frontbridge business & technology james hamilton gm frontbridge technologies...

32
FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies [email protected]

Post on 18-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

FrontBridge Business & Technology

James HamiltonGM FrontBridge Technologies

[email protected]

Page 2: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Agenda

FrontBridge OverviewFrontBridge OverviewCustomers & Business modelCustomers & Business model

Global, Load-Balanced NetworkGlobal, Load-Balanced NetworkFrontBridge Service OfferingsFrontBridge Service Offerings

Email SecurityEmail SecurityInbound: Anti-Virus, Anti-Spam, Content & Policy Inbound: Anti-Virus, Anti-Spam, Content & Policy FilteringFilteringOutbound: Anti-Virus & Information Leak ProtectionOutbound: Anti-Virus & Information Leak ProtectionBusiness-to-Customer email encryptionBusiness-to-Customer email encryption

Message ArchivingMessage ArchivingArchiving & AMC DemoArchiving & AMC Demo

Active Message ContinuityActive Message Continuity

Page 3: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

FrontBridge SnapshotOverviewOverview

Founded 1999Founded 1999160 employees in US, Canada and Europe160 employees in US, Canada and Europe80 in R&D, Client Support & Operations80 in R&D, Client Support & Operations

Moved HQ team from LA to RedmondMoved HQ team from LA to RedmondWinnipeg team stays in placeWinnipeg team stays in place

Microsoft Acquired Aug 31, 2005Microsoft Acquired Aug 31, 2005

Global CustomersGlobal Customers3,200 customers world-wide3,200 customers world-wideCoverage in leading verticalsCoverage in leading verticals

Financial services, life sciences, Financial services, life sciences, manufacturing, legal, healthcaremanufacturing, legal, healthcare

Global Network Global Network Nine globally-distributed data centersNine globally-distributed data centersProcessing over 6 billion messages per Processing over 6 billion messages per monthmonth100% historic uptime100% historic uptime

Eight global partners & direct sales forceEight global partners & direct sales forceGlobal Recognition Global Recognition

Analyst, press endorsement as market Analyst, press endorsement as market visionaryvisionaryLeader category in Gartner magic Leader category in Gartner magic quadrantquadrant

Customers…

Global Distribution…

Awards…

Page 4: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Business EnvironmentBusiness Environment

Security Vulnerabilities Still ExistSecurity Vulnerabilities Still Exist Spam, viruses and phishing still plague inboxesSpam, viruses and phishing still plague inboxes Closer relationship between viruses and spamCloser relationship between viruses and spam Companies ill-equipped to stay ahead of threatsCompanies ill-equipped to stay ahead of threats

E-mail Retention is Becoming a Primary E-mail Retention is Becoming a Primary ConcernConcern

IntenseIntense Pressure on IT to Improve Productivity Pressure on IT to Improve Productivity Focus on projects that provide competitive Focus on projects that provide competitive

advantageadvantage Make mission-critical systems more reliableMake mission-critical systems more reliable Deploy Secure, Reliable, Manageable, & Cost-Deploy Secure, Reliable, Manageable, & Cost-

EffectiveEffective

Compliance: Need a complete, tamper-proof Compliance: Need a complete, tamper-proof archivearchive

e-Discovery: Need to store, find & produce e-Discovery: Need to store, find & produce information in a complete & timely mannerinformation in a complete & timely manner

Page 5: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Manage cost and Manage cost and complexitycomplexity

Secure, protect Secure, protect and complyand comply

Inbox value and Inbox value and accessaccess

No HW/SW to No HW/SW to install and manage install and manage

Outsource routine Outsource routine IT managementIT management

Predictable Predictable subscription based subscription based serviceservice

Scalable at no Scalable at no additional costadditional cost

Eliminate threats Eliminate threats before they reach before they reach the networkthe network

Policy-compliant Policy-compliant infrastructureinfrastructure

Service-based e-Service-based e-mail archiving for mail archiving for rapid deployment rapid deployment

Eliminate spam Eliminate spam and viruses from and viruses from the e-mail stream the e-mail stream to boost to boost productivityproductivity

