SlideShare a Scribd company logo
01/31/12

  Michael Bell and
  Thomas Stegemann
                            Retain 3.0
                     Social Messaging
Retain 3.0 What is it?

    • Big upgrade from 2.x – will require
      database schema update. Down time
      required.
    • Sets up Retain as a true unified messaging
      discovery platform.
         • Support for Social Messaging
         • Office 365 Messaging Archive
         • Adds Mobile – 3.1




2   © GWAVA Inc, Confidential & Proprietary
Top Features and Functionality

    1)     Retain for Social Messaging
    2)     Simplified Search Interface
    3)     Stats Server
    4)     Office 365 module
    5)     Modular Licensing model




3   © GWAVA Inc, Confidential & Proprietary
Unified Archiving

    Facebook
    •      Wall posts and status updates
    •      Messages
    •      Friend requests



    Twitter
    •      Tweets
    •      Direct messages


4   © GWAVA Inc, Confidential & Proprietary
Retain for Social Messaging

    New Module allows for Facebook and Twitter
      archiving.

    How does it work?
    RSM requires the use of a proxy that sits between the
      end user and Facebook/Twitter.

    There are three different methods to achieve this.
      In order of simplicity to set up and configure:
        1)        Agent running on end user computers
        2)        Integration with an existing iCAP enabled security device
        3)        Deployment of RSM Proxy (Netbox Blue VM)

5   © GWAVA Inc, Confidential & Proprietary
Retain for Social Messaging

    Agent on end user computers:
    •   Lightweight application that can be deployed to
        workstations and laptops
    •   Watches for traffic to Facebook or Twitter and
        captures that data.
    •   Caches that data then sends to Retain on
        scheduled basis.
    This is the easiest method to enable RSM because it
    doesn’t require the configuration and maintenance
    of any new major network appliance.



6   © GWAVA Inc, Confidential & Proprietary
Retain for Social Messaging

    Integration with iCAP enabled device
    •      iCAP is an industry standard language proxies
           understand.
    •      RSM can make use of this by uploading it’s iCAP
           definitions to a compatible device (web
           proxy/firewall).
    •      This removes the need to set up a new device in
           the customer’s network.




7   © GWAVA Inc, Confidential & Proprietary
Retain for Social Messaging




    In essence, RSM is a “man-in-the-middle” for traffic to and from
    Facebook and Twitter. Data is collected on the proxy. Retain collects
    this data on a scheduled basis. RSM can also grab encrypted HTTPS
    traffic. A new CA certificate will need to be pushed out to or installed
    on end-user computers to avoid security warnings (except for when
    using the agent option).
8   © GWAVA Inc, Confidential & Proprietary
Deployment Options &
                                                      Architecture




9   © GWAVA Inc, Confidential & Proprietary
Retain Archive Feed




10   © GWAVA Inc, Confidential & Proprietary
Keyword Search




11   © GWAVA Inc, Confidential & Proprietary
Intelligent Threading




12   © GWAVA Inc, Confidential & Proprietary

More Related Content

What's hot

Palo alto-review
Palo alto-reviewPalo alto-review
Palo alto-review
Rayan Darine
 
Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Secure & Protect your Data with Druva
Secure & Protect your Data with Druva
Netpluz Asia Pte Ltd
 
Palo Alto Networks CASB
Palo Alto Networks CASBPalo Alto Networks CASB
Palo Alto Networks CASB
Alberto Rivai
 
F5 Cloud Story
F5 Cloud StoryF5 Cloud Story
F5 Cloud Story
MarketingArrowECS_CZ
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
SWITCHPOINT NV/SA
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
Information Technology
 
Backup2013 - Barracuda Networks
Backup2013 - Barracuda NetworksBackup2013 - Barracuda Networks
Backup2013 - Barracuda Networks
Kappa Data
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
Cloudflare
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
javagroup2006
 
