Ignite is Microsoft's largest conference each year and this is our second year of showing what BCC can do for Microsoft customers.
Engage this year was organised on the SS Rotterdam and it turned out that it was possibly one of the best venues for a conference you could chose other than a dedicated conference facility, if only the windows would open.
A lot of our customers are facing the same challenges, we thought it would be a good idea to share some of our project experiences. This month's focus is a mail migration project.
One of the challenges companies face with "mergers and acquisitions" is how they merge the mail systems. This could be as simple as consolidating two similar mail systems, or as complex as having to bring in mail from a totally different solution.
One of our recent projects was just that. This customer had acquired part of another company. The acquired company had been using Domino for mail, the customer was an Office 365 user. The customer had no experience with Domino nor did they have access to the source mail system. The host company were passing two copies of the mail files - one for testing, one for the live cut over.
How were they going to migrate the mail files with no idea of what to do with, or how to open a domino mail file? This had to be done securely and in a timely manner.
Most people are aware of what a Domino server does - it holds all of the databases and therefore access to pretty much everything. And each server has a server ID. Protecting a server ID with a password works in much the same way that protecting a computer or account with an ID works. In this case, the server ID password is individual to the server itself, rather than the user, but access to that password is limited to a finite number of people with administrator authority.
IBM Domino Server provides a range of security measures, but the configuration can easily get complicated and give rise to major security issues. It is impossible to satisfy the security and compliance requirements of a multi-server environment in organizations without having a reliable track record of the access and configuration changes.
Knowing how to lock down access to your IBM Domino server is of vital importance. In the event of unauthorised access to the server, a breach of confidentiality is more likely and can lead to data theft. Legal battles, GDPR compliance breaches and hefty fines can be extremely detrimental to the company. Use the following steps to ensure the lockdown of your IBM Domino servers.