Attacks/Breaches
8/15/2012
12:27 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Perimeter E-Security Announces Archive Anywhere For Microsoft Office 365

Archive Anywhere helps organizations provide secure messaging for employees and reduce legal liability

MILFORD, Conn., Aug. 15, 2012 /PRNewswire/ -- Perimeter E-Security, the leading provider of secure cloud services, today announced their new Archive Anywhere solution for Microsoft Office 365. Archive Anywhere is a cloud-based service that makes it easy for users to view and search their entire mailbox archives anywhere, on any device. It also provides redundant continuity, allowing access to email when users are unable to connect to Office 365. Eliminating the need for remote Web portal access, Archive Anywhere helps organizations provide secure messaging for employees and reduce legal liability. The solution supports any modern mobile device, including all versions of Windows, Apple and Linux, both mobile and desktop.

Announced in September of 2011, Perimeter E-Security's Compliance and Continuity Suite for Office 365 allows organizations to archive every email, meet and demonstrate adherence to industry-specific regulatory requirements and preserve uptime. Using Perimeter's automated compliance workflow system, Office 365 administrators are able to identify potential compliance violations before they occur, reducing risk. The Archive Anywhere service extends that capability, providing anywhere, anytime access to those compliance and continuity archives.

"When people go looking for that important email they accidentally deleted, archiving ensures it's recoverable," said John Viega, executive vice president, Perimeter E-Security. "With Archive Anywhere for Office 365, users can have all the mail they've ever sent at their fingertips, wherever they are."

Generally available today, Perimeter's Archive Anywhere is an innovative service that enables email users to easily access and search their entire mailbox archive on virtually any device, whether they are in the office, at home, or on-the-go. The service is available as a feature to all existing customers, as well as customers of other hosted mail solutions and in-house email, and is also available as part of Perimeter's comprehensive suite of secure cloud messaging solutions.

Perimeter E-Security has more than one million secure messaging users and is the only enterprise-class security services provider offering both comprehensive threat management and secure messaging, underpinned by strong compliance expertise. For more information on Archive Anywhere, please visit http://www.perimeterusa.com/services/messaging/archive-anywhere/.

About Perimeter E-Security Perimeter E-Security delivers secure infrastructure from the cloud that businesses of all sizes rely on. Our advanced technology, expert intelligence, and superior scale makes our clients' information more secure, more highly available, compliant with regulations and less costly to manage. By using our solutions, our customers can focus on their core businesses and take advantage of new opportunities. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit www.perimeterusa.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web