PRO+ Premium Content/Storage

Thank you for joining!
Access your Pro+ Content below.
Vol. 5 No. 8 October 2006

Outsourcing email archiving: the pros and cons

E-mail archiving outsourcers falling short Service providers need to catch up with the e-mail archiving needs of their customers. Tired of mailbox quotas? Spending too much money on e-mail application servers and storage? The solution is easy: e-mail archiving. So why aren't more of you doing it? Enterprise Strategy Group (ESG) estimates that 70% of you haven't deployed any form of e-mail archiving. Of those who did make an investment, what percentage of mailboxes did you archive--only 20% to 30%? In addition, many who use e-mail archiving software are doing so just because they have to. That's a lot of rhetorical questions and figures, so let me spell things out a bit. There are tangible benefits to e-mail archiving, including complying with record-retention regulations and creating a searchable repository. But the most overlooked benefit is message application infrastructure optimization. For example, organizations that implement mailbox quotas to control storage costs essentially force employees to delete e-mails or create ...

Access this PRO+ Content for Free!

Features in this issue

  • Survey Says: Users name their 10GbE price

  • The right way to provision storage

    Provisioning storage is still mostly a manual job, but solid planning, including the right interested parties and some improved tools, can help ease the chore. Follow these provisioning best practices to gain greater performance and higher disk utilization.

  • Long-term archiving

    With some legislative requirements mandating data be kept for as long as 70 years, your organization needs an archiving plan that defines what data needs to be kept and why. But don't overlook how you'll restore old data when it needs to be accessed.

  • How to manage encryption keys

    Encryption is an effective way to secure data. But managing encryption keys can be a major undertaking. While there are no encompassing key management tools available yet, some apps can help you keep track of proliferating encryption keys.

Columns in this issue