Guide / en Microsoft NCE Best Practices Guide /resources/guide/microsoft-nce-best-practices-guide <span>Microsoft NCE Best Practices Guide</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Tue, 12/14/2021 - 12:49</span> <a href="/media/933/edit" hreflang="en">NCE_guide.jpg</a> Off <h2>What is the Microsoft New Commerce Experience?</h2> <p>Microsoft recently unveiled a multi-stage, multi-year investment in the Cloud Solution Provider (CSP) program to help companies reduce complexity and achieve better purchasing flexibility. The new commerce experience brings the CSP program into alignment with other programs, such as the Enterprise Agreement. It and includes new licensing and monthly subscription options for commercial licenses so that all customers have a consistent purchasing experience and are subject to the same terms and conditions for cloud purchases regardless of the Microsoft sales motion. ÇďżűĘÓƵɫ | AppRiver is here to help our partners navigate these changes and the corresponding effects on your business.</p> <h2>What is the timeline and what does that mean for you?</h2> <p>The New Commerce Experience will be generally available starting in January 10, 2022, and Microsoft will require all new subscriptions to take place in NCE starting March 10, 2022. The NCE launch promotional period (January 10, 2022 to June 30, 2022) is designed to ease the transition.</p> <h2>Recommendations</h2> <ul><li>Review your terms and conditions to ensure the customer understands the commitment to the NCE subscription policies. Refer to the New Commerce for CSP Operating Guide for terms and conditions.</li> <li>For SKUs impacted by the March price increase, consider canceling legacy subscriptions and migrating to the Annual NCE agreement before March 1, 2022 to avoid the price increase for a year AND reduce current cost by 5%.</li> <li>Even though Microsoft suggested they will extend the 5% promo through June, to guarantee the best pricing move to an annual term before March 31, 2022.</li> <li>If you are a Silver or Gold partner receiving CSP Reseller Incentives, make sure to migrate before January 2023, otherwise incentives will stop. Only NCE subscriptions will be counted towards rebates starting January 2023.</li> <li>Customers can have both monthly and annual subscriptions for the same SKUs. Minimize cost with an annual subscription for the average annual employee count, while using monthly subscriptions for seats expected to be unused for 3 months or more each year.</li> </ul><p><em>Please note, every partner’s circumstances are different – for more in-depth advice on your Microsoft instance, please schedule a NCE consultation with our team</em></p> <p> </p> <p>For more guidance, contact your Channel Account Manager or <a href="mailto:partners@zixcorp.com" rel="nofollow">partners@zixcorp.com</a> to schedule your NCE consultation.</p> <a href="/taxonomy/term/161" hreflang="en">Guide</a> <article><div class="field--label sr-only">Document</div> <span class="file file--mime-application-pdf file--application-pdf"><a href="/sites/default/files/2021-12/Microsoft%20NCE%20Best%20Practices%20Guide.pdf" type="application/pdf">Microsoft NCE Best Practices Guide.pdf</a></span> </article> Off Tue, 14 Dec 2021 18:49:33 +0000 admin 500 at 7 Reasons Every Business Needs SaaS Backup /resources/guide/7-reasons-every-business-needs-saas-backup <span>7 Reasons Every Business Needs SaaS Backup</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Wed, 10/13/2021 - 14:27</span> <a href="/media/642/edit" hreflang="en">7_reasons_resource.jpg</a> Off <h1><span><span><span><span><span><span>7 reasons businesses need to back up SaaS data</span></span></span></span></span></span></h1> <p><span><span><span><span><span><span>Software-as-a-service (SaaS) provides many benefits to the companies using it: convenience, flexibility, and ease of use are often among the top three. One thing that’s never guaranteed, though, is security. </span></span></span></span></span></span></p> <p><span><span><span><span><span><span>This can be an easy thing to forget, and many people do. In fact, recent </span></span></span></span></span></span><a href="https://www.esg-global.com/research/esg-research-report-the-evolution-of-data-protection-cloud-strategies" rel="nofollow"><span><span><span><span><span><u><span><span>research</span></span></u></span></span></span></span></span></a><span><span><span><span><span><span> from