Secure Data Center for Enterprise
Secure Data Center for EnterpriseSecure Data Center for Enterprise
Secure Data Center for Enterprise
Cisco Russia
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
F5 Networks
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
Iftikhar Ali Iqbal
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Features
lukky753
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data Centers
F5 Networks
 
F5 Automation Toolchain
F5 Automation ToolchainF5 Automation Toolchain
F5 Automation Toolchain
MarketingArrowECS_CZ
 
Cloud gateways for regulatory compliance
Cloud gateways for regulatory complianceCloud gateways for regulatory compliance
Cloud gateways for regulatory compliance
Ulf Mattsson
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
Mundo Contact
 
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
Robb Boyd
 
Using a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business network
Netpluz Asia Pte Ltd
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the Cloud
CloudPassage
 

What's hot (20)

Palo alto-review
Palo alto-reviewPalo alto-review
Palo alto-review
 
Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Secure & Protect your Data with Druva
Secure & Protect your Data with Druva
 
Palo Alto Networks CASB
Palo Alto Networks CASBPalo Alto Networks CASB
Palo Alto Networks CASB
 
F5 Cloud Story
F5 Cloud StoryF5 Cloud Story
F5 Cloud Story
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
Backup2013 - Barracuda Networks
Backup2013 - Barracuda NetworksBackup2013 - Barracuda Networks
Backup2013 - Barracuda Networks
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
 
Secure Data Center for Enterprise
Secure Data Center for EnterpriseSecure Data Center for Enterprise
Secure Data Center for Enterprise
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Features
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data Centers
 
F5 Automation Toolchain
F5 Automation ToolchainF5 Automation Toolchain
F5 Automation Toolchain
 
Cloud gateways for regulatory compliance
Cloud gateways for regulatory complianceCloud gateways for regulatory compliance
Cloud gateways for regulatory compliance
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
 
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
 
Using a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business network
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the Cloud
 

Viewers also liked

Exchange Workshop - ACP
Exchange Workshop - ACPExchange Workshop - ACP
Exchange Workshop - ACP
GWAVA
 
Share onvibe the productivity booster for your vibe platform(gwava-con emea...
Share onvibe   the productivity booster for your vibe platform(gwava-con emea...Share onvibe   the productivity booster for your vibe platform(gwava-con emea...
Share onvibe the productivity booster for your vibe platform(gwava-con emea...
GWAVA
 
Novell enabling collaboration
Novell   enabling collaborationNovell   enabling collaboration
Novell enabling collaboration
GWAVA
 
2012 10-sep-gwava-backup-virt-environment
2012 10-sep-gwava-backup-virt-environment2012 10-sep-gwava-backup-virt-environment
2012 10-sep-gwava-backup-virt-environment
GWAVA
 
Roel van bueren bundle commander
Roel van bueren   bundle commanderRoel van bueren   bundle commander
Roel van bueren bundle commander
GWAVA
 
Gwava con retain introduction
Gwava con retain introductionGwava con retain introduction
Gwava con retain introduction
GWAVA
 
Novell windermere
Novell   windermereNovell   windermere
Novell windermere
GWAVA
 
Novell service desk gwava con
Novell service desk gwava conNovell service desk gwava con
Novell service desk gwava con
GWAVA
 
GWAVACon 2013:GroupWise Windermere - OH
GWAVACon 2013:GroupWise Windermere - OHGWAVACon 2013:GroupWise Windermere - OH
GWAVACon 2013:GroupWise Windermere - OH
GWAVA
 

Viewers also liked (9)

Exchange Workshop - ACP
Exchange Workshop - ACPExchange Workshop - ACP
Exchange Workshop - ACP
 
Share onvibe the productivity booster for your vibe platform(gwava-con emea...
Share onvibe   the productivity booster for your vibe platform(gwava-con emea...Share onvibe   the productivity booster for your vibe platform(gwava-con emea...
Share onvibe the productivity booster for your vibe platform(gwava-con emea...
 
