Collax add-on modules
Addon software modules for Collax Server
Collax offers flexible server solutions with individual expansion options. Our customers appreciate this flexibility. For the installation of software modules, appropriate packages are downloaded from the update server and integrated into the system.
As a rule, an installation can be performed if the relevant product or add-on module has been activated with a license key.
With Collax Central you always have an overview of all Collax servers. This makes administration much easier. Thanks to active system monitoring, Collax Central points out problems at an early stage and offers an effective tool for efficient and fast administration. This is where all the information comes together. This allows problems in a large server landscape to be identified at a glance. Sporadic and regular maintenance tasks are completed quickly.
Always everything in view
The compact overview provides immediate access to all important information on hardware utilization, updates and license terms. Many more detailed information can be displayed with a single click. If maintenance work is due or a problem is detected, a further click is sufficient to perform the administration task.
Hierarchy and structure make the difference
All servers can be sorted into a freely configurable, hierarchical structure. The administrator can create his individual dashboard according to his requirements. Thus he has all information available quickly and clearly. The flexible search function as well as a multitude of filters complete the range of functions.
The Collax V-Transfer module gives administrators more flexibility in handling VMs and increases scalability when Collax V-Bien, Collax V-Cube and Collax V-Cube+ interact. This is because Collax Transfer provides functions for transferring VMs between the products as required.
Simple and safe operation
With just a few mouse clicks, it is possible to transfer a VM directly between two Collax V-Servers or to change the storage type and other properties before the transfer. Before the transfer starts, a detailed check is performed to determine whether the VM can be operated on the opposite side. Actions that affect the smooth transfer and errors during the transfer are prevented respectively intercepted.
Optimal interaction: Collax V-Transfer and Collax Central
Together with Collax Central, the operation of Collax virtualization solutions is significantly enhanced. A transfer can be initiated conveniently via the dashboard.
- Higher scalability
- More flexibility
- VM transfer between all Collax V products
- Convenient operation via Collax Central
Acronis Backup Advanced for Collax Virtualization
Based on Acronis technology, the solution uses efficient disk imaging to provide the industry’s fastest backups and most flexible and reliable recovery options.
Backup can be so fast and easy. Individual files, applications or entire virtual machines can be restored in no time at all - all from one backup. Acronis Backup Advanced for Collax Virtualization can restore your data to its original location or to a completely new location.
- Restoring a Server as a Virtual Machine (VM)
- Backup directly to tape
- Server migration
- Disaster Recovery
- Efficient incremental backups
- Central administration and reporting
- The world's leading backup solution
- Multiple awards
- Seamless integration into all Collax V-Servers
- Simple administration - also available remotely
- Transparent cost structure - One license per node (regardless of the number of virtual machines)
- Single Point of Contact: Support about Collax
Collax Advanced Networking
Almost every company depends on a fast and functioning network connection. The module Collax Advanced Networking offers everything needed to keep the network running without restrictions, even at peak times. Important applications can be prioritized via bandwidth management. The Policy Based Routing function and Multi-WAN ensure that all data traffic is optimally distributed among the available connections. The module is rounded off by a intrusion detection and prevention system.
Bandwidth management enables applications to use the network bandwidth more efficiently. For modern communication over the Internet, such as VoIP or online meetings, it is important to manage and prioritize bandwidth intelligently.
A very elegant method of channeling data in a network is offered by policy-based routing. If there are multiple paths for the data to reach a destination, the path can be specified depending on the protocol. The rules can be applied to both forwarded and locally originated connections (e.g., proxy, VPN).
Multi-WAN makes it possible to bundle lines and thus establish network connections extremely cost-effectively with high bandwidths. Integrated load balancing ensures load distribution as well as maximum throughput and fail-safety.
Intrusion detection and prevention
Intrusion detection and prevention (IDS: Intrusion Detection System / IDP: Intrusion Prevention System) provides additional security. The system detects malicious attempts to gain unauthorized access. Attackers can be automatically blocked by the firewall even before they can cause any damage.
- Smooth communication even when the Internet connection is busy.
- Bundling of multiple Internet connections
- Structured distribution across multiple Internet connections
- Intrusion prevention
Collax Avira AntiVir
Collax Avira AntiVir is a high-quality and reliable product for protection against viruses and other malware. It is based on the technology of the market-leading anti-virus company Avira.
Collax has perfectly adapted the award-winning and widely used anti-virus software to the Collax C servers. The solution is seamlessly integrated at the click of a mouse and immediately offers maximum protection against threats from the Internet. Collax Avira AntiVir is based on three different mechanisms: E-mail scanner, file scanner and web traffic scanner.