the Enterprise Strategy Group shows that 35% of the market incorrectly believes that their SaaS vendor is responsible for the protection of that data. In fact, SaaS data protection falls solely on the shoulders of the customer using it. </span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Now that we’re clear on who’s responsible for keeping that data safe, let’s look at some reasons why you may want to make that data protection a priority. </span></span></span></span></span></span></p> <h3><span><span><span><span><span><span>#1: Your business-critical SaaS data is more vulnerable than you think</span></span></span></span></span></span></h3> <p><span><span><span><span><span><span>As Todd Gifford covered last week on our</span></span></span></span></span></span><a href="/resources/blog/october-2021/should-you-backup-your-cloud-communications-and-apps-answer-yes-and" rel="nofollow"><span><span><span><span><span><u><span><span> blog</span></span></u></span></span></span></span></span></a><span><span><span><span><span><span>, while SaaS platforms like Microsoft 365, Google Workspace, Salesforce, Box, and Dropbox are very secure solutions, it would be wrong to assume that your data is protected in the same way their infrastructure is. </span></span></span></span></span></span></p> <p> </p> <p><span><span><span><span><span><span>Things like human error, malicious intent from bad actors or disgruntled contractors, malware or ransomware attacks, sync errors, and outages all pose a threat to the safety of that data. In fact, one in three companies experience SaaS data loss, which means it’s a lot more common than most would hope.</span></span></span></span></span></span></p> <h3><span><span><span><span><span><span>#2: Data breaches are expensive</span></span></span></span></span></span></h3> <p><span><span><span><span><span><span>The global average cost of a data breach is $4.24 million. Especially for small and medium businesses, this is no small fee. In fact, half of all mid-sized companies end up closing after a breach, and the latest numbers show the costs are only rising.</span></span></span></span></span></span></p> <p> </p> <p><span><span><span><span><span><span>The time between detection and remediation is, on average, 287 days. That means that a breach can cause nearly a year’s worth of damage, which can be devastating.</span></span></span></span></span></span></p> <p> </p> <h3><span><span><span><span><span><span>#3: Your cloud service provider (CSP) recommends it</span></span></span></span></span></span></h3> <p><span><span><span><span><span><span>If you read the fine print, you’ll see that every SaaS platform makes it clear that in-app recovery of deleted data is possible, but only in a matter of weeks, if not months. </span></span></span></span></span></span></p> <p> </p> <p><span><span><span><span><span><span>Outside of the app, the user is on their own. Once the Recycle Bin or Trash folder is empty, that data is gone forever. Cloud providers explain this in terms of a “shared responsibility” between you and them for preserving your data. This largely means if the data is sensitive, you’re responsible for backing it up. </span></span></span></span></span></span></p> <h3><span><span><span><span><span><span>#4: Reliable backup is necessary for compliance</span></span></span></span></span></span></h3> <p><span><span><span><span><span><span>Information privacy laws across the globe require businesses to encrypt their information, share in the responsibility for its abuse and loss, and prove that they can recover it if needed. </span></span></span></span></span></span></p> <p> </p> <p><span><span><span><span><span><span>In order to comply, the backup solution has to address the specific needs of the law under which it falls, such as choice of data center, data encryption, at-rest and in-transit rules, and the ability to purge backups.</span></span></span></span></span></span></p> <h3><span><span><span><span><span><span>#5: Top IT analysts recommend it, too</span></span></span></span></span></span></h3> <p><span><span><span><span><span><span>According to top IT analysts Gartner and Forrester, backing up SaaS data is a must-have for every company. As Gartner puts it, “Organizations cannot assume that SaaS providers will offer backup as part of the service or provide interfaces that backup vendors can use to access data.”