Novell enabling collaboration
Novell   enabling collaborationNovell   enabling collaboration
Novell enabling collaboration
 
2012 10-sep-gwava-backup-virt-environment
2012 10-sep-gwava-backup-virt-environment2012 10-sep-gwava-backup-virt-environment
2012 10-sep-gwava-backup-virt-environment
 
Roel van bueren bundle commander
Roel van bueren   bundle commanderRoel van bueren   bundle commander
Roel van bueren bundle commander
 
Gwava con retain introduction
Gwava con retain introductionGwava con retain introduction
Gwava con retain introduction
 
Novell windermere
Novell   windermereNovell   windermere
Novell windermere
 
Novell service desk gwava con
Novell service desk gwava conNovell service desk gwava con
Novell service desk gwava con
 
GWAVACon 2013:GroupWise Windermere - OH
GWAVACon 2013:GroupWise Windermere - OHGWAVACon 2013:GroupWise Windermere - OH
GWAVACon 2013:GroupWise Windermere - OH
 

Similar to Gwava con retain social

Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
Skytap Cloud
 
Accelerate Design and Development of Data Projects Using AWS
Accelerate Design and Development of Data Projects Using AWSAccelerate Design and Development of Data Projects Using AWS
Accelerate Design and Development of Data Projects Using AWS
Delphix
 
Firewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data accessFirewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data access
Sumit Sarkar
 
Cisco storageconnectfordummies
Cisco storageconnectfordummiesCisco storageconnectfordummies
Cisco storageconnectfordummies
rosegrif1
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
Sekhar Mohanty
 
Enabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationEnabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data Virtualization
Denodo
 
eFolder Webinar — Special eFolder Announcement: StorageCraft Agreement and CE...
eFolder Webinar — Special eFolder Announcement: StorageCraft Agreement and CE...eFolder Webinar — Special eFolder Announcement: StorageCraft Agreement and CE...
eFolder Webinar — Special eFolder Announcement: StorageCraft Agreement and CE...
eFolder
 
SMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution BriefSMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution Brief
Hybrid Cloud
 
Cloud capability for startups
Cloud capability for startupsCloud capability for startups
Cloud capability for startups
Cloud and analytics Lab
 
Auditing Cloud Data With Group
Auditing Cloud Data With GroupAuditing Cloud Data With Group
Auditing Cloud Data With Group
JSPM's JSCOE , Pune Maharashtra.
 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
JSPM's JSCOE , Pune Maharashtra.
 
Oracle GoldenGate Cloud Service Overview
Oracle GoldenGate Cloud Service OverviewOracle GoldenGate Cloud Service Overview
Oracle GoldenGate Cloud Service Overview
Jinyu Wang
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Denodo
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
ikanow
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the CloudPart 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
Cloudera, Inc.
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
 
Cloud Architect Company in India
Cloud Architect Company in IndiaCloud Architect Company in India
Cloud Architect Company in India
Regumsoft Technologies
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
Zscaler
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
Netskope
 

Similar to Gwava con retain social (20)

Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
 
Accelerate Design and Development of Data Projects Using AWS
Accelerate Design and Development of Data Projects Using AWSAccelerate Design and Development of Data Projects Using AWS
Accelerate Design and Development of Data Projects Using AWS
 
Firewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data accessFirewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data access
 
Cisco storageconnectfordummies
Cisco storageconnectfordummiesCisco storageconnectfordummies
Cisco storageconnectfordummies
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 
Enabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data VirtualizationEnabling a Data Mesh Architecture with Data Virtualization
Enabling a Data Mesh Architecture with Data Virtualization
 
eFolder Webinar — Special eFolder Announcement: StorageCraft Agreement and CE...
eFolder Webinar — Special eFolder Announcement: StorageCraft Agreement and CE...eFolder Webinar — Special eFolder Announcement: StorageCraft Agreement and CE...
eFolder Webinar — Special eFolder Announcement: StorageCraft Agreement and CE...
 
SMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution BriefSMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution Brief
 
Cloud capability for startups
Cloud capability for startupsCloud capability for startups
Cloud capability for startups
 
Auditing Cloud Data With Group
Auditing Cloud Data With GroupAuditing Cloud Data With Group
Auditing Cloud Data With Group
 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
 
Oracle GoldenGate Cloud Service Overview
Oracle GoldenGate Cloud Service OverviewOracle GoldenGate Cloud Service Overview
Oracle GoldenGate Cloud Service Overview
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the CloudPart 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
Part 2: Cloudera’s Operational Database: Unlocking New Benefits in the Cloud
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
Cloud Architect Company in India
Cloud Architect Company in IndiaCloud Architect Company in India
Cloud Architect Company in India
 
Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18Ma story then_now_webcast_10_17_18
Ma story then_now_webcast_10_17_18
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 

More from GWAVA

Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen
GWAVA
 
Open Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor DeutschOpen Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor Deutsch
GWAVA
 
Open Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit RunOpen Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit Run
GWAVA
 
Open Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor EnglishOpen Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor English
GWAVA
 
Micro Focus iPrint
Micro Focus iPrintMicro Focus iPrint
Micro Focus iPrint
GWAVA
 
GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1
GWAVA
 
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
GWAVA
 
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application VirtualizationDesktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
GWAVA
 
Open Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows worldOpen Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows world
GWAVA
 
ZENworks 2017 - Overview
ZENworks 2017 - OverviewZENworks 2017 - Overview
ZENworks 2017 - Overview
GWAVA
 
Vibe Custom Development
Vibe Custom DevelopmentVibe Custom Development
Vibe Custom Development
GWAVA
 
Third Party Client Access to GroupWise
Third Party Client Access to GroupWiseThird Party Client Access to GroupWise
Third Party Client Access to GroupWise
GWAVA
 
Gwava Cloud Offering
Gwava Cloud OfferingGwava Cloud Offering
Gwava Cloud Offering
GWAVA
 
Let’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and FeaturesLet’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and Features
GWAVA
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
GWAVA
 
Exchange 2016 Cloud Migration
Exchange 2016 Cloud MigrationExchange 2016 Cloud Migration
Exchange 2016 Cloud Migration
GWAVA
 
Large Scale GWAVA 7
Large Scale GWAVA 7Large Scale GWAVA 7
Large Scale GWAVA 7
GWAVA
 
GWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYINGGWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA
 
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
GWAVA
 
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines AnwendersRetain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
GWAVA
 

More from GWAVA (20)

Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen Slides: Archivierung und Security – Für weniger mehr bekommen
Slides: Archivierung und Security – Für weniger mehr bekommen
 
Open Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor DeutschOpen Horizons - GroupWise Monitor Deutsch
Open Horizons - GroupWise Monitor Deutsch
 
Open Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit RunOpen Horizons - Vibe: Run, Rabbit Run
Open Horizons - Vibe: Run, Rabbit Run
 
Open Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor EnglishOpen Horizons - GroupWise Monitor English
Open Horizons - GroupWise Monitor English
 
Micro Focus iPrint
Micro Focus iPrintMicro Focus iPrint
Micro Focus iPrint
 
GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1GroupWise Mobility Service 14.2.1
GroupWise Mobility Service 14.2.1
 
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
 
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application VirtualizationDesktop Containers 12: Next Generation of ZENworks Application Virtualization
Desktop Containers 12: Next Generation of ZENworks Application Virtualization
 
Open Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows worldOpen Enterprise Server - in a Windows world
Open Enterprise Server - in a Windows world
 
ZENworks 2017 - Overview
ZENworks 2017 - OverviewZENworks 2017 - Overview
ZENworks 2017 - Overview
 
Vibe Custom Development
Vibe Custom DevelopmentVibe Custom Development
Vibe Custom Development
 
