AIT adds Hosted Exchange — Pushes email to mobile devices

March 20, 2006 (PRLEAP.COM) Technology News
AIT (http://ait.com) has added to its messaging and collaboration services with the introduction of Hosted Exchange email, including the capability of pushing messages to handheld devices. AIT’s Exchange solution ties into document sharing, virtual conference rooms, and Voice-overIP Telephony, and a series of advanced features that create a full-service communications suite. Hosted Exchange from AIT is being offered for an industry-low $9.00 per month. “Business lives and dies by information, its capacity to receive it and ability to make it available to a mobile workforce,” said Clarence Briggs, AIT’s Chief Executive Officer. “At the same time, companies who want the capability don’t need the headache of managing systems themselves because the time involved takes away from their core functions and away from customers.”

AIT’s Hosted Exchange includes a SuperSpam blocker – controlling mail flow before it reaches the server – anti virus capability, and backup protection, the most critical requirements of any outsourced plan. According to industry figures, the hosting of 45 – 60% of all corporate mailboxes is done off-site as companies get away from heavy upfront costs, lengthy deployment periods, and security concerns. While outsourcing is less expensive, it also makes key systems more manageable as work moves away from its comfortable cubicles:

• Multiple offices in need of a unified mail system
• Information that is always there, regardless of where ‘there’ is
• Remote collaboration with co-workers and clients

“It’s not just e-mail anymore; messaging, conferencing, and communications systems go far beyond that and they have to provide convenient access to information,” said Briggs. “Technology has to do more than just save a few dollars; it also has to make sense and that’s the value of a hosted service.” In addition, e-mail and other messaging utilities have become more complex, and new capabilities require a higher level of management. Plus, each new capability that is added to a system implies a potential new exploit for malicious operators to root out.