Reliable e-mail Reliable e-mail availability and availability and continuity continuity systemssystems

Recover from Recover from unplanned unplanned outages or outages or disastersdisasters

Meeting Messaging Meeting Messaging ChallengesChallenges

Page 6: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Focus: Total Message ManagementFocus: Total Message Management

Partner & direct sales modelPartner & direct sales model2 to 3 year subscriptions with monthly 2 to 3 year subscriptions with monthly paymentpayment

Channel: Direct, white label with Telcos, & Channel: Direct, white label with Telcos, & resellersresellers

Typical customerTypical customer1000-2000 seats for Filtering, 400-500 seats for 1000-2000 seats for Filtering, 400-500 seats for ArchiveArchive

Some customers >100k seatsSome customers >100k seats

Filtering is largest part of revenueFiltering is largest part of revenue

Archiving is fastest growing.Archiving is fastest growing.

FrontBridge BusinessFrontBridge Business

Page 7: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Agenda

FrontBridge OverviewFrontBridge OverviewCustomers & Business modelCustomers & Business model

Global, Load-Balanced NetworkGlobal, Load-Balanced NetworkFrontBridge Service OfferingsFrontBridge Service Offerings

Email SecurityEmail SecurityInbound: Anti-Virus, Anti-Spam, Content & Policy Inbound: Anti-Virus, Anti-Spam, Content & Policy FilteringFilteringOutbound: Anti-Virus & Information Leak ProtectionOutbound: Anti-Virus & Information Leak ProtectionBusiness-to-Customer email encryptionBusiness-to-Customer email encryption

Message ArchivingMessage ArchivingArchiving & AMC DemoArchiving & AMC Demo

Active Message ContinuityActive Message Continuity

Page 8: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

FrontBridge Global Network

99.999% uptime SLA99.999% uptime SLA100% historical uptime made possible by global, load-balanced network100% historical uptime made possible by global, load-balanced network

Eight data centersEight data centers537 servers537 servers

Over 200 million message recipients processed/dayOver 200 million message recipients processed/dayOver 350 million at peakOver 350 million at peak

Store & forward system ensures no legitimate mail is lostStore & forward system ensures no legitimate mail is lostAutomatic deferral, retry every 20 min for up to 5 daysAutomatic deferral, retry every 20 min for up to 5 days

Page 9: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Agenda

FrontBridge OverviewFrontBridge OverviewCustomers & Business modelCustomers & Business model

Global, Load-Balanced NetworkGlobal, Load-Balanced NetworkFrontBridge Service OfferingsFrontBridge Service Offerings

Email SecurityEmail SecurityInbound: Anti-Virus, Anti-Spam, Content & Policy Inbound: Anti-Virus, Anti-Spam, Content & Policy FilteringFilteringOutbound: Anti-Virus & Information Leak ProtectionOutbound: Anti-Virus & Information Leak ProtectionBusiness-to-Customer email encryptionBusiness-to-Customer email encryption

Message ArchivingMessage ArchivingArchiving & AMC DemoArchiving & AMC Demo

Active Message ContinuityActive Message Continuity

Page 10: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Primary FrontBridge Service Primary FrontBridge Service OfferingsOfferings

E-mailE-mailFilteringFiltering

MessageMessageArchiveArchive

Secure Secure E-mailE-mail

ActiveActiveMessageMessage

ContinuityContinuity

Layered anti-spam Layered anti-spam

Multi-engine anti-Multi-engine anti-virusvirus

Corporate Policy Corporate Policy EnforcementEnforcement

Real-time attack Real-time attack preventionprevention

Interception-based Interception-based message archivingmessage archiving

Customized report Customized report generation for generation for demonstrating demonstrating compliancecompliance

Fully-indexed, Fully-indexed, searchable archivesearchable archive

Rapid deployment Rapid deployment to meet deadlines to meet deadlines or immediate or immediate needsneeds

