|By Marketwired .||
|May 22, 2014 09:00 AM EDT||
WESTBOROUGH, MA -- (Marketwired) -- 05/22/14 -- C2C, a leading provider of PST management, email archiving and information management solutions, today announced that it will be offering a free Quickstart version of PST Enterprise, its award-winning solution that automates the location, migration and elimination of PST files. The Quickstart version features a self-service support forum, supports up to 100 mailboxes, and is valid for 120 days from install.
"Every enterprise that has PST files experiences challenges with data loss, file corruption and hidden 'dark data' that may put the organization at risk during a compliance audit or litigation discovery event," said Dave Hunt, CEO, C2C. "We want to help companies avoid these challenges with a free version of our PST Enterprise solution that gives them a 'license to kill' those PST files."
PST Enterprise was recently recognized with an MSExchange.org Gold Award, scoring 4.8 out of 5 and described by Exchange MVP Steve Goodman as 'a product that should be top of your list for evaluation.' PST Enterprise systematically locates PST files across any organization without end user intervention. It automatically determines and assigns an owner for every PST file, and can copy or move the PST files to specified network locations or remove them using defensible deletion policies. PST file data can also be ingested directly into Exchange or Office 365. C2C's PST Enterprise 3.0 is powering large Office 365 and Exchange 2013 migrations at Fortune 500 companies.
You can find more information and apply for the free Quickstart version of PST Enterprise at www.c2c.com/licensetokill
Since 1992, four million users have deployed C2C's software for email and file archiving, e-discovery/e-disclosure, compliance management, legal forensics, and PST management within their Microsoft Exchange environments. For more information about the company and its products, visit www.c2c.com.
May. 3, 2016 08:00 PM EDT Reads: 1,291
May. 3, 2016 08:00 PM EDT Reads: 1,010
May. 3, 2016 07:30 PM EDT Reads: 1,910
May. 3, 2016 07:15 PM EDT Reads: 1,077
May. 3, 2016 06:45 PM EDT Reads: 1,188
May. 3, 2016 06:30 PM EDT Reads: 911
May. 3, 2016 06:30 PM EDT Reads: 1,125
May. 3, 2016 06:30 PM EDT Reads: 704
May. 3, 2016 06:30 PM EDT Reads: 1,644
May. 3, 2016 06:30 PM EDT Reads: 1,254
May. 3, 2016 05:45 PM EDT Reads: 1,242
May. 3, 2016 05:45 PM EDT Reads: 256
May. 3, 2016 05:15 PM EDT Reads: 1,211
May. 3, 2016 05:15 PM EDT Reads: 1,095
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
May. 3, 2016 05:00 PM EDT Reads: 255