Zimbra_zextras_suite

Suite & Zimbra OSE

How to setup External Active Directory Authentication | Zimbra

With this article we are going to see how to configure, through the administrative interface, the external authentication to Active Directory in Zimbra. Configuration After logging in to the AdminUI,...
Continue Reading

How to install and update Let’s encrypt for Zimbra | Zimbra

Using certificates to secure your data and mail traffic is something that is extremely important. We have seen, in the " Zimbra SSL/TLS Commercial Certificate " article, how they work...
Continue Reading

Zimbra Collaboration Suite and Anti-Phishing | Zimbra

Let's get back to dealing with security and especially email security, going to address a delicate and extremely important topic like Phishing and see what measures can be taken in...
Continue Reading

Enterprise Security black, white and gray lists | Zimbra

Zimbra incorporates a spam filter that allows you to reliably protect your company's mail from receiving infected messages that are not related to business correspondence. We've seen how to manage...
Continue Reading

Zimbra Black List and White List | Zimbra

Speaking of email security and spam, there are many factors to consider as we have seen in the incoming and outgoing mail protection best practices articles. Surely, however, we can...
Continue Reading

Cloud or Local Server. Which is best solution for Zimbra Deployment? | Zimbra

Today we are going to cover an interesting topic that every company faces when choosing Zimbra Collaboration Suite, namely which is the best choice for its implementation. Cloud or Local...
Continue Reading

Zextras Implementation Results for SaaS Provider | Zimbra

In this article, we show you a real-world case study on the implementation of Zimbra Open Source Edition and Zextras Suite for a European SaaS service provider that specializes in...
Continue Reading

Improve the security using Zextras 2FA | Zimbra

Security is not an option. Unfortunately, many companies meet security only after an attack has been received, or when they have to limit the damages of a data breach. Security...
Continue Reading