A: In version 2.x and above, yes. Each edition is feature based. Bolster Suite was/is designed and built for high volume clients such as Cloud providers, ISP's and Enterprises. In addition, Bolster Suite uses minimal resources and the full Bolster Suite binaries are under 14MB, making it easy to work in almost any size environment, not matter how small or large.
A: No. Although public IM's are great tools for connecting to family and friends, BolsterEIM was created so sensitive organizational material is fully encrypted and can remain private. BolsterEIM was built to reap the benefits of Instant Messaging, while over a secure (SSL) connection, with added encrypted state and storage. In version 2.x, BolsterEIM can now securely connect to all other BolsterEIM servers.
A: Management of Bolster Suite is fairly simple. Bolster Suite Administrators manage the Bolster Suite server, domains, user accounts, domain groups, global SPAM filtering, system logs, which Bolster Suite application(s) users have access to and more. Users can manage all SPAM filtering options (including add-ons), their own groups, their own "look and feel" and much more, all in easy to use screens. The provided documentation adds additional detail to all the available options.
Bolster Suite software includes numerous security options, allowing for organizational tailoring, true regulatory compliance, intense encryption, full or incremental backup, and extended privacy measures. All to ensure your data integrity, reliability, and accessibility only for those who have been granted access.
A: A typical installation takes about 20-30 minutes. Some of the configuration (or base configuration) occurs during the initial installation. How you decide to tailor your system will determine how much longer it takes.
A: Yes. Included in Bolster Suite is Email Archiving, while all Bolster Suite data, including email, is backed up regularly with Bolster Suite's BUStore. In addition, users can save individual Email messages to their hard drives if they so choose.
A: Yes. Any modern browser capable of Secure Sockets Layer (SSL), including mobile devices, allows for access to your Bolster Suite. In version 2.x, to address man-in-the-middle (MITM) issues, Bolster Suite has developed a mobile app for Andriod devices, and (soon) the iPhone. Each mobile app has additional transmission encryption. We are currently developing a browser plug-in to add additional browser(client)-server encryption.
A: Yes. Any modern browser capable of Secure Sockets Layer (SSL), on almost any platform, including mobile devices, allows for access to your Bolster Suite content. In version 2.x, to address man-in-the-middle (MITM) issues, Bolster Suite has developed a mobile app for Andriod devices, and (soon) the iPhone. Each mobile app has additional transmission encryption. We are currently developing a browser plug-in to add additional browser(client)-server encryption.
A: Anti-Virus software for Unix-like systems of course can be used. However almost all email is sent in one encoding or another, or in plain text. Email attachments are stored in the encoding from which they were sent (usually BASE64), and as read only. Bolster Suite decodes, filters and streams "on the fly" attachments selected for download, while clearing the server's memory. It is of course always good policy to make sure client PC's have an Anti-Virus solution installed.
A: Yes. Your Bolster Suite Administrator manages each domain's user database, which in turn, translates to a Global Address Book, while each user can add their own users to their personal Contact Manager.
A: In version 1.x we utilized our own proprietaty encryption combined with our own proprietary MIME type (Content-type) for both transmission and storage of email. Originally intended only for internal communications by your local Bolster Suite server, or any other Bolster Suite server. However, in Bolster Suite version 2.x, we added options for PGP and OpenPGP-compliant GnuPG (GPG).
A: In version 2.x, yes. Since Bolster Suite version 2.0 is near completion and will be the first to include this new technology, we are in the process of developing a Request for Comment (RFC) to freely share this new technology with other email software providers. It is a system and method of real-time email source and recipient anonymization, utilizing asynchronous (public-key) cryptography in a way that can be applied incrementally, without the need to alter the SMTP protocol. Full details will be provided once the RFC is posted.