This document provides an overview of cloud computing. It discusses how cloud computing works by providing on-demand access to computing resources over the internet. It describes the key characteristics of cloud computing like on-demand self-service, broad network access, resource pooling and rapid elasticity. The document also outlines different types of cloud services including Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). Finally, it discusses some benefits of cloud computing like enabling remote work and collaboration.
Lesson 1 in Cloud – Read Instructions Carefully - session sponsored by VocusAmazon Web Services
Brett Looney from Amazon Web Services and Luke MacKinnon from Vocus will provide a lesson on cloud computing. Vocus is a national provider of fiber, Ethernet, internet, data center, cloud, and unified communications services across Australia and New Zealand. The lesson will cover Vocus's cloud compute, backup and archive, and disaster recovery services, as well as their Cloud Connect service which provides private, high-speed connections to public clouds like AWS.
Erik Weaver, ETC Cloud Project Manager's presentation in the Storage and Archive track at the Media & Entertainment Cloud Symposium on November 8, 2016
The document provides an introduction to cloud computing and Amazon Web Services (AWS), describing characteristics of cloud computing including scalability, reliability, and cost reduction. It explains the three main service models of cloud computing - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) - and how AWS offers these services globally through regions and availability zones. Key AWS services are introduced, including Amazon Simple Storage Service (Amazon S3) for object storage in the cloud.
From Monolith to Microservices - Containerized Microservices on AWS - April 2...Amazon Web Services
Learning Objectives:
• Understand key microservices concepts and common patterns
• Learn how to deploy microservices on Amazon ECS
What are monoliths, what are microservices, how do containers fit into the picture, and how do I do this all in production?
In this session, we will explore the reasoning and concepts behind microservices and how you can transform monolithic apps into microservices. We will discuss how containers simplify building microservices-based applications, and we will walk through a number of patterns used by our customers to run their microservices platforms. We will also dive deep into some of the challenges of running microservices, such as load balancing, service discovery, and secrets management, and we’ll see how Amazon EC2 Container Service (ECS) can help address them. We’ll also demo how you can easily deploy complex microservices applications using Amazon ECS.
Securing your cloud perimeter with azure network security brk3185jtaylor707
This document discusses Azure network security features for securing the cloud perimeter and implementing a zero trust architecture. It covers Azure Virtual WAN for connecting and segmenting networks, Azure Firewall for security policy enforcement across distributed networks, and Azure Private Link for private connectivity to PaaS resources without an internet accessible IP address. Other relevant security services mentioned include Azure Web Application Firewall, Azure Bastion for secure RDP/SSH access without a public IP, and Azure DDoS Protection.
The document provides an overview of cloud computing concepts including definitions, characteristics, deployment and service models. It defines cloud computing as providing on-demand access to computing resources and applications over the internet. The key characteristics are on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. The common deployment models are public, private and hybrid clouds. The main service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Hybrid Cloud Storage: Why HUSCO International Left Traditional Storage BehindAmazon Web Services
When CIO Eric Hanson joined HUSCO International’s leadership team, he quickly set about identifying opportunities for his organization to reduce storage costs and improve performance. Using his previous experience at a multi-location manufacturing firm, he determined that HUSCO International’s challenges with file latency, increasing storage costs, and inability to collaborate cross-site could be solved by transitioning from traditional storage using NetApp filers to a consolidated cloud infrastructure powered by Panzura and Amazon S3.
Register for our upcoming webinar to learn how HUSCO International is using Panzura and Amazon S3 to take advantage of cloud storage economics that has the potential to save the company hundreds of thousands of dollars annually.
This document provides an overview of cloud computing. It discusses how cloud computing works by providing on-demand access to computing resources over the internet. It describes the key characteristics of cloud computing like on-demand self-service, broad network access, resource pooling and rapid elasticity. The document also outlines different types of cloud services including Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). Finally, it discusses some benefits of cloud computing like enabling remote work and collaboration.
Lesson 1 in Cloud – Read Instructions Carefully - session sponsored by VocusAmazon Web Services
Brett Looney from Amazon Web Services and Luke MacKinnon from Vocus will provide a lesson on cloud computing. Vocus is a national provider of fiber, Ethernet, internet, data center, cloud, and unified communications services across Australia and New Zealand. The lesson will cover Vocus's cloud compute, backup and archive, and disaster recovery services, as well as their Cloud Connect service which provides private, high-speed connections to public clouds like AWS.
Erik Weaver, ETC Cloud Project Manager's presentation in the Storage and Archive track at the Media & Entertainment Cloud Symposium on November 8, 2016
The document provides an introduction to cloud computing and Amazon Web Services (AWS), describing characteristics of cloud computing including scalability, reliability, and cost reduction. It explains the three main service models of cloud computing - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) - and how AWS offers these services globally through regions and availability zones. Key AWS services are introduced, including Amazon Simple Storage Service (Amazon S3) for object storage in the cloud.
From Monolith to Microservices - Containerized Microservices on AWS - April 2...Amazon Web Services
Learning Objectives:
• Understand key microservices concepts and common patterns
• Learn how to deploy microservices on Amazon ECS
What are monoliths, what are microservices, how do containers fit into the picture, and how do I do this all in production?
In this session, we will explore the reasoning and concepts behind microservices and how you can transform monolithic apps into microservices. We will discuss how containers simplify building microservices-based applications, and we will walk through a number of patterns used by our customers to run their microservices platforms. We will also dive deep into some of the challenges of running microservices, such as load balancing, service discovery, and secrets management, and we’ll see how Amazon EC2 Container Service (ECS) can help address them. We’ll also demo how you can easily deploy complex microservices applications using Amazon ECS.