</span></span></span></span></span></span></p> <p> </p> <p><span><span><span><span><span><span>Forrester adds, “While almost all SaaS vendors explicitly state that protecting data is the customer’s responsibility, infrastructure and operations (I&O) leaders usually send critical data to those providers without any plan for ensuring data resiliency.” In other words, “Back up SaaS data or risk losing customers and partners. Stop leaving the door open to data loss, and start proactively protecting cloud data before it’s too late.”</span></span></span></span></span></span></p> <h3><span><span><span><span><span><span>#6: Native recovery options often don’t cut it</span></span></span></span></span></span></h3> <p><span><span><span><span><span><span>Native solutions like Litigation Hold, Recycle Bin, and Trash are archival in nature, and not built for true backup and recovery. Trying to restore data that’s been deleted is tedious and incomplete without the right backup solution. </span></span></span></span></span></span></p> <p> </p> <p><span><span><span><span><span><span>These solutions are also time-bound, meaning data is only stored here for a few weeks or a couple of months. In short, having to rely only on these solutions in a time of crisis only adds to the level of stress.</span></span></span></span></span></span></p> <p> </p> <h3><span><span><span><span><span><span>#7: Backups can help you bounce back from a breach</span></span></span></span></span></span></h3> <p><span><span><span><span><span><span>Backup and recovery solutions are a central part of any disaster and recovery plan. To truly come back from data loss, you need seamless data recovery from an accurate, real-time backup.</span></span></span></span></span></span></p> <p> </p> <p><span><span><span><span><span><span>Ensuring that this is in place ahead of time can make a huge difference in the event that your data is compromised. </span></span></span></span></span></span></p> <p> </p> <p><span><span><span><span><span><span>The bottom line is that there’s really no good reason for not having a SaaS backup solution in place for your data. Not only is it a practical solution, it’s also a requirement, and can quite literally save your business from going under in the event of a security breach.</span></span></span></span></span></span></p> <p> </p> <p><span><span><span><span>Want to read more about the importance of cloud-to-cloud backup solutions? Download the eBook instantly using the download button below.</span></span></span></span></p> <p> </p> <a href="/taxonomy/term/161" hreflang="en">Guide</a> <article><div class="field--label sr-only">Document</div> <span class="file file--mime-application-pdf file--application-pdf"><a href="/sites/default/files/2021-10/Cloud-to-Cloud%20Backup%207%20Reasons_FINAL.pdf" type="application/pdf">Cloud-to-Cloud Backup 7 Reasons_FINAL.pdf</a></span> </article> Off Wed, 13 Oct 2021 19:27:37 +0000 admin 372 at Maximize your Microsoft Investment /resources/guide/maximize-your-microsoft-investment <span>Maximize your Microsoft Investment</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Fri, 07/02/2021 - 13:49</span> <a href="/media/748/edit" hreflang="en">microsoft_guide.jpg</a> Off <p>Microsoft Office 365 is the top business productivity service available today. Microsoft has invested billions in attempting to provide every service a business needs to be successful, including security. In fact, even Gartner states “by 2023, at least 40% of all organizations will rely on built-in protection capabilities from cloud email providers as the main line of defense.” However, this presents a challenge for companies like Microsoft. In trying to be everything to everyone, the expectations of what Microsoft promises doesn’t always meet their reality. Read about the top 5 ways expectations don’t meet reality.</p> <a href="/taxonomy/term/161" hreflang="en">Guide</a> <article><div class="field--label sr-only">Document</div> <span class="file file--mime-application-pdf file--application-pdf"><a href="/sites/default/files/2021-07/Maximize%20Microsoft%20Investment%20with%20ÇďżűĘÓƵɫ.pdf" type="application/pdf">Maximize Microsoft Investment with ÇďżűĘÓƵɫ.pdf</a></span> </article> Off Fri, 02 Jul 2021 18:49:45 +0000 admin 409 at Information Archiving Buyer's Guide /resources/guide/information-archiving-buyers-guide <span>Information Archiving Buyer's Guide</span> <span><span lang="" about="/user/2" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">jlamons</span></span> <span>Mon, 08/31/2020 - 14:20</span> <a href="/media/250/edit" hreflang="en">decision.jpeg</a> Off <p>The need for compliance continues to grow, so let’s not waste time talking alphabet soup – if you’re here, you’re already familiar with the requirements and regulations that your business or your customers are facing. Whether IRS, DOD 5015.2, HIPAA, FCC, FOIA, FRCP, FDIC, SEC, PCI DSS, FINRA 3010, SEC 204-2, 17a-3 and a-4 – the challenge is to find the right solution for your needs.