Bolton Wanderers boots up e-mail management system

Premier League Football club Bolton Wanderers has upgraded to a web-based e-mail management systemto halve administration time, ensure business continuity, and improve security.

Premier League Football club Bolton Wanderers has upgraded to a web-based e-mail management systemto halve administration time, ensure business continuity, and improve security.

"Since moving to the web-based service from Mimecast, viruses and spam are blocked at source and, therefore, do not waste valuable disk space and bandwidth," said Dave Atkinson, IT manager for Bolton Wanderers.

"A key attraction for the web-based service was that e-mails are stored on triple-redundant servers at geographically remote locations and offer a continuous service even if there is a server outage," he said.

The move to the software-as-a-service model is part of an upgrade of the club's local area network to an IP-centric environment.

Bolton Wanderers has also opted for Mimecast's archival service to provide an audit trail that could be used in court to defend the club's reputation should the need arise.

"The club wanted to be able to provide evidence of all electronic communications between players, agents and the club," said Atkinson.

An expected benefit of the system, he said, was that it enabled the corporate hospitality and marketing departments to send targeted, branded e-mails and measure response rates.




CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close