Discontinuing Zimbra Sync and Share

In July 2014, Zimbra acquired a company called Mezeo. The acquisition included the file sync and share technology that we refer to as Zimbra Sync and Share. Over the last year, Zimbra conducted extensive research and beta testing in advance of making the product available to the public. Unfortunately, feedback from testers was not what […]

Continue Reading 1

One Week Left for the Upgrade Assessment Discount

By now, you may have watched the upgrade webinar that explores Zimbra Collaboration’s three upgrade methods. With only one week left before the upgrade assessment discount expires, we want to share some tips an email sysadmin might find useful. Have good backups. Update your operating system. You can use yum to update Red Hat and CentOS […]

Continue Reading 0

Upgrade Assessment Savings Expire in 3 Weeks

For a limited time, customers who purchase an Upgrade Assessment from Zimbra Professional Services will be eligible to receive a discount (valued at up to $5,000) on related implementation services through Zimbra Professional Services. Sign up by July 1, 2015. The Zimbra Collaboration Upgrade Assessment, delivered by Zimbra Certified Professionals, provides expert recommendations, best practices, […]

Continue Reading 0

Free, On-demand Webinar: Zimbra Web Client for End Users

We are happy to announce that we have a new on-demand webinar, “Zimbra Web Client for End Users” . This 2-hour webinar covers all the basics of Zimbra, plus in-depth looks at preferences, sharing and filters. Watch this free, on-demand webinar by Gayle Billat, Services Training Manager at Zimbra. Also, you can see more resources and training in the links […]

Continue Reading 2

Logjam’s Impact on Zimbra Collaboration

Zimbra is aware of a newly disclosed SSL/TLS vulnerability that provides a potential malicious actor with a method to perform a Man-in-the-Middle (MitM) attack — the vulnerability is referred to as Logjam. Similar to FREAK, this attack targets export-grade encryption, specifically Diffie-Hellman key exchanges. For more information on the attack and how this applies to […]

Continue Reading 3