Collax offers the following variants of the proven anti-virus software:
E-mail Scanner with File Scanner
Installed on the Collax Groupware Suite, the Collax Avira AntiVir extension offers protection against unwanted e-mails and malicious content. We seamlessly integrate Avira’s e-mail scanner and file scanner technology into our servers.
Web Traffic Scanner with File Scanner
In a second variant, we offer the Web Traffic Scanner together with the File Scanner as an extension for the Collax Groupware Suite. This allows you to efficiently and easily control Internet usage within your company. At the same time, the file scanner provides more security by checking data that has been manually brought into the company (e.g. via USB sticks or smartphones).
As a third variant, we only offer the file scanner as an extension to the Collax Groupware Suite. This ensures maximum security for all your data. The file scanner reliably identifies and eliminates infected documents.
- Daemon updates without service interruption
- Administrator alert
- Quarantine for unknown archive formats / file formats
- Automatic deletion of infected files
- Real-time scanning of e-mails (with attachments) and web traffic
- Scan of the file cache
- Supports all popular protocols for file sharing, email, and web
- False Positive Control
Archive for e-mail and e-invoicing
Every taxable company is instructed to archive business-relevant e-mails and e-bills (electronic invoices) in a revision-proof manner. The Collax E-Archive is a simple way to meet the requirements of the Ministry of Finance. In order to facilitate the daily work with e-mails, each employee can be given access to his or her own e-mail archive.
The Collax E-Archive can be activated quickly and easily. It archives incoming as well as outgoing emails and e-bills and forwards an unchanged copy to the mail server. This process is automatic and tamper-proof. Archiving can also be performed if the mails are forwarded to another mail server.
One archive for each user
Beyond the obligation, each employee can be granted access to his or her own e-mail archive. A powerful search function makes it possible to conduct extensive searches in old correspondence. Each user can restore e-mails himself. In addition, the archiving ensures a lasting relief of the mail server.
Compliance with legal requirements
The e-mails are indexed before being forwarded to the mail server. This means that the e-mails can be found more quickly later. They also receive a signature so that authenticity and integrity can be checked when they are retrieved. Images for read-only media such as CD, DVD or Blu-ray Disc are automatically generated for long-term, revision-proof storage.
If it becomes necessary to search the entire archive, there is an auditor who can access all emails and e-bills. In order to prevent misuse, it is necessary for a second user (e.g. a works council) to confirm full access with a second password according to the four-eyes principle. An e-mail notification to a stored address is triggered. Every search carried out by the auditor is logged by the system.
The ministry of finance has concretized with the principles to the orderly guidance and storage of books, records and documents in electronic form as well as to the access to data (GoBD) how with tax-relevant dates, that were not processed in paper form, must be proceeded. The guideline prescribes a long-term, unchangeable and safe storage of the messages. A conventional archiving as expression excludes it explicitly.
- Audit-proof storage of e-mails and e-bills
- Meets legal requirements
- Four-eyes principle
- Verifiable data integrity (signing of archived e-mails)
- Tamper-proof archive
- Open, platform-independent archive format
- Archive for any e-mail server
- Simple and fast procedure
Collax Anti Spam
Collax Anti-Spam contains a number of new and up-to-date applications that guarantee the security of email servers. Collax Anti-Spam can also be used to set up a special mail gateway based on Collax servers and works perfectly even in complex, heterogeneous systems.
Collax Anti Spam uses a hybrid approach in the cloud and on-premise to detect spam and phishing. Some of the methods are cloud-based, enabling more effective detection and blocking of emails.
The anti-spam solution uses various methods to detect spam and phishing. The final spam scan result is determined by the combination of results from different methods. You can flexibly configure which methods are used by changing the settings according to your needs.
High throughput, high performance
Collax Anti-Spam has been specifically designed to ensure high throughput without significantly impacting the performance of your systems … for more efficiency in your business.
PROTECTS E-MAIL SERVERS AND COLLABORATION PLATFORMS
Collax Anti-Spam acts as a mail gateway to protect email on major email and collaboration platforms, including Microsoft® Exchange, IBM Lotus® Domino, and Collax-based email servers.
- PROTECTS E-MAIL SERVERS AND COLLABORATION PLATFORMS
- Increased employee productivity
- Better protection with cloud-based technologies
- Comprehensive network management
- High throughput, high performance
- Real-time scanning of e-mails (with attachments)
Kopano Groupware for Collax Server
Topics such as BYOD, file sharing and web meetings are not just buzzwords, but also increasingly dominate the everyday work of small and medium-sized companies. A company-wide available IT platform is essential for business communication.
