All Admins are not Alike: Granular Administration of Rights for Email Security

When it comes to granting rights, managers responsible for enterprise IT would always like to define access to important systems as precisely as possible. It is only in the rarest cases that one uniform administrator profile is sufficient for the entire IT support: Especially with regard to email security, it often occurs in practice that support employees are only supposed to monitor the flow of messages for one specific department or site.

Leer más

Tags: // //

How to protect yourself from blackmail trojan Locky

Since last week the aggressive blackmail Trojan Locky has been causing mischief on computers around the globe. Retarus expands existing spam and virus protection functions and switch all customers over to fourfold virus scanning for the duration of the current, acute threat. To protect yourself as well as possible from attacks by Locky and similar ransomware, users should additionally be vigilant when running macros.

Leer más

Tags: // // // //

Efficient Communication Processes in the Supply Chain

Manufacturing companies receive every day thousands of messages by fax, email and letter, which need to be sorted, processed, manually entered into the ERP system and finally archived. To ensure a secure and efficient management of all electronic communication processes, a growing number of industrial enterprises are trusting in Retarus.

Leer más

Tags: // // // //

All Hands on Deck?! Efficient Customer Communication at Sea

Anchors aweigh! More and more travelers are choosing to reach their holiday destination by ship, and benefitting from the high level of relaxation offered by this means of travel. For the organization and planning of a trip, efficient communication with customers is taking on a strategic role. Retarus WebExpress facilitates quick and reliable messaging for shipping lines.

Leer más

Tags: // // // //