Securing your cloud perimeter with azure network security brk3185jtaylor707
This document discusses Azure network security features for securing the cloud perimeter and implementing a zero trust architecture. It covers Azure Virtual WAN for connecting and segmenting networks, Azure Firewall for security policy enforcement across distributed networks, and Azure Private Link for private connectivity to PaaS resources without an internet accessible IP address. Other relevant security services mentioned include Azure Web Application Firewall, Azure Bastion for secure RDP/SSH access without a public IP, and Azure DDoS Protection.
The document provides an overview of cloud computing concepts including definitions, characteristics, deployment and service models. It defines cloud computing as providing on-demand access to computing resources and applications over the internet. The key characteristics are on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. The common deployment models are public, private and hybrid clouds. The main service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Hybrid Cloud Storage: Why HUSCO International Left Traditional Storage BehindAmazon Web Services
When CIO Eric Hanson joined HUSCO International’s leadership team, he quickly set about identifying opportunities for his organization to reduce storage costs and improve performance. Using his previous experience at a multi-location manufacturing firm, he determined that HUSCO International’s challenges with file latency, increasing storage costs, and inability to collaborate cross-site could be solved by transitioning from traditional storage using NetApp filers to a consolidated cloud infrastructure powered by Panzura and Amazon S3.
Register for our upcoming webinar to learn how HUSCO International is using Panzura and Amazon S3 to take advantage of cloud storage economics that has the potential to save the company hundreds of thousands of dollars annually.
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
Smartronix specializes in cybersecurity, infrastructure services, and application development. They are an AWS partner and have over 50 AWS specialists. They have experience migrating large government websites to AWS, including Treasury.gov and Recovery.gov. When building applications on AWS, security is a shared responsibility between AWS and the customer. AWS is responsible for security of the cloud infrastructure, while customers are responsible for security in their operating systems, applications, network configuration and more. Smartronix can help customers implement security best practices and leverage AWS security features.
Aidan Finn gave an overview of Microsoft Azure, including what it is, what capabilities it provides, and how it compares to competitors. Azure is a cloud computing platform that allows customers to run applications and store data across global data centers managed by Microsoft. It provides infrastructure as a service (IaaS), platform as a service (PaaS), and data services. Azure offers consistent hybrid capabilities with on-premises environments, a global footprint, and continuous innovation through new features and services.
- The document provides guidance on implementing security best practices on AWS using a prescriptive approach, beginning with understanding AWS's shared security responsibility model and then covering topics like building compliance foundations, integrating identity and access management, enabling detective controls, establishing network security, implementing data protection, optimizing change management, and automating security functions.
- It highlights AWS services and features for each topic and includes case studies showing how organizations have improved security and saved money by leveraging AWS security tools and services.
This presentation is a basic description of Microsoft Azure. It gives an idea about the Azure - What is Azure?, What are its advantages? and it also enlists a few services provided by Microsoft Azure. The basic idea of Billing and cost management is also provided in the presentation along with the comparison of Azure with AWS and Google Cloud. This presentation also enlists a few business partners of Microsoft Azure.
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAmazon Web Services
Monitoring and making sense of infrastructure data can be an arduous process. Managing a volume of API calls from more than one million active users every minute presents an even more complex and demanding challenge. Using Amazon Web Services (AWS) and Datadog, Grindr overcame a series of infrastructure challenges by both implementing and managing highly scalable, high availability, and top performing infrastructure, as well as aggregating, analyzing, and acting on key infrastructure data KPIs.
The document summarizes a talk on cloud security featuring three speakers. Nikola Bozinovic of Frame discussed how their company provides a secure cloud platform for delivering virtual applications and desktops from the cloud. Matt Keil of Palo Alto Networks emphasized the importance of visibility, segmentation, and policy consistency for cloud security. Michael Schmidt of Nutonian described how their AI techniques can discover patterns in large security data sets that may indicate threats.
Five Steps to Creating a Secure Hybrid Cloud ArchitectureAmazon Web Services
A hybrid Architecture is one of the easiest ways to securely address new application requirements and cloud-first development initiatives. This approach allows you to start small and expand as your requirements change while maintaining a strong security posture. In this session, you will learn the 5 key steps to building a hybrid architecture on AWS using the VM-Series next-generation firewall.
This document provides an overview of architecting applications for the AWS cloud. It discusses key AWS cloud computing attributes like scalability, on-demand provisioning, and efficiency of experts. It also outlines best practices like designing for failure, loose coupling, dynamism, and security. Specific AWS services are mapped to common application needs like compute, storage, content delivery, databases, and more. Overall the document aims to educate readers on how to leverage AWS architectural principles and services.
Organizations that work with a variety of third-parties in a cloud-based environment are challenged with finding a scalable and elastic security solution, that also meets their partners’ regulations and remains easy-to-use. Barracuda delivers cloud-connected security to simplify your IT environment, and their Web Application Firewall is an elastic and scalable solution for AWS that adapts to and deters evolving threats in a cloud environment. Iris Solutions, a multi-national cloud based enterprise software provider, needed to secure their eSignature SaaS with a tool that facilitated elasticity and scalability to help streamline expansion into several different markets, while meeting the strict regulations they encountered. Register for our upcoming webinar to learn why Iris chose to integrate Barracuda Web Application Firewall with AWS Services, such as Amazon CloudWatch, AWS Elastic Load Balancing, and AWS Identity and Access Management, to overcome their challenge without slowing the pace of transactions.
Join us to learn:
• Best practices for securing web-facing applications on AWS
• The features and benefits of using Barracuda WAF on AWS to protect web-facing applications from targeted and automated attacks
• Insights on the flexible deployment options that Barracuda offers to best complement your AWS environment
Who Should Attend:
Directors, Security Managers, Security Engineers, Security Architects, IT System Administrators, System Administrators, IT Administrators, IT Managers, IT Architects, IT Security Engineers, Business Decision Makers
During the session we will describe common methods used to create a Hybrid Cloud with AWS. We step through successful operational models, how to get started, and tools to simplify operations. We will explore topics such as networking, directories, DNS, and security. Importantly, we will cover ongoing operational and management practices.