Full e-mail Full e-mail encryption encryption

B-to-C focusedB-to-C focused

No public and No public and private key private key managementmanagement

Gateway, policy-Gateway, policy-based e-mail based e-mail encryptionencryption

Uninterrupted e-Uninterrupted e-mail accessibilitymail accessibility

Rapid recovery Rapid recovery from unplanned from unplanned disasters and disasters and network outagesnetwork outages

30-day historical e-30-day historical e-mail storemail store

Page 11: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Agenda

FrontBridge OverviewFrontBridge OverviewCustomers & Business modelCustomers & Business model

Global, Load-Balanced NetworkGlobal, Load-Balanced NetworkFrontBridge Service OfferingsFrontBridge Service Offerings

Email SecurityEmail SecurityInbound: Anti-Virus, Anti-Spam, Content & Policy Inbound: Anti-Virus, Anti-Spam, Content & Policy FilteringFilteringOutbound: Anti-Virus & Information Leak ProtectionOutbound: Anti-Virus & Information Leak ProtectionBusiness-to-Customer email encryptionBusiness-to-Customer email encryption

Message ArchivingMessage ArchivingArchiving & AMC DemoArchiving & AMC Demo

Active Message ContinuityActive Message Continuity

Page 12: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

FrontBridge: Email Security

Anti-Virus, Anti-Spam, & Corporate Policy Anti-Virus, Anti-Spam, & Corporate Policy EnforcementEnforcementNetwork TLS Enabled Network TLS Enabled Web-based management & reportingWeb-based management & reporting

Highly customizable filtering environmentHighly customizable filtering environment

Easy customer on-boardingEasy customer on-boardingOnly requires MX record changeOnly requires MX record changeNo disruption in mail flowNo disruption in mail flowOne month free trialOne month free trial

Four Anti-Virus engines integratedFour Anti-Virus engines integratedSymantec, Trend Micro, Sophos, & KasperskySymantec, Trend Micro, Sophos, & KasperskyUpdates pushed every 10 minutesUpdates pushed every 10 minutes

FrontBridge Anti-Spam EngineFrontBridge Anti-Spam EngineBlocks 95%+ SpamBlocks 95%+ SpamLow false positive rateLow false positive rate

1 in 250,000 false positive 1 in 250,000 false positive (bulk email)(bulk email)

1 in 1,000,000 false critical 1 in 1,000,000 false critical (direct business-to-business messages)(direct business-to-business messages)

Page 13: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

FrontBridge: Filtering Flow Diagram MTA 1

MessageSwitch, DeliverHosts, Quarantine

MTA 2

Page 14: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Spam Filtering: On the Edge

SMTP ValidationSMTP ValidationSome easy to detect & common spammer mistakesSome easy to detect & common spammer mistakes

Sender Policy FrameworkSender Policy FrameworkPoints for later spam scoringPoints for later spam scoringOptional CSFM (Custom Spam Filter Management)Optional CSFM (Custom Spam Filter Management)

Blacklists / Reputation ServicesBlacklists / Reputation ServicesBlacklists internally maintained by spam analysts teamBlacklists internally maintained by spam analysts teamSeed pool generated from daily reports of top IPs hitting Seed pool generated from daily reports of top IPs hitting networknetworkIPs are then investigated by SA and added to listIPs are then investigated by SA and added to list

Directory ServicesDirectory ServicesAdministration center upload or automated SFTP dumpAdministration center upload or automated SFTP dumpUpdated every 15 minutesUpdated every 15 minutes

Page 15: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Spam Filtering: Fingerprinting

Message FingerprintingMessage FingerprintingMessages fingerprinted via modified MD5 hashMessages fingerprinted via modified MD5 hash

Adapt to avoid most hash breakersAdapt to avoid most hash breakersFingerprints are compared with a per-Message Switch cacheFingerprints are compared with a per-Message Switch cacheCache synchronized with central DBCache synchronized with central DB

Moving to real time central DB updateMoving to real time central DB updateGray list: SMTP 450 on significant traffic changesGray list: SMTP 450 on significant traffic changes