</p> <a href="/taxonomy/term/161" hreflang="en">Guide</a> <article><div class="field--label sr-only">Document</div> <span class="file file--mime-application-pdf file--application-pdf"><a href="/sites/default/files/2021-04/Information%20Archiving%20Buyers%20Guide%20v0.pdf" type="application/pdf">Information Archiving Buyers Guide v0.pdf</a></span> </article><a href="/taxonomy/term/181" hreflang="en">Archiving</a> Mon, 31 Aug 2020 19:20:50 +0000 jlamons 174 at IT Security Scan Guide /resources/guide/it-security-scan-guide <span>IT Security Scan Guide</span> <span><span lang="" about="/user/2" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">jlamons</span></span> <span>Tue, 08/11/2020 - 15:30</span> <a href="/media/315/edit" hreflang="en">plug_thumb.jpeg</a> Off <p>When the COVID-19 pandemic struck, technology came to the rescue. IT service and software providers found themselves in the thick of it—supporting their customers’ sudden digital transformations while adjusting to their own new reality. They performed the transition admirably. But little do they know the precarious position they’re in now.</p> <a href="/taxonomy/term/161" hreflang="en">Guide</a> <article><div class="field--label sr-only">Document</div> <span class="file file--mime-application-pdf file--application-pdf"><a href="/sites/default/files/2021-04/ÇďżűĘÓƵɫ_SecurityScanGuide_Technology_Final.pdf" type="application/pdf">ÇďżűĘÓƵɫ_SecurityScanGuide_Technology_Final.pdf</a></span> </article><a href="/taxonomy/term/177" hreflang="en">IT</a> <a href="/taxonomy/term/180" hreflang="en">Advanced Threat Protection</a> <a href="/taxonomy/term/184" hreflang="en">Email Encryption</a> <a href="/taxonomy/term/185" hreflang="en">Mitigate Compliance Risk</a> <a href="/taxonomy/term/186" hreflang="en">Modernize the Workplace</a> <a href="/taxonomy/term/187" hreflang="en">Office 365</a> <a href="/taxonomy/term/188" hreflang="en">Protect Business Communication</a> <a href="/taxonomy/term/189" hreflang="en">Secure Office 365</a> Tue, 11 Aug 2020 20:30:37 +0000 jlamons 214 at IT Security Scan Playbook /resources/guide/it-security-scan-playbook <span>IT Security Scan Playbook</span> <span><span lang="" about="/user/2" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">jlamons</span></span> <span>Tue, 08/11/2020 - 15:26</span> <a href="/media/309/edit" hreflang="en">software_thumb.jpeg</a> Off <p>As we covered in the companion piece to this playbook, The Security Scan Guide for IT Service and Software Providers, there’s a critical flaw in many IT service and software providers’ security architecture. While they’ve been quick to adopt advanced security solutions like CASBs, cloud-native endpoint protection solutions, and highend VPNs, many are overlooking a critical vulnerability: their email.</p> <a href="/taxonomy/term/161" hreflang="en">Guide</a> <article><div class="field--label sr-only">Document</div> <span class="file file--mime-application-pdf file--application-pdf"><a href="/sites/default/files/2021-04/ÇďżűĘÓƵɫ_SecurityScanPlaybook_Technology_Final.pdf" type="application/pdf">ÇďżűĘÓƵɫ_SecurityScanPlaybook_Technology_Final.pdf</a></span> </article><a href="/taxonomy/term/177" hreflang="en">IT</a> <a href="/taxonomy/term/183" hreflang="en">Data Loss Prevention</a> <a href="/taxonomy/term/184" hreflang="en">Email Encryption</a> <a href="/taxonomy/term/186" hreflang="en">Modernize the Workplace</a> <a href="/taxonomy/term/187" hreflang="en">Office 365</a> <a href="/taxonomy/term/188" hreflang="en">Protect Business Communication</a> <a href="/taxonomy/term/189" hreflang="en">Secure Office 365</a> Tue, 11 Aug 2020 20:26:14 +0000 jlamons 211 at Manufacturing Security Scan Guide /resources/guide/manufacturing-security-scan-guide <span>Manufacturing Security Scan Guide</span> <span><span lang="" about="/user/2" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">jlamons</span></span> <span>Mon, 07/27/2020 - 15:37</span> <a href="/sites/default/files/2020-07/ÇďżűĘÓƵɫ_SecurityScanGuide_Manufacturing_2020.pdf">Download Now</a> <a href="/media/319/edit" hreflang="en">scanguide_thumb.jpeg</a> Off <p>It is a curious fact that disasters often come in twos. Earthquakes are followed by tsunamis. Wars are followed by pandemics. And pandemics—including all the havoc they can wreak on supply chains—sometimes create immense, unseen vulnerabilities in other areas.