Exchange 2010 Beta released

Here the basic info on exchange 2010 to get the BITS go Here

Microsoft Exchange 2010 helps you achieve new levels of reliability and performance by delivering features that simplify your administration, protect your communications, and delight your users by meeting their demands for greater business mobility.  With new deployment and storage options, enhanced inbox management capabilities and e-mail archiving built-in, Exchange 2010 helps you lower costs and enhance business outcomes.

Flexible and Reliable

With Exchange, choose from on-premises deployment with Exchange Server 2010, a Microsoft hosted service with Exchange Online, or a seamless mix of both.  Microsoft’s commitment to Software plus Services ensures you can decide on your timeline for taking advantage of the flexibility and power of both without interrupting or changing your users’ experience. 

Learn More about Exchange Online

Exchange 2010 offers a simplified approach to high availability and disaster recovery coupled with enhanced maintenance tools to help you achieve new levels of reliability to deliver business continuity.  Building on previous investments in Continuous Replication technologies in Exchange 2007, these investments:

Learn More about High Availability and Disaster Recovery

Lowering the burden on your help desk and yourself is a key way in which you can accomplish more and reduce costs.

Learn More about Administration

Anywhere Access

Enhancements in the latest release of Exchange provide your users access to all of their communications from a single location while making it easier for them to collaborate with each other and their business partners. 

Learn More about Outlook Web Access

Learn More about Mobile Devices

With Exchange 2010, you can replace your traditional voice mail system with a unified solution integrated into the core of your communications platform. This new system will enable your users to receive their voice mail messages right in their inboxes, and manage those voice mail messages just as they do e-mail, with familiar tools like Outlook and Outlook Web Access.

Learn more about Voice Mail with Unified Messaging

Protection and Compliance

Exchange 2010 delivers new, integrated e-mail archiving functionality–including granular multi-mailbox search, item-level retention policies and instant legal hold–making it easier to address compliance and discovery issues. Administrators get centralized control of all archives while users get direct access to their archived mail, including a familiar archive experience that does not disrupt the way they manage their inboxes every day.

Learn More about Archiving and Retention

Exchange 2010 also expands Information Protection and Control support, making it easier to encrypt, moderate and block sensitive or inappropriate e-mail based on specific sender, receiver and content attributes.

Learn More about Information Protection and Control

 

To get the Beta go Here

Need backup storage

Verbatim Americas, LLC joined its parent company, Mitsubishi Kagaku Media (Verbatim/MKM) today in announcing that the first shipments of its new 60GB UDO2 (Ultra Density Optical) Write-once (WORM) media are expected to begin in May. Based on the license agreement with Alliance Storage Technologies, MKM will start producing UDO2 WORM in April at its optical disc manufacturing facility in Mizushima, Japan. MKM, a key developer and manufacturer of UDO media, has been manufacturing premium-quality 30GB UDO1 WORM and RW (rewriteable) media at this factory since 2004 and will continue to do so. Verbatim/MKM will also offer 60GB UDO2 RW media and expects to begin shipping in June.

Like UDO1, UDO2 media uses a single layer recording surface. However, compared to first-generation UDO1, which provides a 30GB media capacity and a maximum read performance of 8MB/sec., UDO2 doubles the media capacity to 60GB and the maximum read performance is increased by 50 percent to 12MB/sec.

With Verbatim/MKM’s 60GB UDO2 write-once media, users can be confident that their recorded data can never be changed or altered. Write-once security and a data life of 50 years make this media the best choice for long-term archives that demand record authenticity. UDO2 technology has also been adopted as the recognized technology standard by ISO, IEC and ECMA, three of the top technical standards organizations in the world.

Proposed “Cybersecurity Act of 2009’’

You need to read the new proposed law and make comments !

Some issues include;

LICENSING AND CERTIFICATION OF CYBERSECURITY PROFESSIONALS.
(a) IN GENERAL.—Within 1 year after the date of enactment of this Act, the Secretary of Commerce shall develop or coordinate and integrate a national licensing, certification, and periodic recertification program for cybersecurity professionals.

Other issues are

MANDATORY LICENSING.-Beginning 3 years after the date of enactment of this Act, it shall be unlawful for any individual to engage in business in the United States, or to be employed in the United  States, as a provider of cybersecurity services to any Federal agency or an information system or network designated by the President, or the President’s designee, as a critical infrastructure information system or network, who is not licensed and certified under the program.

Read the proposed law http://cdt.org/security/CYBERSEC4.pdf

Microsoft Application Compatibility Toolkit 5.5 RELEASED

The Microsoft Application Compatibility Toolkit (ACT) 5.5 helps you understand  application compatibility situation by identifying which applications are compatible with the Windows 7 RC and Windows Vista® operating system and which require further testing. ACT helps customers lower their costs for application compatibility testing, prioritize their applications, and deploy Windows more quickly
You can use the ACT features to:
  • Verify an application’s compatibility with a new version of the Windows operating system, or a Windows Update, including determining your risk assessment.
  • Become involved in the ACT Community, including sharing your risk assessment with other ACT users.
  • Test your Web applications and Web sites for compatibility with new releases and security updates to the Windows® Internet Explorer® Internet browser.

You can download the Microsoft Application Compatibility Toolkit (ACT) here

Microsoft Security Intelligence Report

Microsoft Security Intelligence Report, which showed a significant increase in rogue security software and evidence that threats are predominantly targeting common third-party desktop applications. This version of the report also showed that the No. 1 reason for data breaches remains lost and stolen computer equipment.

Rogue security software, also known as “scareware,” takes advantage of users’ desire to keep their computers protected. The rogue software lures them into paying for protection that, unknown to them, is actually malware offering little or no real protection, and is often designed to steal personal information. The Microsoft Security Intelligence Report shows that such programs are now among the top threats around the world. For example, two rogue families, Win32/FakeXPA and Win32/FakeSecSen, were detected on more than 1.5 million computers by Microsoft software, catapulting them into the top 10 threats in the second half of the year. In addition, Win32/Renos, a threat that is used to deliver rogue security software, was detected on 4.4 million unique computers, an increase of 66.6 percent over the first half of 2008

For home user to learn how to protect you computer go to http://www.microsoft.com/protect

Enterprise customers should use the Microsoft Security Assessment Tool (MSAT), available at http://technet.microsoft.com/en-us/security/cc185712.aspx, to help assess weaknesses in their IT security environment and build a plan to address the risks.

To see the full report go to http://www.microsoft.com/sir.

New Windows server 2008 SKU For Very Small Business

The New Cost-Effective Technology Foundation

Microsoft has see the trend in netbooks and has announced a new technology for a server for up to 15 users. Windows Server Foundation lets employees exchange data securely, without requiring e-mail or the Internet access, on  local network It’s an affordable platform for the core portfolio of IT capabilities, including file and print sharing, remote access and security. A simple and familiar Windows experience makes it easy for organizations to get up and running.

 

 

 

 

 

This will be sold via OEM or Microsoft partners.

To learn more go to the Windows Server 2008 Foundation site

A Chronology of Data Breaches

I been asked can you give me a list of privacy breaches. There are many site on the internet where you can go to find this information.

The site I reference many time during my talks is www.privacyrights.org/

The link to the directly see A Chronology of Data Breaches is here.

This show ho many companies have issues with protecting private data. over 253,743,138 records containing sensitive personal information have been expose as of today, THAT we know of !