Barracuda PST Enterprise enables IT administrators to regain control over email data stored within PST files divided across organizations.It eliminates the risks associated with PST files, as well as reduce ongoing costs and support IT requirements for Compliance and eDiscovery.

PST Enterprise will discover PST files on network servers and end user systems and migrate this data to a secure location such as Exchange, Office 365 or Barracuda Message Archiver.

 

 

 

Barracuda PST Enterprise

Deployment Options:Software

 
 
 

 Complete PST Management for Your Organization

PST Enterprise enables IT administrators to regain control over email data stored within PST files scattered across their organization. It provides them with the ability to eliminate the risks associated with PST files, as well as reduce ongoing costs and support IT requirements for Compliance and eDiscovery.It will discover PST files on network servers and end user systems, and migrate this data to a secure location such as Exchange, Office 365 or Barracuda Message Archiver.

 Regain Control of Your Data

PST Enterprise identifies all email stored across the organization currently stored in PST files on network locations or end user devices such as laptops, workstations or USB drives, then manage it appropriately so that it is secure and readily available as needed.

 Reduce Legal and Corporate Risk

Central IT departments are usually unaware of the number and location of PST files and they may not have any visibility of their content, and there is a risk that unseen data relevant to an investigation or litigation will be overlooked.Centralizing the data, understanding the content, retaining emails of business value and making the information visible and accessible help reduce corporate and legal risk. PST files are unreliable because of the fact that it gets corrupted and misplaced easily and are infrequently backed up.

Also, they can be disconnected from Outlook and copied or moved with ease which represents a significant risk of data being lost or falling into the wrong hands. Regaining control of the information within PST files will help protect against end user data loss or theft. 

 Ensure Compliance and Information Security

Implementing robust data retention and defensible deletion policies for the data contained within PST files means that you retain only what is actually needed by your business, and all obsolete or redundant data within PST files can be eliminated. As well as reducing costs, this will help to ensure that you are fully compliant across the organization with all relevant government and corporate information management policies. 

 Once all PST files across your organization have been located and the data within them is being managed, it enables you to support eDiscovery and eDisclosure activities by searching this information as needed in response to investigation or legal discovery requests. You can further simplify the discovery process by eliminating these files altogether and migrating their data to a central location or archive.

 

Features

Complete PST discovery

 Locate all PST files wherever they exist across the organization by scanning end user devices, network drives and Outlook profiles. Files will be discovered whether they are connected to an Outlook profile or not, and can be accessed even if they are password‑protected.

Zero Footprint client

The non-invasive client application is downloaded automatically as required and runs in memory without impacting end users 

Automatic Ownership

PST files not connected to an Outlook profile can have their ownership determined automatically as the application intelligently identifies owners of uncoupled files based on the content. 

Direct Migration b>

Data is migrated directly from source PST to your chosen location (such as Exchange, Office 365 or Barracuda Message Archiver) without routing via a central server. This avoids issues with network bandwidth and removes the risk of processing bottlenecks. 

Flexible Processing Actions

 Multiple consecutive actions such as copying, deleting or moving can be applied to each PST file as a whole and these actions can also be applied at an individual message level within each PST file based on message content. This allows selective processing and offers great flexibility in migration options.

Remove Unwanted or Obsolete Data

Retention management policies enable you to retain or migrate only data that’s needed. These can be applied using a number of criteria enabling corporate information and governance policies to be enforced.  

Item Level De-duplication

PST Enterprise can automatically deduplicate individual email messages during migration, ensuring that duplicate or backup content does not get moved to the target location, and each unique message is only migrated once. 

Mailbox Choice

 If data is being migrated to Exchange or Office 365, you can choose to migrate to either Primary or Archive mailboxes.

Delete after Migration

Original PST files can be disconnected from Outlook after migration and deleted automatically, completing the process by regaining storage and preventing further use.  

Advanced Error Handling

 Customizable tolerances and thresholds can be set to highlight and manage any problems encountered during processing, such as corrupted PST files or messages, without interrupting the overall migration process.

Automated Operation

A wide range of processing rules allow operations to be scheduled and processed automatically, or run on-demand if necessary. 

Scalable Architecture

This highly scalable solution is designed to manage an unlimited numbers of users, PST files and locations, and is proven in use with the largest enterprises as well as smaller organizations.  

Parallel Processing

Multiple migration paths maximize performance and avoid Exchange/Office 365 throttling. Specific controls for data throttling flows also allow bandwidth usage to be optimized.  

Customizable Management Interface

An easy to use, web-based administration interface allows administrators to effectively manage and control the discovery and processing of PST files. A wide range of information such as location, physical size vs data size, number of messages within each file and the date discovered are all available. Information from up to 10 additional active directory attributes can also be made available as required. 

Real Time Dashboard

Status reports and displays give a real time overview of operations and progress as well as the detail status and history for each individual PST file. Any files that are corrupted and cannot be processed automatically are flagged for corrective action.  

No End User Disruption

Automatic migration means that user intervention is not required at any stage of the discovery, management and migration of PST files. Furthermore, the folder structure within the source PST can be fully mirrored with the target location ensuring a seamless transition for users. 

End User Portal

An optional end-user self-service web portal allows users to decide how their files are processed and where they are moved to, making it ideal for senior managers or users with sensitive data.