Speaker: Phil Barlow, Solutions Architect, Amazon Web Services
Featured Customer - AMP
Summer School Scale Cloud Across the EnterpriseWSO2
The document discusses scaling cloud strategies across the enterprise. It addresses challenges in application development and cloud governance. It then covers Platform as a Service capabilities and architectures, including tenant scaling methods. The document also discusses optimizing cloud performance through asset lifecycles and DevOps principles and processes. It emphasizes the importance of cloud-aware application design.
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Web Services
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). We will discuss core VPC concepts including picking your IP space, subnetting, routing, security, NAT and VPC Endpoints.
The document discusses DevOps practices at Amazon and Scania. It provides an overview of how Amazon transitioned from monolithic applications to microservices and two-pizza teams to enable continuous delivery. It also describes how Scania evolved from sporadic releases to adopting microservices and achieving 30+ deployments per day through autonomous teams. The document promotes infrastructure as code, automated deployments, and empowering developers through tools like AWS Code services to establish continuous delivery practices.
AWS Core Services Overview, Immersion Day Huntsville 2019Amazon Web Services
The document provides an overview of AWS core services including compute, storage, database, analytics, machine learning, IoT, and mobile services. It discusses AWS' breadth and depth of services across infrastructure, application services, management tools, and developer tools. It also highlights AWS' leadership in cloud computing with the largest customer base and most comprehensive set of services and features.
An Evolving Security Landscape – Security Patterns in the CloudAmazon Web Services
Availability of cloud computing is helping Financial Services organizations realize accelerated go-to-market speeds, global scalability, and cost efficiencies. This new world forces considerations for security programs – what is different in the cloud and what do I do differently? AWS Security Architects will share protocols that need to be considered in the cloud, on premises, or in a hybrid model. They will also share best practices, lessons learned, efficiencies, and design patterns and architectures unique to cloud.
Azure Infrastructure Services provides compute, network, and storage services on Microsoft's Azure cloud platform. The presentation discusses how IT infrastructure supports business objectives, outlines various Azure services including virtual machines, networking, storage and identity/access management, and demonstrates how to migrate applications to Azure through strategies like lift and shift or refactoring for the cloud. It also compares Azure services to analogous offerings on AWS.
Introduction to Cloud Computing
Fundamentals of AWS
Amazon Core Services
Learning to Build on #awscloud
My Journey (on request, had mentioned my journey too :) )
Josep Blanquer, Sr. Systems Architect at RightScale, led this session at the RightScale User Conference 2010 in Santa Clara.
Session Abstract: Deploying in multi-cloud environments involves much more than just choosing which cloud provider to use. It requires seamlessly deploying parts of a company's infrastructure across multiple clouds that function in concert while spanning infrastructure providers. In this session, you'll learn about the abstractions necessary to deliver portability and ease of management in a multi-cloud environment. Some important concepts to address include image management, template management, mixed deployments and data portability. We'll present examples of multi-cloud scenarios and describe the design principles to consider when architecting deployments that must span and migrate across different clouds and providers.
How to Accelerate the Adoption of AWS and Reduce Cost and Risk with a Data F...Amazon Web Services
Learn about customer use cases and the latest innovations from NetApp that allow organisations to create a data fabric that enables seamless and secure movement of data in hybrid IT environments.
This document discusses using a "Security by Design" approach on AWS to help customers modernize their technology governance and continuously comply with regulations. It describes building security into every layer, automating security operations, and using AWS services like Config, GuardDuty, and Inspector to continuously monitor for compliance. The Lunar Way case study shows how they use multiple AWS accounts, security groups, and AWS Config custom rules to meet financial regulations and continuously monitor their AWS infrastructure for compliance.
1. Hosted Exchange provides email, calendar, contacts and file sharing tools for mobile users along with admin controls over security and management without the need for on-premises hardware or software.
2. Exchange 2013 and Lync 2013 enhance mobility, collaboration and productivity for users across devices while admins benefit from simplified management.
3. Migrating to the cloud-based Hosted Exchange solution provides a worry-free experience for admins and users with reliable performance, security and round-the-clock support.
The document outlines Zimbra's roadmap for product development over the next few years. In 2014, Zimbra will focus on developing a new HTML5 mobile experience, adding support for Exchange Web Services to support Outlook clients, implementing an always-on architecture (phase 1), and enhancing the Zimbra Community. Looking ahead to 2015, Zimbra plans to add capabilities for instant messaging, real-time document collaboration, complete phase 2 of the always-on architecture, and further integrate file sync and share functionality across devices and social communities. The roadmap is aimed at delivering a unified collaboration experience across mail, voice, contacts, calendar, files and social through any device or channel.
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
Smartronix specializes in cybersecurity, infrastructure services, and application development. They are an AWS partner and have over 50 AWS specialists. They have experience migrating large government websites to AWS, including Treasury.gov and Recovery.gov. When building applications on AWS, security is a shared responsibility between AWS and the customer. AWS is responsible for security of the cloud infrastructure, while customers are responsible for security in their operating systems, applications, network configuration and more. Smartronix can help customers implement security best practices and leverage AWS security features.
Aidan Finn gave an overview of Microsoft Azure, including what it is, what capabilities it provides, and how it compares to competitors. Azure is a cloud computing platform that allows customers to run applications and store data across global data centers managed by Microsoft. It provides infrastructure as a service (IaaS), platform as a service (PaaS), and data services. Azure offers consistent hybrid capabilities with on-premises environments, a global footprint, and continuous innovation through new features and services.
