MessageGate included in new e-discovery report

We were included in Gartner analyst Debra Logan’s new "Choosing an E-Discovery Solution in 2007 and 2008" report.  She covers a wide range of needs and vendors with a pretty comprehensive view of the e-discovery landscape.   It is available via the Gartner website.

Although MessageGate is not a pure e-discovery company and we do not provide evidence production and review capabilities, we are seeing the need for smarter ways to sort, classify, and control email under the banner of e-discovery.  As companies begin to tally the cost of litigation, it is making more and more sense to prepare for this unfortunate business reality.  Beyond litigation preparation, we have helped companies with forensic and investigative review of high volumes of email.  Our approach is different than the standard ingest, index, review process of search-oriented solutions.  Rather, we effectively "replay" the messages through our policy engine with rules set to detect certain directions, users/user groups, documents, phrases, times, etc.

A bigger story than the iPhone

This little nugget hasn’t gotten near the coverage it should have as the gushing and accolades (plus a few gripes) roll in for Apple’s newest creation.  RIM’s Blackberry devices are set to go on sale in China in August via China Mobile.  Think the Chinese will experience the addictive grip of these little joys?  You bet.  Here’s the story from the BBC.  Apple might make the iPhone in China, but you can’t buy one there.

Enterprises and End-Users Part 2: Competing interests or shared pain?

Here is the second post on this topic and a look at the issues from the end-user perspective.  Here is the link to Part 1 that covers the enterprise perspective.  End-users have distinct but related pain regarding electronic communications including:

1.  Managing – too many messages from too many places.  A Harris poll I heard referenced recently said the average user gets over 50 messages per day from 7 different modalities (still looking for that report).  I think this number is actually higher as the "average" employee sends & receives 50 emails per day alone.  Regardless, the overload that comes with all this volume makes merely coping difficult let alone getting ahead of it.

2.  Finding – this is about locating "that message/attachment."  Inboxes/Sent folders are file systems and they hold both correspondence and various versions of file attachments.  Search is huge for the end-user and the ability to rapidly get to something previously written or received is on the top of the list.

3.  Communicating – actually connecting and collaborating with someone electronically.  This is the reason and rationale for all these different technologies in the first place and the end goal.  The ones that are easiest to use and most widely accepted are at the top of the list and email is number one on most (if not all) lists.

4.  Shortcuts – the workarounds and realities of how jobs are performed.  The layers of business rules, authentication, security, etc. in enterprise systems makes them an easy target for a workaround.  Just because the latest sales pipeline information is available in the CRM system does not mean that it has not been exported to an Excel file and is being bounced around via email as "spreadsheetware."  Breaches of rules and regulations occur every day in every company mainly by people using workarounds to get their jobs done.

Enterprises and End-Users Part 1: Competing interests or shared pain?

Having spent a great deal of time in conversations about electronic communications over the years and hearing about the pains, needs, and problems, I thought taking a look at this from the enterprise-level and the end-user perspective would be worthwhile.  This will be a two part post with the first one focused on the enterprise perspective.

Here’s a quick list of what I believe drives the enterprise around electronic communications:

  • Threat protection – keeping nasty stuff like viruses and spam out of the network, protecting against intrusion, zombies, hacking, etc.
  • Archiving – storing primarily emails in some way other than pst files, Exchange stores, or back-up tapes
  • e-Discovery/Retrieval – getting at the stuff you have now saved per above in a way that is fast, efficient, and consistent with a subpoena
  • Information security/safeguards – clamping down on both the malicious and non-malicious release of sensitive information via electronic channels
  • Access controls – making sure the right people can access sensitive information
  • Process controls – ensuring adherence to defined procedures for core business processes (contracts, invoicing, customer care, etc.)
  • Audit trails – proving that you have proper controls and oversight in place of your environment – we’ll throw compliance in here as well like NASD 3010-mandated email surveillance
  • Operational costs – the money spent on hardware, bandwidth, software, and staff to run all this stuff
  • Productivity – making sure that the applications and tools available to the company increase productivity so more can be done with less headcount
  • Risk & liability – ensuring that breaches don’t occur, incidents are properly handled, and the "smoking gun" doesn’t happen

