Actiance and Smarsh to Create Global Compliance and Enterprise Information Archiving Leader

Smarsh Actiance

K1 Investment Management today announced the acquisition of Actiance, a pioneer in communications compliance, archiving, and analytics. Pending regulatory approval from government authorities, Actiance will combine with Smarsh, which provides comprehensive archiving solutions for compliance, e-discovery and risk management, creating the clear, global market leader in compliance and enterprise information archiving. The combined company will serve more than 6,500 financial services firms ─ including the top 15 global banks and regional, mid-size banks and broker-dealers ─ as well as government agencies and organizations in other regulated industries.

Smarsh Solution

Read the rest of the article

SpamTitan Update

Software Update

SpamTitan Update Version 7.0

This latest release includes an update to the SpamTitan anti-virus engine now incorporating Bitdefender AV and various ClamAV updates.
This change is due to our growing strategic relationship with Bitdefender which will see continued collaboration in the future.

Clients hosted by RD:  The update will have no effect on your system and you do not need to make any changes.

Clients OnPrem : The patch will appear on the list of Available Updates on the System Updates page of the SpamTitan user interface if prefetch of system updates is enabled.
If this option is disabled, then the Check for Updates Now option may be clicked on the user interface to check and download any available updates.

For help please contact:


Xtraction Release 2018.0 Reporting


Xtraction 2018 Comming soon

If you are using Ivanti  you can download Xtaction for free. This will allow you to create powerful reports on your current Ivanti solutions and more. Whether or not you currently own products from former HEAT, LANDESK, AppSense, Res, and, Shavlik; this will benefit you.

The version 2018 will now support HTML 5.

Download Links:

  1. Download Xtraction – for new installations and upgrades of previous versions
  2. Report Builder – for installing the Report Builder Windows application on workstation
  3. Data Model Editor – for installing the DME on workstations (instructions found in the attached Upgrade Instructions document)

Need Connectors

Robinson Partner with Smarsh Archiving

Archiving with Smarsh

Robinson Distribution, spend the last 15 Years helping customers to be compliant through archiving. With a large customer base in Government and Corporate we had the privilege of working with some of the best managers and Partners in the industry. The feedback we received from them were critical to our solutions success in the African market. With the POPI compliance on our doorstep it became evident we need to expect much more from our archiving solution.

Continue reading “Robinson Partner with Smarsh Archiving”

What Gartner say about Archiving ?

Most companies in South Africa already received the message on POPI (Protection Of Personal Information) Act, to be implemented this year.

The POPI Act was signed into law in April 2013, but the South African Information Regulator, the body responsible for implementing the Act and monitoring its implementation, has indicated that the Act will only be in full effect in early 2018.

Continue reading “What Gartner say about Archiving ?”

Snapshot Backup for Red Hat Virtualization 4

SEP Backup and Disaster Recovery announces Snapshot Backup for
Red Hat Virtualization 4

  • SEP provides advanced data protection and native backup API support for Red Hat Virtualization 4
  • Compliant backups, fulfillment of SLA’s and support for any guest operating system
  • SEP to provide a unified data protection solution for Red Hat Virtualization

Continue reading “Snapshot Backup for Red Hat Virtualization 4”

WPA and WPA2 Vulnerabilitie

On October 16, 2017, a statement from the International Consortium for Advancement of Cybersecurity on the Internet (ICASI) was released alerting the industry to a series of vulnerabilities for WPA and WPA2. These vulnerabilities affect a large number of wireless infrastructure devices and wireless clients, across many vendors. This security flaw means
that, for vulnerable clients and access points, WPA and WPA2-encrypted Wi-Fi traffic is no longer secure until certain steps are taken to remediate the issue. The Wi-Fi data stream,including passwords and personal data, can be intercepted, decrypted, and modified without a user’s knowledge. 

Continue reading “WPA and WPA2 Vulnerabilitie”


After receiving so many requests to explain the difference between a UTM (Unified Threat Management) and NGFW (Next Generation Firewall), I came across a great video that explains it in detail and decided we should shed some light on it and help customers and partner to better understand the difference.

Continue reading “UTM vs NGFW”