- The document provides guidance on implementing security best practices on AWS using a prescriptive approach, beginning with understanding AWS's shared security responsibility model and then covering topics like building compliance foundations, integrating identity and access management, enabling detective controls, establishing network security, implementing data protection, optimizing change management, and automating security functions.
- It highlights AWS services and features for each topic and includes case studies showing how organizations have improved security and saved money by leveraging AWS security tools and services.
This presentation is a basic description of Microsoft Azure. It gives an idea about the Azure - What is Azure?, What are its advantages? and it also enlists a few services provided by Microsoft Azure. The basic idea of Billing and cost management is also provided in the presentation along with the comparison of Azure with AWS and Google Cloud. This presentation also enlists a few business partners of Microsoft Azure.
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAmazon Web Services
Monitoring and making sense of infrastructure data can be an arduous process. Managing a volume of API calls from more than one million active users every minute presents an even more complex and demanding challenge. Using Amazon Web Services (AWS) and Datadog, Grindr overcame a series of infrastructure challenges by both implementing and managing highly scalable, high availability, and top performing infrastructure, as well as aggregating, analyzing, and acting on key infrastructure data KPIs.
The document summarizes a talk on cloud security featuring three speakers. Nikola Bozinovic of Frame discussed how their company provides a secure cloud platform for delivering virtual applications and desktops from the cloud. Matt Keil of Palo Alto Networks emphasized the importance of visibility, segmentation, and policy consistency for cloud security. Michael Schmidt of Nutonian described how their AI techniques can discover patterns in large security data sets that may indicate threats.
Five Steps to Creating a Secure Hybrid Cloud ArchitectureAmazon Web Services
A hybrid Architecture is one of the easiest ways to securely address new application requirements and cloud-first development initiatives. This approach allows you to start small and expand as your requirements change while maintaining a strong security posture. In this session, you will learn the 5 key steps to building a hybrid architecture on AWS using the VM-Series next-generation firewall.
This document provides an overview of architecting applications for the AWS cloud. It discusses key AWS cloud computing attributes like scalability, on-demand provisioning, and efficiency of experts. It also outlines best practices like designing for failure, loose coupling, dynamism, and security. Specific AWS services are mapped to common application needs like compute, storage, content delivery, databases, and more. Overall the document aims to educate readers on how to leverage AWS architectural principles and services.
Organizations that work with a variety of third-parties in a cloud-based environment are challenged with finding a scalable and elastic security solution, that also meets their partners’ regulations and remains easy-to-use. Barracuda delivers cloud-connected security to simplify your IT environment, and their Web Application Firewall is an elastic and scalable solution for AWS that adapts to and deters evolving threats in a cloud environment. Iris Solutions, a multi-national cloud based enterprise software provider, needed to secure their eSignature SaaS with a tool that facilitated elasticity and scalability to help streamline expansion into several different markets, while meeting the strict regulations they encountered. Register for our upcoming webinar to learn why Iris chose to integrate Barracuda Web Application Firewall with AWS Services, such as Amazon CloudWatch, AWS Elastic Load Balancing, and AWS Identity and Access Management, to overcome their challenge without slowing the pace of transactions.
Join us to learn:
• Best practices for securing web-facing applications on AWS
• The features and benefits of using Barracuda WAF on AWS to protect web-facing applications from targeted and automated attacks
• Insights on the flexible deployment options that Barracuda offers to best complement your AWS environment
Who Should Attend:
Directors, Security Managers, Security Engineers, Security Architects, IT System Administrators, System Administrators, IT Administrators, IT Managers, IT Architects, IT Security Engineers, Business Decision Makers
During the session we will describe common methods used to create a Hybrid Cloud with AWS. We step through successful operational models, how to get started, and tools to simplify operations. We will explore topics such as networking, directories, DNS, and security. Importantly, we will cover ongoing operational and management practices.
Speaker: Phil Barlow, Solutions Architect, Amazon Web Services
Featured Customer - AMP
Summer School Scale Cloud Across the EnterpriseWSO2
The document discusses scaling cloud strategies across the enterprise. It addresses challenges in application development and cloud governance. It then covers Platform as a Service capabilities and architectures, including tenant scaling methods. The document also discusses optimizing cloud performance through asset lifecycles and DevOps principles and processes. It emphasizes the importance of cloud-aware application design.
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Web Services
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). We will discuss core VPC concepts including picking your IP space, subnetting, routing, security, NAT and VPC Endpoints.
The document discusses DevOps practices at Amazon and Scania. It provides an overview of how Amazon transitioned from monolithic applications to microservices and two-pizza teams to enable continuous delivery. It also describes how Scania evolved from sporadic releases to adopting microservices and achieving 30+ deployments per day through autonomous teams. The document promotes infrastructure as code, automated deployments, and empowering developers through tools like AWS Code services to establish continuous delivery practices.
AWS Core Services Overview, Immersion Day Huntsville 2019Amazon Web Services
The document provides an overview of AWS core services including compute, storage, database, analytics, machine learning, IoT, and mobile services. It discusses AWS' breadth and depth of services across infrastructure, application services, management tools, and developer tools. It also highlights AWS' leadership in cloud computing with the largest customer base and most comprehensive set of services and features.
An Evolving Security Landscape – Security Patterns in the CloudAmazon Web Services
Availability of cloud computing is helping Financial Services organizations realize accelerated go-to-market speeds, global scalability, and cost efficiencies. This new world forces considerations for security programs – what is different in the cloud and what do I do differently? AWS Security Architects will share protocols that need to be considered in the cloud, on premises, or in a hybrid model. They will also share best practices, lessons learned, efficiencies, and design patterns and architectures unique to cloud.
