by Malcolm Tinkler
Taking a break: Mimecast Developer Azam Khalidi on the office pool table
On the 2nd March, The Sunday Times in the UK published its annual list of the 100 Best Companies to Work For 2014. This was the first year we’ve been listed and we’re proud to place 43rd in the ‘Mid Company’ category. If you’d like to take a look at the full list you can find it here.
Best Companies’ methodology, BCI Measure, is widely recognized as one of the most academically rigorous measures of workplace engagement. Data is collected from over 1.5 million employees, exploring workplace performance areas such as personal growth, wellbeing, leadership and team work. In essence it‘s recognition by your own employees about how they view the company.
We’re particularly pleased as we’ve worked hard to build our culture in tandem with our focus on creating a fast growth company that has expanded significantly geographically.
We pride ourselves on attracting and retaining the most talented people to Mimecast which is why we invest heavily in training, mentoring and recognition in new and innovative ways. From the yoga studio in our Boston office to our ergonomically designed meeting pods in London, Mimecast pushes the boundaries for progressive working environments both physically and in the work we do.
As we look to our future, we realize that to fulfill our aspiration of being the largest and safest repository of human-generated data, we need a special team of the most talented people to achieve this right across our business from engineering to sales.
Which is why it was so great to be recognized last week – it’s a step in the right direction to forming the best company to deliver on this ambitious goal.
by Mark Bilbe
For the second year in a row, our very own Sean Broderick, director of U.S. channels, has been named one of CRN’s 2014 Channel Chiefs. We couldn’t be more proud of Sean and his team when it comes to driving our channel success and awareness in the U.S.
Sean Broderick named a CRN Channel Chief for second consecutive year.
You may be wondering: What makes a Channel Chief? This year’s Chiefs were selected by the CRN editorial team based on channel experience, program innovations, channel-driven revenue and public support for the importance of IT channel sales. Sean, a worthy Chief indeed, has not only blazed new trails for Mimecast’s U.S. channel program, he has evangelized the importance of the channel throughout the entire IT industry. Since joining Mimecast less than three years ago, he has played a major role in increasing the size of our U.S. partner base by 500 percent. And he designed a channel program that provides full support to our U.S. partners, helping them grow their customer bases and strengthen operations.
We look forward to a successful year in the channel as Sean and his team execute new plans and innovations to help aid our current partner base, and new ones to come.
The 2014 Channel Chiefs list is featured in the February/March issue of CRN, and online at www.CRN.com.
by Nathaniel Borenstein
I was delighted to be asked this week to contribute to TechRadar – in case you didn’t see the article, you can find it here. In it, I explored the differences between privacy of work and personal emails. Conscious that some of our blog readers might not have seen it on TechRadar, I thought it would be useful to repost it for you all…
Organizations carry a serious responsibility for reporting, governance and legal or regulatory compliance.
…I love email. I use email every day for communication and collaboration in every aspect of my work and private life. It has been a feature of my life for decades. A personal email between me and someone else is just that, personal and therefore private – sacrosanct. No ifs or buts. But my work email is a different matter. I appreciate that my business and personal email don’t operate within the same standards of privacy. More to the point – I shouldn’t expect them to. That’s why I have two different email addresses.
Organizations carry a serious responsibility for reporting, governance and legal or regulatory compliance. Every communication is part of a chain of evidence an organisation is expected to be able to report on if needed, and email is the archive where the majority of this information exists. It’s where we all do business.
But all too often we bring expectations of freedom and privacy from our private lives into the workplace. We’re uncomfortable about the idea that our employer can enforce ‘appropriate use’ policies or archive email with the right to review it if needs be. Well, we shouldn’t need to be concerned about this, because our employer should help ensure that we don’t need to put anything personal in corporate email.
Understanding the Inside and the Outside
First of all, business email is nearly always operated by or for the business, as a dedicated domain with a clearly defined “inside” and “outside,” bounded by a gateway. Inside the boundary, the company has rights and expectations of control over the information, while anything can happen outside. Consumer email, for example, may be viewed as “always outside” in this formulation. Business email that crosses the gateway, in either direction, can be subject to a variety of checks, restrictions, and other processing, which is not the case for consumer email.
In theory, a company has complete control over any information that passes through its gateway. Among the likely jobs of this gateway are:
- Spam filtering. This is usually done in both directions: to prevent outside spam from getting in and to prevent internal machines (perhaps hijacked by a virus) from sending out spam and tarnishing the company’s reputation.
- Data Loss Prevention (DLP). Whatever the business, it’s not uncommon for employees to send sensitive information outside the company, whether intentionally or by accident. However, if a company can define the characteristics of sensitive information, which could be as simple as the words “Do Not Redistribute”, then the gateway can automatically enforce restrictions against sending such information outside the company.
- Large file modification. Internet email operates with size limitations that seem small by today’s standards and, vary from site to site. Email messages that total more than ten megabytes are highly likely not to be delivered. As an alternative, gateways can replace large file attachments with simple links and make the files available from a web server, with or without some kind of user authentication requirement.
While these external gateways may seem complicated, business email is further enriched with more complexities inside the gateway, none of which are concerns for consumer email.
- Security. Most computer security failures come from within the company, most often because an employee has unintentionally allowed malware to infect their machine. This can happen even with the most secure gateway in the world, as users can be tricked into downloading the malware, most often via the web or a USB storage device. Once a machine is weakened, it can easily be used to disrupt all communication-related security. While consumer email can also be compromised, the consumer depends on a service provider to deal with the problem, while a business, and especially the IT manager, needs to worry about it for its internal network. Such disruptions can wholly or partially shut down a company’s email system, or can even cause critical information leaks.
