sourcing and the advantages of Wix's new "CRUD on steroids" approach, which streamlines API integration and domain event management while preserving data integrity and system resilience.
Participants will gain valuable insights into Wix's strategies for ensuring atomicity in database updates and event production, as well as caching, materialization, and performance optimization techniques within a distributed system.
Join us to discover how Wix has mastered the art of balancing simplicity and extensibility, and learn how the re-adoption of the modest CRUD has turbocharged their development velocity, resilience, and scalability in a high-growth environment.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Hivelance Technology
Cryptocurrency trading bots are computer programs designed to automate buying, selling, and managing cryptocurrency transactions. These bots utilize advanced algorithms and machine learning techniques to analyze market data, identify trading opportunities, and execute trades on behalf of their users. By automating the decision-making process, crypto trading bots can react to market changes faster than human traders
Hivelance, a leading provider of cryptocurrency trading bot development services, stands out as the premier choice for crypto traders and developers. Hivelance boasts a team of seasoned cryptocurrency experts and software engineers who deeply understand the crypto market and the latest trends in automated trading, Hivelance leverages the latest technologies and tools in the industry, including advanced AI and machine learning algorithms, to create highly efficient and adaptable crypto trading bots
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
Even though at surface level ‘java.lang.OutOfMemoryError’ appears as one single error; underlyingly there are 9 types of OutOfMemoryError. Each type of OutOfMemoryError has different causes, diagnosis approaches and solutions. This session equips you with the knowledge, tools, and techniques needed to troubleshoot and conquer OutOfMemoryError in all its forms, ensuring smoother, more efficient Java applications.
Designing for Privacy in Amazon Web ServicesKrzysztofKkol1
Data privacy is one of the most critical issues that businesses face. This presentation shares insights on the principles and best practices for ensuring the resilience and security of your workload.
Drawing on a real-life project from the HR industry, the various challenges will be demonstrated: data protection, self-healing, business continuity, security, and transparency of data processing. This systematized approach allowed to create a secure AWS cloud infrastructure that not only met strict compliance rules but also exceeded the client's expectations.
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
Comply with Email retention regulations in India and cut costs using cloud email archiving
1. Email retention regulations in India, how to ensure business
compliance and cut costs with cloud email archiving
SAKET AGRAWAL
Account Manager - Enterprise Solutions
Mithi Software Technologies.
FEB 27 2019
3:00PM - 3:30PM IST
2. In this webinar we shall highlight the
various regulations in India that require
long term retention of email data
3. In addition,
we shall address the
benefits of setting
a sound retention
policy in order to
protect email data
8. Email retention involves
the storing of historical email
in a logical manner
for a specified period of time,
with on-demand retrieval
& recovery.
9. An email Retention Policy
defines aspects such as
employee email storage,
usage, retrieval of
ex-employee email data
& deletion of the same.
10. Let's have a look at some
Indian Regulations
requiring such retention
11. #1 SEBI
Securities and Exchange Board of India
SEBI regulations mandate the systematic categorization, review,
and retention of all important business documents for 5 years in
company systems, and thereafter archiving it for another 3 years.
These regulations are applicable to banks, nbfcs, trading
companies, and financial organizations in India.
12. #2 IT ACT 2000/8
This act with a further amendment in 2008 states that the use of
electronic records including email as evidence is permitted
under the Indian Evidence Act, 1872, the Civil Procedure Code
and the Criminal Procedure Code.
This is a generic law applicable to all organisations with an IT
infrastructure.
13. #3 IRDAI
Insurance regulatory and Development authority of India
As per the guideline of information and cyber security for
insurers, electronic maintenance of core business records
shall be hosted within India, with the data retention and
destruction schedules to be defined by the organization.
The company should audit this practice, wherever applicable.
14. #4 GDPR
General Data Protection Regulation
Established on May 25, 2018, this regulation requires that the data
should be processed and controlled only with the consent of the data
subjects. It also requires that the data should be deleted securely once
its life has maxed out.
Emails often contain personal data – and that means organizations must
manage backup and archived copies of the emails very meticulously.
15. #5 (Draft) DATA PROTECTION BILL, 2018
This bill mandates that any entity processing personal
data shall ensure the storage, on a server or data centre
located in India.
The Central Government shall notify categories of
personal data as critical personal data.
16. #6 HIPAA | HITECH
Health Insurance Portability and Accountability Act
This act sets out guidelines for protecting patients’ personal health
information as it is used, stored & shared. With the rise of email as a primary
communication medium in the healthcare industry, HIPAA requirements for
email stipulate that protected information must be encrypted.
The retention period of medical records depends on the medical laws in a
particular U.S state. Business Associates must comply with those guidelines
as well.
17. #7 MHRA UK
Medicines and Healthcare products Regulatory Agency
Under this law, organisations are required to maintain the
collection of essential documents that facilitates the conduct
and management of the clinical trial.
The regulation does not differentiate between paper and
electronic records. This law regulates medicines, medical
devices and blood components for transfusion in the UK
18. So a common thread with all these laws is a
mandate to maintain electronic records of
communication, critical transactions and
operations for an extended period of time.
The same to be discoverable and
recoverable on demand.
19. POLL
Which of these regulations apply to your company?
SEBI
IT ACT 2000/8
IRDAI
GDPR
HIPAA/HITECH
21. INTELLECTUAL PROPERTY RIGHTS PROTECTION
Email retention can protect valuable
insights into finances, business plans and
product details from being stolen, in case
of email server hacks.
A tamper proof cloud archiving solution
can help achieve just that!
22. PROTECTION AGAINST CYBER THREATS
In case a cyber attack wipes out your PC,
a retention policy can help safely recover
your mail as it systematically maintains all
the emails on a cloud archiving system as
a backup.
23. LITIGATION AND EDISCOVERY SUPPORT
In case of a lawsuit, email retention
can help lawyers quickly retrieve old
mails in an organised manner using
eDiscovery.
24. INTERNAL DISPUTE SETTLEMENTS
Disputes are opportunities
In case of disputes like stakeholder
mapping, project management and
delivery…
…archived emails can help in
reviewing the commitments and
conversations to discover the truth
and improve efficiencies
25. ORGANIZATIONAL COMPETENCE
Organizational Competence is built over
discussions, information & plans spanning long
periods of time requiring huge efforts.
Much of this is captured in the daily exchange
of email.
Email retention ensures that the entire
knowledge repository is secure and easily
accessible.
26. We can therefore see that apart from
archiving emails to remain compliant
with regulations, a retention policy can
also benefit an organisation through
numerous other ways.
27. ABOUT VAULTASTIC
Rapid Adoption of the cloud based services
• Vaultastic storage grows at 3GB/sec.
• Mithi cloud transacts 2 million +mails daily
• Currently managing over 25TB of archived email.
( All these emails are indexed, online & search ready. )
• Receive index & store about 400,000 mails a day