Azure Infrastructure Services provides compute, network, and storage services on Microsoft's Azure cloud platform. The presentation discusses how IT infrastructure supports business objectives, outlines various Azure services including virtual machines, networking, storage and identity/access management, and demonstrates how to migrate applications to Azure through strategies like lift and shift or refactoring for the cloud. It also compares Azure services to analogous offerings on AWS.
Introduction to Cloud Computing
Fundamentals of AWS
Amazon Core Services
Learning to Build on #awscloud
My Journey (on request, had mentioned my journey too :) )
Josep Blanquer, Sr. Systems Architect at RightScale, led this session at the RightScale User Conference 2010 in Santa Clara.
Session Abstract: Deploying in multi-cloud environments involves much more than just choosing which cloud provider to use. It requires seamlessly deploying parts of a company's infrastructure across multiple clouds that function in concert while spanning infrastructure providers. In this session, you'll learn about the abstractions necessary to deliver portability and ease of management in a multi-cloud environment. Some important concepts to address include image management, template management, mixed deployments and data portability. We'll present examples of multi-cloud scenarios and describe the design principles to consider when architecting deployments that must span and migrate across different clouds and providers.
How to Accelerate the Adoption of AWS and Reduce Cost and Risk with a Data F...Amazon Web Services
Learn about customer use cases and the latest innovations from NetApp that allow organisations to create a data fabric that enables seamless and secure movement of data in hybrid IT environments.
This document discusses using a "Security by Design" approach on AWS to help customers modernize their technology governance and continuously comply with regulations. It describes building security into every layer, automating security operations, and using AWS services like Config, GuardDuty, and Inspector to continuously monitor for compliance. The Lunar Way case study shows how they use multiple AWS accounts, security groups, and AWS Config custom rules to meet financial regulations and continuously monitor their AWS infrastructure for compliance.
1. Hosted Exchange provides email, calendar, contacts and file sharing tools for mobile users along with admin controls over security and management without the need for on-premises hardware or software.
2. Exchange 2013 and Lync 2013 enhance mobility, collaboration and productivity for users across devices while admins benefit from simplified management.
3. Migrating to the cloud-based Hosted Exchange solution provides a worry-free experience for admins and users with reliable performance, security and round-the-clock support.
The document outlines Zimbra's roadmap for product development over the next few years. In 2014, Zimbra will focus on developing a new HTML5 mobile experience, adding support for Exchange Web Services to support Outlook clients, implementing an always-on architecture (phase 1), and enhancing the Zimbra Community. Looking ahead to 2015, Zimbra plans to add capabilities for instant messaging, real-time document collaboration, complete phase 2 of the always-on architecture, and further integrate file sync and share functionality across devices and social communities. The roadmap is aimed at delivering a unified collaboration experience across mail, voice, contacts, calendar, files and social through any device or channel.
Office 365 is a cloud-based subscription service offered by Microsoft that allows users to access the Microsoft Office suite of productivity applications, including Word, Excel, PowerPoint, Outlook and more. Key features include always having the latest version of the apps, collaboration capabilities, 10GB of storage per user, email and calendar access across devices. It provides a familiar Office experience while keeping files secure in the cloud with features like antivirus protection, archiving and data loss prevention.
The document discusses driving enterprise collaboration through cloud technologies. It begins by outlining how collaboration is important but challenging due to factors like mobility, remote work, and social technologies. It then provides an overview of cloud computing and its benefits for collaboration. The main body examines specific collaboration tools available in the cloud like email, file sharing, document management, team sites, and social networks. It compares offerings from Microsoft Office 365 and Google Apps for Business. Finally, it discusses future factors like increased cross-over between tools, the rise of mobile computing, and the growing competition between Microsoft and Google in the enterprise collaboration space.
Webinar - Which Email Archiving Strategy is Right for Your Business?Vaultastic
Regardless of what email solution you use, it is vital to have an email archiving strategy to keep this information available for Ready References (E-Discovery), meet Regulatory Compliance, Manage Mail Store, and ensure Data Security against accidental loss or malicious deletion.
But, what is the best strategy for Email Archival?
● Is subscribing to a Cloud Mail Service with Unlimited Storage enough?
● Do you need a Captive in-House archival system to ensure Privacy?
● Are there ways to ensure Greater Control and Privacy on the Cloud?
● Do you need to move your in-House email set-up to the Cloud in order to Subscribe to a Cloud Archival service?
● What are the Business Benefits of moving to the Cloud?
Cuando la información que tienes en el correo vale más de lo que puedes imagi...LibreCon
La revista ¡Hola! ha apostado para alojar todo su correo en la solución de software libre Zimbra. Aprenderemos a valorar que cuando el contenido de un email puede valer millones de euros, las tecnologías abiertas son clave para garantizar la integridad de tus datos. Autores: Armando Ramos (Asesor técnico en revista ¡HOLA!) y Brendan Cosgrove (Leading Product Management in Zimbra). Librecon.io
The document describes an enterprise email solution called Open Exchange 7 that provides abundant storage, collaboration features, social integration, mobility access, and support. It is designed for small and medium enterprises seeking better connectivity, collaboration, and mobility from their email. The solution includes 25GB email storage, shared calendaring, document sharing, social media integration, mobile access via devices, and 24/7 email support. It uses a scalable architecture on NetApp storage devices to ensure high uptime, security, and availability for customers.
This document discusses the benefits of adopting cloud-based email services over traditional on-premises email. It outlines the top six benefits as cost savings, flexible scalability, improved uptime, simplified administration, improved security, and remote access. It then provides more details on each benefit and discusses some pros and cons of cloud-based email compared to hosting your own email server. Finally, it lists the top five most commonly used free cloud-based email services.
