This is part 1 in a 3 part series on the topic of analyzing Notes database usage. The goal is to help you understand what to look for when determining how much your Notes databases are being used.
How to read usage analysis
There is a lot of dat...
Malware can spread at an alarming rate. To protect your organization from these attacks, having a comprehensive, flexible disaster recovery plan is essential. Learn more.
Many organizations planning to make it easier for their employees to work remotely. To assist with this effort, they planning to migrate their networked file system to Office 365. Typically, they are looking at one or more of the following targets: S…
We are excited to announce the release of Metalogix Content Matrix 9.1.
Look what's new:
1. New UI to View / Manage the Migration API job
To launch the SharePoint Online Migration Jobs window:
In the Jobs list, select the SPO/Azure migration job...
We are excited to announce a new version of Metalogix Essentials for Office 365 is now available for download.
Look what's new:
(See the Release Notes and/or User Guide for complete details)
1. Migrating SPO to SPO in Hyper Mode
Abilit...
This year, TEC 2020 is being held at the Loews Atlanta Hotel. Here's a list of must-see attractions when you join us at The Experts Conference in Atlanta, GA.
In recently released Update 1 for InTrust 11.4.1 there is a hidden gem – Suspicious process was started rule, it allows detection of hidden steps that ransomware and malware would do to achieve persistence, hide their tracks and disable protect...
Note: Please review the current product documentation (user documentation and release notes) for the latest information on using OAuth authorization. The content in the videos was made with the product versions released at the time. Newer releases in…
Our Quest On Demand product provides successful tenant merging and consolidation. The SharePoint migration workload migrates documents and other valuable data stored in SharePoint sites and document libraries. Some SharePoint content m...
Something really cool about honeypots and deception technology, in general, is that you can see a hacker or a penetration tester in action with very little false positive notifications. Deception also can help with detecting yet unknown threats that …