- Privacy. Although all corporate email characteristically belongs to the corporation, it is generally considered important to isolate the mail for each user, so that they can’t all read email to Human Resources or the CEO. This requires a certain amount of effort for account maintenance and administration.
Legal and Regulatory Issues
Finally, most businesses operate under legal and regulatory restraints that are simply not relevant to consumers. Here are a few examples:
- Archiving. There is a strong and highly specific business need for archiving. Some companies want to keep all their information forever, while others want assurance that it’s completely removed after a certain amount of time. (Legal requirements can strongly constrain such policies.) Both of these are tricky to do right; keeping information forever requires disaster-proof practices, while complete purging has to account for such pitfalls as back-up tapes.
- Compliance. In many industries, legal or regulatory requirements place considerable burdens on corporate communication. Beyond archiving, which is often mandated, there are often regulations (such as HIPAA in healthcare in the USA) regarding the treatment of sensitive information. For a company that is not in the communication or compliance business, it can be hard to know what regulations apply, let alone how to comply with them all.
So when all is said and done, if we want to continue to benefit from the power of email in our business life we need to recognize it is a different tool at work than home. Our business email has to operate under different standards of privacy, much like other forms of business communication. Once we take these concerns into account, we might even find we use email more effectively and create less risk or problems for our businesses in the process.
Of course, all of this depends on employers maintaining reasonable policies about occasional use of personal email while at work. If you expect me to accept the rules about corporate email, you should give me a way to occasionally access my personal email from work when it really matters. Otherwise, you’re forcing me to use corporate email to talk to my kids’ doctor, and I’m far less likely to view the privacy limitations of corporate email so benignly.
by Nathaniel Borenstein
It’s that time again. It seems to come around at least a few times a year. Time to question if there’s life left in the old email dog.
The first time I heard the death of email predicted was in 1980, as a graduate student in Computer Science at Carnegie Mellon University. I had just joined the set of people whose duties included maintaining and developing the electronic mail and bulletin board systems upon which my department was already dependent. There were well over a hundred machines on the global network, so things had gotten pretty complex.
Nathaniel Borenstein also shared his views on the strength of email this week on Australia’s ABC Radio Future Tense http://mim.ec/1dBomn8
It was true then, and it’s true now: Email is indeed an old technology, with lots of legacy problems. However, that doesn’t mean that starting over will necessarily yield a better result, much less one that could justify the cost of the transition.
So, every few years for the last third of a century or so, someone has come along with a grand plan to do something that will make email obsolete. To date, that hasn’t happened, largely because most people don’t understand why email has been so successful in the first place.
Email has succeeded, in large part, because of the following architectural factors:
- Open protocols. It must be possible for different people to use different software and still communicate with each other. That software can’t all be written in the same place. The great virtue of the open protocol process is that anyone can participate, most problems are anticipated, and the result actually works well for multiple vendors.
- Backwards compatibility. In 1980, the Internet was already getting to be too big and distributed to simply change protocols on a “flag day” as it had occasionally. The best way to replace a protocol is to extend and evolve it.
- Inclusivity of community. In the early days of email there were islands of communities, such as CompuServe or FIDOnet, in which people could communicate with each other but not beyond the island. Although some providers tried to stay isolated, the value of having email extend to anyone you might possibly want to reach was overwhelmingly more important than the financial interests of a company like AOL — a fact that today’s social networks, like the earliest email providers, have so far managed to ignore. IM or email on your social network of choice is great for contacting another ‘friend’, but no good if you want to reach someone outside that closed network.
And, arguably but more controversially, this factor:
- Unauthenticated and uncontrolled. The lack of authentication in Internet mail (and on the Internet in general) is often cited as one of its weaknesses but is in some ways its strength. It’s a mixed bag because it simultaneously facilitates certain kinds of criminality while strengthening personal freedom. The ideal balance can be argued, but it seems clear why it has emerged the way it has — individuals and institutions alike are leery of ceding power where matters of privacy are concerned.
Recently I read in Wired that a new company, Asana, has observed that email is an old technology, with lots of legacy problems particularly inside organizations. So, it wants us to start over with something new. Like its many predecessor email replacements, Asana is no doubt a mix of mostly-good ideas that ignore some of the key factors above. In fact, it reminds me most of an early-90′s company called General Magic.
General Magic had done some really good things with asynchronous communication. Most notably, messages could include programs that would be executed on the recipient’s end. To do this safely, of course, strong authentication was required. Probably for that reason, General Magic conceived its product as an alternative to email rather than compatible with email.
(It was, by the way, possible to do the same sorts of things in Internet email — I and other researchers had already done in the past. But it would have required standardization and more complexity, and it would have been far less profitable for General Magic. Dominating all asynchronous communication in the world, that’s where the real money is.)
Anyway, what ended up happening to all the well-funded “email replacement” schemes I know of (Asana is founded by Dustin Moskovitz of Facebook fame, General Magic was Apple and AT&T) is that they built some fabulous demos, got a few key “showcase” users, and kept trying until they either ran out of money or evolved a more profitable business model. General Magic did both — after some hard times, it came back to do things like build the first version of OnStar, but then cratered in the Internet crash.
Asana may do well or badly, I wouldn’t care to predict. But I’ll predict that if it’s still around in a few years, it won’t be pitching itself as an alternative to email. It’ll be telling you how well it works with email and how much it improves email.
I hope it’ll be right, because email is an old technology, with lots of legacy problems.