Não conseguiu ir ao Connect 2017? esta apresentação mostra o que aconteceu lá eo que foi apresentado, além de uma análise de de nossos clientes e do mercado
IBM Lotus Software - Collaboration Solutions - Executive OverviewDvir Reznik
IBM Lotus Software provides collaboration solutions including Lotus Notes and Domino which have a 42% market share worldwide. Lotus Software has experienced 16 consecutive quarters of growth and provides solutions used by over half of the global Fortune 100 companies. The document discusses Lotus Software's portfolio of products which provide capabilities such as messaging, file sharing, unified communications, and social software to help businesses foster innovation, maximize employee effectiveness, and embrace trends in today's business environment.
Hosted Exchange 2013 provides email, calendar, contacts and document sharing capabilities through a streamlined interface accessible on any device. It is hosted and maintained by IT professionals, requiring no on-premise hardware or staff. This makes it a cost-effective option for businesses compared to traditional on-premise deployments. Hosted Exchange offers 99.999% uptime through a redundant architecture in certified data centers. It allows mobility through real-time email access on smartphones and flexibility through the Outlook Web App interface on any platform.
This document discusses various gadgets, gizmos, and technologies that can help improve productivity for real estate appraisers. It covers dual monitors, social networking, online backups, cloud storage, offline storage, syncing services, storage devices, email programs versus webmail providers, laser measuring devices, online calendars, GPS devices, remote desktops, calculators, voice recognition software, eFax, report writing software, and integrated data services.
Solvion Trendwerkstatt - Microsoft TeamsHolzerKerstin
In der Solvion Trendwerkstatt zu Microsoft Teams erfahren die Teilnehmer alle Trends rund um die Collaboration Lösung Teams. Microsoft MVP Thomas Gölles leitet durch den Workshop.
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...Primend
Dokumentidele on vaja lisaks arvutile ligi pääseda ka telefonist ja tahvelarvutist. Seda on vaja teha mugavalt ja turvaliselt. Tõnis räägib SharePoint Online’ist, OneDrive for Businessist, Skype for Businessist ja Yammerist ning sellest, kuidas need teenused infohalduse jaoks tööle panna.
This document summarizes Dropbox for Business, a file sharing and storage solution. It notes that over half of employees now work from multiple devices and locations, requiring access to files from anywhere. Existing solutions do not support this new way of working. Dropbox for Business provides syncing and sharing capabilities across devices and platforms to enable collaboration. It offers security features like encryption and remote wiping. Admins have tools to control sharing and track usage. Dropbox for Business supports unlimited storage and file recovery with additional management and security features over the free Dropbox product.
The document discusses several key benefits of Microsoft Office 365 Exchange Online, including allowing users to access important documents, calendar, and contacts from any device while providing flexible pricing plans to meet the needs of businesses of all sizes. It also highlights how Office 365 Exchange Online enables easy collaboration both inside and outside an organization, provides familiar Office functionality in the cloud without requiring new software or training, and ensures data security, compliance and 99.9% availability.
IBM Collaboration Mobile Strategy and a New Way To workLuis Benitez
How can your data and analytics platforms and strategies keep up with a workplace that is ever more mobile and social? IBM can support not only your emerging data and analytics strategies, but connect them with the social and mobile tools people use every day. In this session, you will learn how an IBM collaborative mobile strategy can extend and transform your enterprise. You will see how mobile applications like IBM Connections and IBM Verse can drive employee productivity while they are on the go, by enabling them to use mobile social apps that tap into your enterprise data and analytics platforms.
Similar to Zimbra at Kangaroot / OPEN{virtual} (20)
We all love the chameleon, and SUSE is long known for its Linux OS - but there is so much more in the world of SUSE.
In this session Jurriën will dive into how SUSE is helping organizations accelerate their digital transformation through container management, hybrid cloud IT infrastructure, and IT operations at the Edge.
Because from core, to cloud, to Edge, SUSE is helping firms to innovate everywhere.
This document summarizes SEP's hybrid backup and recovery software. SEP has over 30 years of backup experience and supports backups from SMB to enterprise. Their software is made in Germany and they have a reputation for excellent support. The document outlines SEP's partnerships with companies like SAP, Red Hat, SUSE, and others. It provides information on backup capabilities for virtualization platforms, databases, operating systems, and applications that SEP supports through various agents and integrations.
The document discusses requirements and considerations for selecting open source tools for container orchestration and runtime. It evaluates Ansible, Terraform, Puppet, Kubernetes, and Nomad for orchestration and decides on Nomad for its ease of use and low learning curve. It also selects Consul for service discovery. The document outlines the installation process and architecture, showing how Consul, Nomad, Traefik, Prometheus, Grafana, Loki, and Minio would integrate together. It provides version details and screenshots of the setup. It suggests next steps like full testing and Raspberry Pi support. Managed options from Devfactory are also discussed.
The document outlines the agenda for the OPEN'22 conference, including sessions on Red Hat, new partners like HashiCorp and Confluent, and product sponsor shoutouts. It also discusses Kangaroot's transition to more virtual work over the past two years, emphasizing an anytime/anywhere flexible approach and emphasizing asynchronous collaboration. Lastly, it proposes initiatives like the ROOT Fund to support open source community work, the Automation Factory to advance Ansible skills, and RootStacks with open source infrastructure templates and managed services.
The document discusses open source software and provides examples of its use by government agencies in Belgium. It begins with an anecdote about how the author got introduced to open source software while sailing. It then discusses how open source has risen in popularity due to factors like EU policies encouraging less dependence on closed source software. The document provides examples of government agencies in Belgium that have adopted open source solutions like PostgreSQL and migrated away from proprietary databases. It discusses case studies of the National Forensic Institute and RvIG adopting open source.
Deploying NGINX in Cloud Native KubernetesKangaroot
Using cloud-native application services is easy, it “just works”. Many customers choose them without giving it a second thought. However, these app services vary from cloud to cloud, with differing levels of quality and numbers of features making visibility and control inconsistent across clouds.