Third Party Client Access to GroupWise
Third Party Client Access to GroupWiseThird Party Client Access to GroupWise
Third Party Client Access to GroupWise
 
Gwava Cloud Offering
Gwava Cloud OfferingGwava Cloud Offering
Gwava Cloud Offering
 
Let’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and FeaturesLet’s talk Retain – Requirements, Setup and Features
Let’s talk Retain – Requirements, Setup and Features
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Exchange 2016 Cloud Migration
Exchange 2016 Cloud MigrationExchange 2016 Cloud Migration
Exchange 2016 Cloud Migration
 
Large Scale GWAVA 7
Large Scale GWAVA 7Large Scale GWAVA 7
Large Scale GWAVA 7
 
GWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYINGGWAVA: WHAT THE ANALYSTS ARE SAYING
GWAVA: WHAT THE ANALYSTS ARE SAYING
 
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
RETAIN FOR BLACKBERRY AUDIT AND ARCHIVING SERVICE (BAAS)
 
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines AnwendersRetain richtig nutzen: Archivierung aus der Sicht eines Anwenders
Retain richtig nutzen: Archivierung aus der Sicht eines Anwenders
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

Gwava con retain social

  • 1. 01/31/12 Michael Bell and Thomas Stegemann Retain 3.0 Social Messaging
  • 2. Retain 3.0 What is it? • Big upgrade from 2.x – will require database schema update. Down time required. • Sets up Retain as a true unified messaging discovery platform. • Support for Social Messaging • Office 365 Messaging Archive • Adds Mobile – 3.1 2 © GWAVA Inc, Confidential & Proprietary
  • 3. Top Features and Functionality 1) Retain for Social Messaging 2) Simplified Search Interface 3) Stats Server 4) Office 365 module 5) Modular Licensing model 3 © GWAVA Inc, Confidential & Proprietary
  • 4. Unified Archiving Facebook • Wall posts and status updates • Messages • Friend requests Twitter • Tweets • Direct messages 4 © GWAVA Inc, Confidential & Proprietary
  • 5. Retain for Social Messaging New Module allows for Facebook and Twitter archiving. How does it work? RSM requires the use of a proxy that sits between the end user and Facebook/Twitter. There are three different methods to achieve this. In order of simplicity to set up and configure: 1) Agent running on end user computers 2) Integration with an existing iCAP enabled security device 3) Deployment of RSM Proxy (Netbox Blue VM) 5 © GWAVA Inc, Confidential & Proprietary
  • 6. Retain for Social Messaging Agent on end user computers: • Lightweight application that can be deployed to workstations and laptops • Watches for traffic to Facebook or Twitter and captures that data. • Caches that data then sends to Retain on scheduled basis. This is the easiest method to enable RSM because it doesn’t require the configuration and maintenance of any new major network appliance. 6 © GWAVA Inc, Confidential & Proprietary
  • 7. Retain for Social Messaging Integration with iCAP enabled device • iCAP is an industry standard language proxies understand. • RSM can make use of this by uploading it’s iCAP definitions to a compatible device (web proxy/firewall). • This removes the need to set up a new device in the customer’s network. 7 © GWAVA Inc, Confidential & Proprietary
  • 8. Retain for Social Messaging In essence, RSM is a “man-in-the-middle” for traffic to and from Facebook and Twitter. Data is collected on the proxy. Retain collects this data on a scheduled basis. RSM can also grab encrypted HTTPS traffic. A new CA certificate will need to be pushed out to or installed on end-user computers to avoid security warnings (except for when using the agent option). 8 © GWAVA Inc, Confidential & Proprietary
  • 9. Deployment Options & Architecture 9 © GWAVA Inc, Confidential & Proprietary
  • 10. Retain Archive Feed 10 © GWAVA Inc, Confidential & Proprietary
  • 11. Keyword Search 11 © GWAVA Inc, Confidential & Proprietary
  • 12. Intelligent Threading 12 © GWAVA Inc, Confidential & Proprietary