Database tracks all messages moving through system Database tracks all messages moving through system Spam Analyst acts on real-time patterns detectedSpam Analyst acts on real-time patterns detected

Spam matches signatures in DBSpam matches signatures in DB

HoneypotsHoneypotsAccounts set up to gather spamAccounts set up to gather spamHoneypot messages automatically fingerprinted for Honeypot messages automatically fingerprinted for blockingblocking

Page 16: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Spam Filtering: Rule Engine

FrontBridge Anti-Spam EngineFrontBridge Anti-Spam EngineSpam Analyst on duty 16x7Spam Analyst on duty 16x7

Regular expression-based rulesRegular expression-based rulesFour new rule pushes each dayFour new rule pushes each day

Spam Analyst input:Spam Analyst input:Honeypots: Known SpamHoneypots: Known SpamCustomer spam submissionsCustomer spam submissionsSpam Rule Analyzer DBSpam Rule Analyzer DB

Spam Rule AnalyzerSpam Rule AnalyzerOver 61k rules in DB of which ~16k are activeOver 61k rules in DB of which ~16k are activeEach message that triggers a rule also updates usage DBEach message that triggers a rule also updates usage DBFalse positives update the DBFalse positives update the DB

Page 17: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Corporate Policy Enforcement

• Domain• IP or IP Range• Sender• Recipient• Subject• Body

• Character set

• Filename

• File Size

• File Extension

• Executable content

Rules used to enforce customer-specific policyRules used to enforce customer-specific policyCreate rules based on multiple message parametersCreate rules based on multiple message parameters

Simple wildcard & pattern matching capabilitiesSimple wildcard & pattern matching capabilities/d/d/d-/d/d-/d/d/d/d matches any SSN/d/d/d-/d/d-/d/d/d/d matches any SSN

Per rule customizations (notification, comments)Per rule customizations (notification, comments)Supported both inbound and outboud (ILP)Supported both inbound and outboud (ILP)Actions: reject, allow, deliver w/BCC, quarantine, test, encryptActions: reject, allow, deliver w/BCC, quarantine, test, encrypt

Page 18: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Mail Traffic Reports

Web based reports in Admin CenterWeb based reports in Admin CenterMost can span up to 2 months of data at a timeMost can span up to 2 months of data at a timeExportable to Microsoft ExcelExportable to Microsoft Excel

Organization, domain, or domain-group Organization, domain, or domain-group reportingreporting

Total messagesTotal messagesInbound messagesInbound messagesOutbound messagesOutbound messagesPolicy filtered messagesPolicy filtered messages

Message Level detail down to sender, recipient and policy rule Message Level detail down to sender, recipient and policy rule appliedapplied

Content filtered messagesContent filtered messagesMessage Level detail down to sender, recipient & content rule Message Level detail down to sender, recipient & content rule appliedapplied

Virus Filtered messagesVirus Filtered messagesMessage Level detail down to sender, recipient and virus nameMessage Level detail down to sender, recipient and virus name

Page 19: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

FrontBridge Secure E-mailFrontBridge Secure E-mail

User sends an e-mail to FrontBridgeUser sends an e-mail to FrontBridge

E-mail is automatically encrypted at the gateway according E-mail is automatically encrypted at the gateway according to rules created and managed within the Policy Enforcement to rules created and managed within the Policy Enforcement modulemodule

The public key is based on the message recipient’s e-mail The public key is based on the message recipient’s e-mail address to encrypt the E-mailaddress to encrypt the E-mail

The private key is dynamically generated for the message The private key is dynamically generated for the message recipient when they decrypt their messagerecipient when they decrypt their message

Page 20: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Agenda

FrontBridge OverviewFrontBridge OverviewCustomers & Business modelCustomers & Business model

Global, Load-Balanced NetworkGlobal, Load-Balanced NetworkFrontBridge Service OfferingsFrontBridge Service Offerings

Email SecurityEmail SecurityInbound: Anti-Virus, Anti-Spam, Content & Policy Inbound: Anti-Virus, Anti-Spam, Content & Policy FilteringFilteringOutbound: Anti-Virus & Information Leak ProtectionOutbound: Anti-Virus & Information Leak ProtectionBusiness-to-Customer email encryptionBusiness-to-Customer email encryption

