Manage Risk With Protection And Compliance Capabilities
Sign in

Manage risk with protection and compliance capabilities

Sr IT Operation Lead Technical

Microsoft Exchange Server 2010

With Microsoft Exchange Server 2010 you can achieve new levels of reliability and performance with features that simplify your administration, help protect your communications, and delight your users by meeting their demands for greater mobility.

A growing number of applications and devices access your e-mail infrastructure, so it is more important than ever that you consider the protection of your mission critical e-mail data when you choose an e-mail solution. Your organization has many reasons to protect and archive e-mail, from regulatory concerns to internal organizational governance. Exchange 2010 delivers integrated information protection, control, and compliance tools focused on helping you simplify and automate this process:

  • New integrated, out-of-the-box e-mail archiving gives you tools to preserve e-mail data without changing the experience for your users or IT staff. Combined with the flexibility provided by the Exchange storage architecture, you can take control of your corporate e-mail data with a personal archive that seamlessly surfaces in both Outlook and Outlook Web App.

  • A new retention policy framework allows your IT staff to define, deploy, and automate the expiry and archiving of e-mail data. In addition to default policies set by your IT staff, your users can select and apply retention policies to individual messages or folders. And Exchange 2010 adds a new legal hold policy that retains and places on hold any edits or deletions of e-mail data that users make. A simplified e-Discovery process with a new Web-based multi-mailbox search feature. This easy-to-use capability can be delegated to specialist users, like a compliance officer, without providing the users full administrative privileges.

  • New Transport Protection Rules help you safeguard sensitive business information. You can automatically apply Information Rights Management (IRM) policies to both e-mail and voice mail messages, after they have been sent, based on a range of message content criteria.
start_blog_img