Messaging Pipeline | Blog
Free Newsletter GlossaryContact UsAbout Us
One To One Collaboration Servers & Security Business


November 29, 2005
Necessity Is The Mother

If you've spent any length of time supporting users, you know that there is no end to the imaginative workarounds they can come up with when a system goes down and they have work that still needs to happen. Yes, necessity is the mother of invention, or some other kind of mother, but when it comes to e-mail workarounds, the inventiveness of users can cause problems.

And it's hard to quibble with their intent. Businesses can no longer build slack into their schedules as a just-in-case measure when making deals. Communications technology has made immediacy the norm, so when a critical conduit is temporarily unavailable, the show still must go on, no excuses.

In our most recent poll we asked you what your users resort to when their corporate e-mail is down. As we anticipated, a majority (51 percent) of you said they just go out on the Web and use their personal e-mail accounts. Not a pretty picture if you're monitoring e-mail for compliance and security purposes.

Another 11 percent of you said they resort to the enterprise instant messaging system, a more manageable choice and its good to know that you're managing IM. But eight percent of you said that your users go out on commercial IM networks in a pinch, and that's not a good place for sensitive corporate information to go.

I guess old reliable, the fax machine, is just that, old. Only five percent of you said your users turn the fax when the e-mail network is down.

And that leaves 24 percent of you that chose our catchall, other choice, which we called Smoke Signals. That could include a number for options, including just picking up the phone and talking to someone. But if documents need to be exchanged for review, that rules out a voice call.

What's become clear is that many of you don't have policies for how the work goes on when the e-mail is down. And in the this age of compliance, legal discovery and corporate governance, it's time to institute those policies and perhaps make a strong case for enterprise IM.

Posted by Mitch Irsfeld at 03:01 PM | Permalink

Comment on this blog entry



 


March 2006
Sun Mon Tue Wed Thu Fri Sat
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31  

Monthly Archives













Messaging Pipeline










Get the latest Messaging news, product info, and trends every week.



  Get The Messaging Pipeline Blog RSS Feed




Editorial and vendor perspectives








  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  


Editor's Picks
The Six Flavors Of Windows Vista
Microsoft plans to release a full six-pack of Vista versions, one for every taste. Which Vista will be right for you?

Hope is Not Enough When It Comes To Compliance

Three Ways To Authenticate E-Mail And Stop Spam

Wikis In The Workplace

Review: Google Desktop 3
MESSAGING PIPELINE MARKETPLACE (sponsored links)

Digital Warehouse buys, sells, & rents used Cisco networking hardware such as routers & switches, as well as Juniper, Extreme & Foundry at 50-80% off list price. One year warrantee and fast delivery.


Roaring Penguin's CanIt-PRO anti-spam solution offers customizable spam and virus control for enterprises, campuses and ISPs. Designed for the mail server, CanIt-PRO lets you stop spam on YOUR terms. Click for free price quote for your organization.


Use your Intranet to manage Software Licenses, plan for Windows XP/2000 upgrades, do Security Audits and more. Click to try and ask for our white paper - PC Management for the Internet Age.


Analysts at the Tolly Group put a leading Branch Office IT services solution to the test, measuring performance, security and data reliability. Download the results, detailed in this free report, now.


Whether you need temporary or permanent access to remote PCs, LogMeIn has your solution: LogMeIn IT Reach for automatic maintenance of remote and mobile systems, and LogMeIn Rescue for instant, web-based remote access without pre-installing software.






Sponsored Links:      
 |   |   |   |   |   | 
 |   |   |   | 
 |   |   |   |   | 
Messaging Pipeline  |   |   |   | 
 |   |   |   |   | 
© 2006 | MESSAGING PIPELINE All rights reserved. | |