Message ArchivingMessage ArchivingArchiving & AMC DemoArchiving & AMC Demo

Active Message ContinuityActive Message Continuity

Page 21: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Message Archive Overview

Hosted serviceHosted serviceLow cost of storage & administrationLow cost of storage & administration

Captures Email, IM, Bloomberg & archives Captures Email, IM, Bloomberg & archives documentsdocumentsMultiple Business Drivers includingMultiple Business Drivers including

Meets regulatory compliance requirements Meets regulatory compliance requirements Offers corporate surveillance functionality Offers corporate surveillance functionality Provides Knowledge management capabilities Provides Knowledge management capabilities

Easy on-boarding of serviceEasy on-boarding of serviceRequires MX record change for external emailRequires MX record change for external emailEnvelope Journaling for internal emailEnvelope Journaling for internal email

Web-based supervisory, auditing & reporting Web-based supervisory, auditing & reporting toolstools

Page 22: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

FrontBridge Message ArchiveFrontBridge Message Archive

Inbound E-mail scrubbed for unwanted contentInbound E-mail scrubbed for unwanted content

Messages captured and copied “in stream”Messages captured and copied “in stream”

Message store holds e-mail, IM, Bloomberg & uploaded Message store holds e-mail, IM, Bloomberg & uploaded documentsdocuments

End users have full E-mail functionality via web-based OWA End users have full E-mail functionality via web-based OWA cloneclone

Supervisors can have access to archive for message Supervisors can have access to archive for message monitoringmonitoring

Auditors and outside counsel can access archive and/or Auditors and outside counsel can access archive and/or reportsreports

Page 23: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Compliance Managers & Supervisors

SEC 17a-4 – Physical Retention requirementsSEC 17a-4 – Physical Retention requirementsMail stored for 3 years (1-7 years retention available)Mail stored for 3 years (1-7 years retention available)Each message assigned a unique contiguous serial numberEach message assigned a unique contiguous serial numberTwo online copies of each message stored in 2 discreet locationsTwo online copies of each message stored in 2 discreet locationsMessages available online 24 x 7Messages available online 24 x 7Can be exported as EML files in ZIPCan be exported as EML files in ZIPFrontBridge will provide letter of attestation to the SECFrontBridge will provide letter of attestation to the SEC

Act on customer’s behalf for SEC queriesAct on customer’s behalf for SEC queries

External Auditor role permits outside access for auditors External Auditor role permits outside access for auditors Mail destroyed on expiration date; Destruction report includedMail destroyed on expiration date; Destruction report included

NASD 3010 – Communications Review requirementsNASD 3010 – Communications Review requirementsKeyword list and message sampling supportKeyword list and message sampling supportWhitelist trusted senders from random sampleWhitelist trusted senders from random sampleRandom sampling support of int/ext mail, int/ext IMRandom sampling support of int/ext mail, int/ext IMMessage harvest process built inMessage harvest process built inReview classification categories, with escalation capability Review classification categories, with escalation capability includedincluded

Page 24: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Corporate HR & Legal

Advanced SearchAdvanced SearchSearch across message headers, bodies and 200 Search across message headers, bodies and 200 attachment typesattachment typesRegex, Soundex, Stemming search supportedRegex, Soundex, Stemming search supportedTag messages for others; add notes to messagesTag messages for others; add notes to messages

Case ManagementCase ManagementReturn search results to custom foldersReturn search results to custom foldersShare folders with othersShare folders with others

Destruction HoldDestruction HoldStall message destruction by user, by organizationStall message destruction by user, by organization

Attorney/Client Privilege protectionAttorney/Client Privilege protection

Page 25: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Message Archive: Reporting

Compliance Reports & system ReportsCompliance Reports & system Reports23 predefined reports available23 predefined reports available

Web-based report-generation engineWeb-based report-generation engineAvailable 24x7Available 24x7

