Using Azure AD single sign-on (SSO)
Azure is a popular cloud provider, and the piler GUI supports Azure AD to provide Single Sign-On (SSO). In this article we’ll see how to delegate the piler GUI authentication to Azure AD using its SSO capabilities. Prerequisites You have an Azure subscription or trial,…
Using AWS Cognito single sign-on (SSO)
Single Sign-On (SSO) is an important feature towards security. The benefits are huge. Users don’t have to memorize several passwords to access company resources, a single strong password is enough. SSO providers often add other useful perks, eg. password recovery, 2FA, protection against brute-force password…
The bucket feature
What if you needed to provide access to a bunch of emails from different email accounts to a 3rd party? Let’s say an external auditor needs access to emails related to a specific case. The relevant emails are located in 10 different mailboxes. You don’t…
Reviewing Zimbra Network edition’s email archiving capabilities
What is Zimbra? Let me quote their own definition from the Zimbra website: “Zimbra, a Synacor product, is an email and collaboration platform that includes contacts, calendar, tasks, instant messaging and file sharing, plus add-ons such as videoconferencing, document creation and file storage.” The Zimbra Network…
Running piler on Zentyal
What’s Zentyal? Zentyal is an easy to use Linux alternative to Windows Server. Its features include replacing an MS Active Directory, securing Internet access using VPN and firewall, etc. It also has a dedicated mail server, however it doesn’t have email archiving capabilities. This is…
Communigate Pro with piler
Piler enterprise supports Communigate Pro. The below setup has been tested with Communigate Pro 6.3.5. The setup procedure is pretty simple. The first step is to create a new rule in “Settings” / “Mail” / “Rules” menu, then click on the “Add rule” button. Then…
The Phisher’s playbook
BitDam provided a nice material how phishers think, what they want, their targets and more. From their site: Read ‘The Phisher’s Playbook’ to gain a perspective of how phishers plan their scams and how you can protect from them. The Playbook covers: Who are the…
How to fulfill a subpoena as a compliance officer
A nice blog post worth to read from Cheryl Ritchey.
Running piler on Nethserver
What’s Nethserver? A lot of small businesses run a customized Linux distribution specialized to small offices and medium enterprises. Nethserver is such a Linux distro based on the popular Centos 7. Nethserver is an operating system for Linux enthusiasts, designed for SMB companies. It features…
3-2-1 Backup: The Rule For Recovery
A single backup is not enough You think you have a backup, so you are covered, right? Not even close. Having a backup of your emails is a must. However, it may not be enough. Several incidents show that some disaster could happen even if…
Latest insights
- Using Azure AD single sign-on (SSO)
- Using AWS Cognito single sign-on (SSO)
- The bucket feature
- Reviewing Zimbra Network edition’s email archiving capabilities
- Running piler on Zentyal
- Communigate Pro with piler
- The Phisher’s playbook
- How to fulfill a subpoena as a compliance officer
- Running piler on Nethserver
- 3-2-1 Backup: The Rule For Recovery