Groupware on the desktop, in the browser or mobile
The Kopano Groupware offers all the familiar email, advanced calendar and contact features so you can be productive. The browser-based interface gives you an overview of what’s important to you, whether it’s incoming email, your weekly schedule, or the contact details of the person you want to call.
Meet online in an incomparable video and audio quality, directly via the groupware WebApp. Use the presentation mode to increase your team’s productivity or simply share your screen so all participants look at the same document.
See who’s online and start an online meeting or chat with just one click.
Invite external participants to your web meeting via e-mail or directly from the meeting request. All you need is a browser to attend your meeting.
File Sharing - Stay in Control
It is easy to share files and folders using your existing storage tools like Collax Net Storage or Owncloud/Nextcloud. With this feature you can browse your folders and keep control of who has access to shared data without switching to another application.
And if someone shares a file or folder with you, you can work on it directly from the WebApp interface.
With smooth synchronization, you always have up-to-date e-mails, tasks and contacts on your smartphone or tablet. Not only can you synchronize your company’s address book, you can also schedule meetings, view your emails or attachments, and reply from your phone. No additional applications required! The Z-Push functionality is also Microsoft Outlook ™ compatible. Outlook 2013 and Outlook 2016 can therefore also be configured to synchronize data via Z-Push.
Restoring individual e-mailsThe Kopano-based brick level Backup / Restore allows you to restore individual e-mails, appointments or mailboxes easily.
- Networked working in a team
- Extended calendar function
- Web meetings in highest video quality
- BYOD - reliable integration of mobile devices
- ActiveSync and Outlook
- Enterprise E-Mail-Server
- Secure file sharing
- Integrated mail server
- Spam and virus protection
- Audit-proof archive for e-mail and e-invoicing
- Location-independent working
|WebAccess / Webfrontend|
|ActiveSync for mobile devices|
|Kopano Files Personal|
|Kopano Webmeetings||1€ per user / month|
|Kopano Files for Teams||0,50 € per user / month|
Collax Let’s Encrypt
Let’s Encrypt is a certificate authority that offers free X.509 certificates for SSL encryption.
The usual manual procedures are replaced by an automated process simplified. The CA of the Let’s-Encrypt certificates is available for all common Web browsers as a pre-installed, trusted root certificate authority deposited. Thus, browsers do not report warnings or errors for web pages that Encrypt HTTPS with a Let’s-Encrypt certificate Let’s Encrypt Certificates are primarily intended for the encryption of web pages. However, you can use can also be used for other purposes.
The goal of Let’s Encrypt is to enable the setup of an HTTPS server which automatically generates a trusted browser certificate without receives human intervention. This is achieved by executing a Certificate Management Agent on the Web server.
For more information, see also: https://letsencrypt.org/de/
- Validierung und Signierung von X.509-Zertifikaten
- Automatische Bereitstellung eines Browserzertifikats
- Zuverlässige Verschlüsselung von Web-Seiten
- Sichere Domain-Validierung
- TLS-Verschlüsselung mit Let’s-Encrypt-Zertifikaten
Today, some information from the company network must also be accessible to external employees at all times. SSL-VPN is the best choice if access is to be quick and easy and security plays an important role. Collax SSL VPN provides functions to connect employees to the company network without installing access software. Only a standard browser is required for access. Thus laptops, tablet PCs or smartphones can be used.
Via a browser applet it is possible to remote control a shared computer. The workstation from the company becomes mobile - it can be operated effortlessly from on the way or from the home office. You can work with mouse and keyboard as usual. Alternatively, it is possible to use the “Remote Desktop Connection” program available under Windows.
If access to a specific application on an internal server is necessary or desired, Collax SSL-VPN can establish the required network connection. In order to establish the connection, the user only has to log on via browser. The connection between the application and the server is established in the background. The user can now work as in the office without noticing any difference.
Web applications are often used in the internal network that only have a low level of security or can be accessed without user logon. Direct access from the Internet is therefore not possible. Collax SSL-VPN enables secure external access to these applications. After authentication, authorized users can use the application in the usual way.
Each tunnel is protected from access by third parties with modern encryption technology. In addition, the administrator can specify exactly which data is released for which employee and via which type of access.
- Secure access to closed networks
- No installation of clients necessary
- Remote access via any browser
- Assignment of user rights per user
Collax Surf Protection
Time-controlled usage control for web shops, social networks or news sites: Control when your employees can access which websites. Collax Surf Protection is based on Cobion’s sophisticated URL database.
- One of the largest URL databases
- One of the largest image databases
- 68 categories, updated daily
- Up to 150,000 new URLs daily
- Real-time adjustment (Real-Time Monitoring)
- Can be used as blacklist or whitelist