Data harvested & parsed in real timeData harvested & parsed in real timeReports can be scheduled for regular Reports can be scheduled for regular deliverydeliveryPDF or XLS formatPDF or XLS format

Page 26: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Archiving Competition

More than 50 companies in the spaceMore than 50 companies in the spaceBig divide between service provider & Big divide between service provider & on-premiseon-premiseMajor competitorsMajor competitors

ZantazZantazIron MountainIron MountainiLumin (Assentor)iLumin (Assentor)KVSKVSEMC/Legato/OTGEMC/Legato/OTG

Other notable competitorsOther notable competitorsAdvisorMailAdvisorMail

Page 27: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Message Archiving & AMC Demo

Kevin Merritt, ArchitectKevin Merritt, Architect

Page 28: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Agenda

FrontBridge OverviewFrontBridge OverviewCustomers & Business modelCustomers & Business model

Global, Load-Balanced NetworkGlobal, Load-Balanced NetworkFrontBridge Service OfferingsFrontBridge Service Offerings

Email SecurityEmail SecurityInbound: Anti-Virus, Anti-Spam, Content & Policy Inbound: Anti-Virus, Anti-Spam, Content & Policy FilteringFilteringOutbound: Anti-Virus & Information Leak ProtectionOutbound: Anti-Virus & Information Leak ProtectionBusiness-to-Customer email encryptionBusiness-to-Customer email encryption

Message ArchivingMessage ArchivingArchiving & AMC DemoArchiving & AMC Demo

Active Message ContinuityActive Message Continuity

Page 29: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

FrontBridge Active Message FrontBridge Active Message ContinuityContinuity

Fully functioning supplementary email system – can send Fully functioning supplementary email system – can send new messages and reply to and forward previously received new messages and reply to and forward previously received messagesmessages

Easy point in time as well as ad hoc restoration of messagesEasy point in time as well as ad hoc restoration of messages

100% shared code base with Message Archive (including the 100% shared code base with Message Archive (including the OWA clone web-based front end) with some minor tweaks:OWA clone web-based front end) with some minor tweaks:

30-day perpetually rolling archive30-day perpetually rolling archive

Compliance features and reports concealedCompliance features and reports concealed

Page 30: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Active Message Continuity

Shared code base & infrastructure with Shared code base & infrastructure with Message ArchivingMessage ArchivingTargeted as a continuity solution, not Targeted as a continuity solution, not retentionretentionOnly differences between AMC and MA are:Only differences between AMC and MA are:

30 day rolling archive instead of 3, 5 or 7 30 day rolling archive instead of 3, 5 or 7 yearsyearsAttachments and bodies not searchableAttachments and bodies not searchableCompliance workflow tools removedCompliance workflow tools removedFewer reportsFewer reportsEasier to useEasier to useLess expensive MRRLess expensive MRR

Limited Competition – MessageOneLimited Competition – MessageOne

Page 31: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com

Summary

E-mail is a mission critical applicationE-mail is a mission critical application

Customer benefits from software as a service Customer benefits from software as a service model:model:

Enable companies to tackle complex e-mail tasks with Enable companies to tackle complex e-mail tasks with minimal IT staffminimal IT staff

No upfront capital investmentNo upfront capital investment

Predictable recurring costsPredictable recurring costs

Allow IT staff to focus on more strategic projects offering Allow IT staff to focus on more strategic projects offering real competitive advantagereal competitive advantage

FrontBridge, a Microsoft subsidiary, is the leading FrontBridge, a Microsoft subsidiary, is the leading services provider for e-mail security, protection, services provider for e-mail security, protection, and complianceand complianceWe’re hiringWe’re hiring

Developers, Testers, Program Managers, System Developers, Testers, Program Managers, System Administrators, DBAs, and Client SupportAdministrators, DBAs, and Client SupportHelp drive Microsoft success in non-consumer hosted Help drive Microsoft success in non-consumer hosted servicesservices

Page 32: FrontBridge Business & Technology James Hamilton GM FrontBridge Technologies JamesRH@microsoft.com