And then there is cost…it’s hard to know what your deployment is going to cost until after it’s been built. Often the services must be compiled in a piecemeal fashion and many products carry bloated code that increases costs.
Finally, security is often an afterthought. Moreover, SecOps teams struggle to keep up with the breakneck app release cadence that has become typical. Often they are seen as DevOps viewing them as a major constraint on the ability to deliver software quickly.
In this workshop, we showcase the NGINX solutions for cloud native Kubernetes that will allow you to:
- Reduce tool sprawl and provide a standard set of services
- Control costs with lightweight and easy solutions
- Bring teams together with automation and self‑service capabilities
Cloud demystified, what remains after the fog has lifted. Kangaroot
The document provides an introduction to cloud computing concepts from Infrastructure as a Service (IaaS) to Platform as a Service (PaaS) to Software as a Service (SaaS) to Database as a Service (DBaaS). It discusses different cloud models including private, public, multi-cloud and hybrid clouds. It also covers cloud native technologies like Kubernetes and microservices. The document cautions that while cloud promises flexibility and agility, the realities of cloud adoption require assessing one's specific business needs and whether a cloud provider can truly deliver the desired advantages. It promotes BigAnimal as a fully managed PostgreSQL database service in the cloud to help enterprises with their cloud journeys.
From NetOps to DevOps, modern app teams need a self‑service, API‑driven platform that integrates easily into CI/CD workflows to accelerate app deployment and makes app lifecycle management easier – whether your app has a hybrid or microservices architecture.
Built to manage NGINX Plus instances, NGINX Controller is cloud‑native, secure, and high‑performance. During this webinar, we demonstrate how NGINX Controller can streamline the management of your NGINX Application Services.
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot
The webinar will review a multi-layered framework for PostgreSQL security, with a deeper focus on limiting access to the database and data, as well as securing the data.
Using the popular AAA (Authentication, Authorisation, Auditing) framework EnterpriseDB will cover:
- Best practices for authentication (trust, certificate, MD5, Scram, etc).
- Advanced approaches, such as password profiles.
- Deep dive of authorisation and data access control for roles, database objects (tables, etc), view usage, row-level security, and data redaction.
- Auditing, encryption, and SQL injection attack prevention
Do you want to start with OpenShift but don’t have the manpower, knowledge, e...Kangaroot
Do you want to start with containers or a Kubernetes platform? You don’t have the in-house knowledge, experience, manpower to setup OpenShift? Get OpenShift in a box, managed by Kangaroot.
Digital Transformation requires a change in culture ànd in tools. OpenShift-in-a-box contains a managed platform to give you the tools at a fixed monthly fee ànd workshops & services to help you drive your change in development culture.
Red Hat multi-cluster management & what's new in OpenShiftKangaroot
More and more organisations are not only using container platforms but starting to run multiple clusters of containers. And with that comes new headaches of maintaining, securing, and updating those multiple clusters. In this session we'll look into how Red Hat has solved multi-cluster management, covering cluster lifecycle, app lifecycle, and governance/risk/compliance.
There is no such thing as “Vanilla Kubernetes”Kangaroot
홏홝홚홧홚 홞홨 홣홤 홨홪환홝 황홝홞홣활 홖홨 홑홖홣홞홡홡홖 홆홪홗홚홧홣홚황홚홨. Do you want to start your Digital Transformation, but struggling to find your way in OpenShift or Kubernetes? Together with Red Hat where we'll compare Vanilla Kubernetes with OpenShift. #DigitalTransformation #DevOps #RedHat #Kubernetes #OpenShift #VanillaKubernetes #automation #containers #orchestration
Bechtle AG is a large European IT infrastructure company with over 30 years of experience. It has a comprehensive portfolio of vendor-neutral cloud and IT solutions. Bechtle Clouds provides an enterprise-grade cloud platform through major brands and self-developed services in a multi-cloud environment. Bechtle has existing framework contracts with the Belgian government for services such as Red Hat subscriptions and software/hardware procurement.
Kangaroot open shift best practices - straight from the battlefieldKangaroot
This document discusses best practices for Day 2 operations on OpenShift infrastructure from experts with 20 years of experience in Linux and open source. It provides recommendations around designing highly available etcd clusters, implementing federated Prometheus monitoring across multiple clusters using Prometheus or Thanos, centralized logging with ElasticStack, persistent storage options, container registry considerations, backup solutions using Minio and Velero, application deployments with GitOps, and secrets storage with Vault. The company also provides 24/7 support for customers.
OpenShift 4, the smarter Kubernetes platformKangaroot
OpenShift 4 introduces automated installation, patching, and upgrades for every layer of the container stack from the operating system through application services.
The document provides an agenda for a MongoDB presentation, including an introduction to MongoDB's document model and how it differs from relational databases, how MongoDB brings value to clients with flexibility, performance, versatility and ease of use. It then demonstrates these qualities through MongoDB's features like rich queries, data models, and deployability anywhere. The presentation promotes MongoDB's cloud database as a service Atlas and tools like Compass. It outlines MongoDB's evolution and roadmap. It concludes by providing contact details for the presenter.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
2. 2
WHO IS ZIMBRA?
250+
Employees
540+
Service Providers
1500+
Partners
100 Million+
Mailboxes
140+
Countries
1 Global provider of open core email collaboration software
2 Serving governments, service providers, educational institutions and
small/medium enterprises
3 Delivering email, contacts, calendar, tasks, document sharing & editing,
chat and video functionality
4. 4
EMAIL CONTINUES TO BE THE MAIN DIGITAL ARTERY THAT WORKERS
BELIEVE IS IMPORTANT TO DO THEIR JOBS.
296 billion messages are delivered every day.