No more email for NJ Gov Corzine

Looks like NJ Governor Jon Corzine has gone cold turkey.  Although not on the cutting edge of technology adoption as this NY Times story describes, he does concede “It’ll slow processes down” and “We’ll just have to find another way to do it.”  The reasoning?  Looks like the Gov doesn’t want certain emails disclosed he exchanged with a former "companion" (via Freakonomics) so he has decided to abandon the medium all together.  I suppose he falls into the "the costs outweigh the benefits" camp on the email debate. 

A real world example of the insider threat (and the complexity of addressing it)

This story on a former Boeing employee drives home the challenges and complexities related to properly safeguarding information.  I am not going to get into the merits of the case, but think the story here is indicative of the complexities of trying to solve the problem of a determined insider.

What strikes me about this is that Mr. Eastman obtained over the course of two years more than 320k pages of documents with many labeled as sensitive or confidential.  How’d he do it?  Email, FTP, web site upload?  Nope – thumb drive.  How’d he get access?  In his role, he had wide ranging access or "unfettered access" as the charges describe.  How’d this come to light?  Via an email (of course) received by Boeing entitled "Leaks to the Seattle Times."

Drives home the points on my post about access to information and how that must be part of a broader information security plan.  Even if in his quality control position he needed broad system access, the sheer volume of file access and subsequent download activity pointed to an anomaly in need of further examination.

Is an open wireless platform on the horizon?

Looks like it according to FCC Chairman Kevin Martin:

"Whoever wins this spectrum has to provide … truly open broadband network — one that will open the door to a lot of innovative services for consumers"

Full story on his comments here.  So what does a spectrum auction have to do with anything?  We are talking about the 700MHz wireless spectrum that can be transmitted like TV signals and is being vacated as TV stations go digital. Why is it appealing?  Because it transmits through walls and across rural areas just like TV signals.  What’s the big deal about it being open?  We consumers will get our choice of phone or device and can load the software we want and not have to take what the wireless carrier wants to sell.  Or as Mr. Martin states "You can use any wireless device and download any mobile broadband application, with no restrictions."

Great news.

Enter the free market, capitalist, former FCC Chairman types who want to move in on the wireless crown jewels of AT&T, Verizon, Sprint, & TMobile (that they made the investment to build out).  Combine that with a public policy angle intended to provide police/fire with wireless access and you get Frontier Wireless and former FCC Chairman Reed Hundt.   The stakes are high as Hundt ran the spectrum auctions in the mid-90s and getting access to these means serious opportunity for new players. 

Even Google has a stake in this calling for the above mentioned open platform but has decided not to participate in the auction due to the fact that "incumbent carriers have built-in advantages that will prove difficult to overcome".  Wow…something Google can’t/won’t buy.

Meanwhile, companies like my Kirkland neighbor Clearwire are building this "wimax" type of service offering today having inked deals with DirectTV & Echostar and banking on filling the void as the transition out of the 700mhz spectrum takes place.  Here’s some commentary on that.

The end result will certainly be beneficial as more mobile connectivity is better than less but it promises to be interesting to watch play out.

Updated:

Looks like I was wrong on my point above about something Google won’t buy. 

Postini is to Google as Frontbridge was to Microsoft?

Just about 2 years ago to the day (7/20 to be exact), Microsoft announced its acquisition of Frontbridge touting that "Fully managed services will help ensure e-mail compliance and continuity while providing customers with additional security protection from spam and virus threats."  Fast forward two years and Google acquires Postini to help enterprises "support complex business rules, information security mandates, and an array of legal and corporate compliance issues."

Frontbridge is now part of the Forefront set of services (along with Sybari and a few other acquisitions) covering the client, server, and edge.

So who is chasing whom here?