</p> <p>The 2020 pandemic is well underway and all things considered, manufacturers have responded admirably. Some have transitioned to producing life-saving medical supplies like respirators, masks, and sanitizers. Nearly all have peered deep into their supply chain to play a sort of three-dimensional chess. They’ve anticipated risks and picked out Tier 1 and Tier 2 suppliers hamstrung by lockdowns or logistics and replaced them with an ever more complex web of multi-tier supplier networks.</p> <a href="/taxonomy/term/161" hreflang="en">Guide</a> <a href="/taxonomy/term/179" hreflang="en">Title</a> <a href="/taxonomy/term/180" hreflang="en">Advanced Threat Protection</a> <a href="/taxonomy/term/185" hreflang="en">Mitigate Compliance Risk</a> <a href="/taxonomy/term/186" hreflang="en">Modernize the Workplace</a> <a href="/taxonomy/term/188" hreflang="en">Protect Business Communication</a> <a href="/taxonomy/term/189" hreflang="en">Secure Office 365</a> Mon, 27 Jul 2020 20:37:02 +0000 jlamons 216 at Information Archiving Features & Benefits /resources/guide/information-archiving-features-benefits <span>Information Archiving Features & Benefits</span> <span><span lang="" about="/user/2" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">jlamons</span></span> <span>Wed, 06/24/2020 - 15:43</span> Off <a href="/taxonomy/term/161" hreflang="en">Guide</a> <article><div class="field--label sr-only">Document</div> <span class="file file--mime-application-pdf file--application-pdf"><a href="/sites/default/files/2021-04/Information%20Archiving%20Features%20Benefits%20ÇďżűĘÓƵɫ.pdf" type="application/pdf">Information Archiving Features Benefits ÇďżűĘÓƵɫ.pdf</a></span> </article><a href="/taxonomy/term/173" hreflang="en">Education</a> <a href="/taxonomy/term/174" hreflang="en">Financial Services</a> <a href="/taxonomy/term/175" hreflang="en">Government</a> <a href="/taxonomy/term/176" hreflang="en">Healthcare</a> <a href="/taxonomy/term/179" hreflang="en">Title</a> <a href="/taxonomy/term/181" hreflang="en">Archiving</a> <a href="/taxonomy/term/185" hreflang="en">Mitigate Compliance Risk</a> <a href="/taxonomy/term/186" hreflang="en">Modernize the Workplace</a> Wed, 24 Jun 2020 20:43:43 +0000 jlamons 221 at Email and Message Encryption Buyers Guide /resources/guide/email-and-message-encryption-buyers-guide <span>Email and Message Encryption Buyers Guide</span> <span><span lang="" about="/user/2" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">jlamons</span></span> <span>Fri, 06/19/2020 - 15:45</span> <a href="/media/330/edit" hreflang="en">buyersguide_thumb.jpeg</a> Off <p>Maintaining the integrity and trust of your brand, transactions, and customer workflows are both a business enabler and a regulatory mandate. For this reason, securing all email communication and collaboration is not an option but a requirement. Organizations must take a proactive approach to encryption given a single exposed record can result in heavy fines or a significant loss in customer trust.</p> <a href="/taxonomy/term/161" hreflang="en">Guide</a> <article><div class="field--label sr-only">Document</div> <span class="file file--mime-application-pdf file--application-pdf"><a href="/sites/default/files/2021-04/Email%20and%20Message%20Encryption%20Buyers%20Guide.pdf" type="application/pdf">Email and Message Encryption Buyers Guide.pdf</a></span> </article><a href="/taxonomy/term/173" hreflang="en">Education</a> <a href="/taxonomy/term/174" hreflang="en">Financial Services</a> <a href="/taxonomy/term/175" hreflang="en">Government</a> <a href="/taxonomy/term/176" hreflang="en">Healthcare</a> <a href="/taxonomy/term/179" hreflang="en">Title</a> <a href="/taxonomy/term/185" hreflang="en">Mitigate Compliance Risk</a> <a href="/taxonomy/term/186" hreflang="en">Modernize the Workplace</a> <a href="/taxonomy/term/188" hreflang="en">Protect Business Communication</a> <a href="/taxonomy/term/189" hreflang="en">Secure Office 365</a> Fri, 19 Jun 2020 20:45:37 +0000 jlamons 224 at