Reliable software
June 11, 2022

Reliable software

Gregorio Sandoval | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Microsoft Exchange

A more formal means of communication. Search for contacts and previous emails in a simple way. It adapts to your work style so that you improve your productivity. You will have your emails, calendars, and contact information. A calendar system that goes beyond the classic programming. You can capture mail events.
  • Email is accessed not downloaded or stored on the device
  • Allows access to email whatever it is
  • It allows us unlimited calendar storage
  • Poor integration with traditional applications
  • Allows the operation of the communication platform
  • They have the possibility of deploying mailboxes
  • Data verification capability
  • Extra security between the organization
Internal communication messaging, and shared file storage. It has open API standards, which can help reduce maintenance overhead. Each incoming email is received first on the server, they provide a continuous service in various failure scenarios. It guarantees the automatic recovery of the database, it favors the agility of the critical processes of each company, and it allows for sharing and organizing the information.

Do you think Microsoft Exchange delivers good value for the price?

Yes

Are you happy with Microsoft Exchange's feature set?

Yes

Did Microsoft Exchange live up to sales and marketing promises?

Yes

Did implementation of Microsoft Exchange go as expected?

Yes

Would you buy Microsoft Exchange again?

Yes

Agendas and viewing in parallel. Access even if we are not connected to the server, copies of email and calendar elements are preserved, and all maintenance is carried out free of charge. Tools that greatly facilitate the work. Use of servers that support a considerable volume of data. Fully optimizes collaboration and data transfer.

Microsoft Exchange Feature Ratings

Anti-malware
8
Customizability
9
Data Loss Protection
10
Threat Detection
7
Sandboxing
9
End-to-End Encryption
8
Management Tools
10