Fast & Affordable
Email is widely available
everywhere at a low cost
Asynchronous
Respond later so you can take
time for deep, thoughtful work
Effortless
Information comes to you, not
the other way around
Personal
People, groups and
organizations connect directly,
privately and securely
Historical Record
Durable record, supports
communication around big-
picture discussions
Open & Decentralized
Open standard for reliable
communication is not owned by
any single company
5. 5
Video Conferencing File Storage
Chat Doc Editing
email
contacts
COLLABORATION IS OUR MISSION
Built-In Collaboration
Features
3rd Party Integrations 3rd Party Integrations
calendars
tasks
6. 6
WHERE ZIMBRA EXCELS
Low TCO Secure, Private + Data Sovereignty
Scales from 10 to 10M Users
Anytime, Anywhere, Any Device On-Prem, Cloud or Hybrid Deployment
Open Source Core
8. 8
ZIMBRA WEB CLIENT
Zimbra’s responsive
UI provides an
updated experience
+ consistent, full
functionality across all
devices
All collaboration
applications in one
place - Email,
Calendar, Contacts,
Documents, Tasks,
Chat & Video
Click icon to add picture
9. 9
3RD PARTY INTEGRATIONS (EXTENSIBILITY)
Extensible
• Extensive SOAP & REST APIs
• Zimlet Integration Framework
• Line of Business Applications
Integration Examples
• Chat, Video Calls– Zimbra Connect
• Unified Communications – Cisco, Mitel
• Office Suite – LibreOffice
• Cloud Storage – Zimbra Drive
• Dropbox
• Nextcloud
10. 10
ZIMLETS ACROSS DEVICES
With the new Zimlet framework, Zimlets will work consistently across
your desktop, tablet and mobile devices
12. 12
ZIMBRA CONNECTOR FOR OUTLOOK (ZCO)
All the Power of Zimbra in a
Familiar Desktop Client
Zimbra Connector for Outlook
allow users to keep using
Microsoft Outlook: their user
experience is the same, but they
also have the Enhanced
Features of Zimbra.
Eases migration and on-
boarding.
13. 13
EXCHANGE WEB SERVICES
Business Email Features for your
OS X Devices
Zimbra comes with a server-side
Exchange Web Services interface.
OS X users can create Outlook for
Mac Mail profiles, and have the
following capabilities:
• Synchronization of all Mail
Folders
• Synchronization of all Calendars
• Synchronization of all Contacts
• Synchronization of all Tasks
14. 14
ZIMBRA CONNECT
Making Communication Simple
Zimbra Connect gives your users:
• 1:1 & Group Messaging
• 1:1 & Group Videoconferencing
• Buddy List Management and
Presence
• Message Delivery and Read
Awareness
• File Sharing
• Screen Sharing
• Corporate Messaging (via
Spaces and Channels)
15. 15
MOBILE SYNC
Zimbra Mobile allows your users to synchronize their Zimbra mailbox with their mobile devices
through the Exchange ActiveSync protocol, which is natively supported by the vast majority of mobile
devices.
Exchange ActiveSync (EAS) protocol
The widespread Exchange ActiveSync protocol grants you the highest native compatibility ever.
Synchronize your data with your iPhone, iPad, Android devices using native Apps.
Mobile Device Management (MDM)
Mobile allows Global Admins to perform remote provisioning operations, such remote wipe in
case of theft or to force the use of an unlock code for higher security.
Allow/Block/Quarantine (ABQ)
The Allow/Block/Quarantine (ABQ) feature allows granular control of which mobile devices
can connect to the server. This pre-emptive security feature lets the Zimbra admin keep track of
all mobile devices accessing their Zimbra platform.
16. 16
TWO-FACTOR AUTHENTICATION
• Improve your Security
• Easy to setup
• One time codes, emergency codes
for exceptional situations
• Application codes for legacy
applications
• TOTP (Time-based One-time
Password Algorithm) Applications
for Android, iOS and Windows OS
A combination of two different components. Something that the user knows
(like a password, UserID, etc) and something that the user possesses (like a
smartphone, or USB-key, etc.)
17. 17
ZIMBRA ADMIN CONSOLE
• Simple, Powerful Administration
• Proven open technologies, web-scalable
architecture
• Real-time backup and restore
• Integrated Anti-Spam/Virus
• Bulk user provisioning and
policy management
• Delegated, role-based
administration
• Class-of-service and multi-tenancy
• HSM and storage management
• LDAP, Active Directory integration
• Integrated Archiving and Discovery
On average, 33% less time
is spent administering
Zimbra than MS Exchange*
* Source: University of Pennsylvania case study
18. 18
BACKUP
Real-Time Backup: Backup any
change in the system as soon as
it happens. No more data loss
caused by backup scheduling
issues or because your server
crashed at the wrong moment
6 restore modes: Recover what
you need, from a single item to
an entire domain
19. 19
STORAGE MANAGEMENT
HSM module allows you to manage
multiple volumes and policies in
order to organize and manage your
storage effectively.
• Live storage capacity expansion
• Operation scheduling
• Multi-policy HSM
• Store management tools
• S3 Object Storage support
• Secure operations
20. 20
DELEGATED ADMIN
Grant Delegated Admin rights to domain
users to let them perform administrative
user management tasks, such as setting
quotas, COS and user limits for their
domains in order to free up the platform
Sys Admins from these tasks in multi-
tenancy environments.
• Limited delegated admin access
• Activity logging
• Disk quota limits
• Domain control
• Admin settings reset
21. 21
ZIMBRA ARCHIVE & DISCOVERY (ZAD)
Zimbra Archiving and Discovery
is an optional feature that
enables you to archive all
messages that were delivered
to or sent by Zimbra and to
search across mailboxes.
Providing regulatory
compliance and forensic search
capabilities.