Attacks/Breaches
8/15/2012
12:27 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Perimeter E-Security Announces Archive Anywhere For Microsoft Office 365

Archive Anywhere helps organizations provide secure messaging for employees and reduce legal liability

MILFORD, Conn., Aug. 15, 2012 /PRNewswire/ -- Perimeter E-Security, the leading provider of secure cloud services, today announced their new Archive Anywhere solution for Microsoft Office 365. Archive Anywhere is a cloud-based service that makes it easy for users to view and search their entire mailbox archives anywhere, on any device. It also provides redundant continuity, allowing access to email when users are unable to connect to Office 365. Eliminating the need for remote Web portal access, Archive Anywhere helps organizations provide secure messaging for employees and reduce legal liability. The solution supports any modern mobile device, including all versions of Windows, Apple and Linux, both mobile and desktop.

Announced in September of 2011, Perimeter E-Security's Compliance and Continuity Suite for Office 365 allows organizations to archive every email, meet and demonstrate adherence to industry-specific regulatory requirements and preserve uptime. Using Perimeter's automated compliance workflow system, Office 365 administrators are able to identify potential compliance violations before they occur, reducing risk. The Archive Anywhere service extends that capability, providing anywhere, anytime access to those compliance and continuity archives.

"When people go looking for that important email they accidentally deleted, archiving ensures it's recoverable," said John Viega, executive vice president, Perimeter E-Security. "With Archive Anywhere for Office 365, users can have all the mail they've ever sent at their fingertips, wherever they are."

Generally available today, Perimeter's Archive Anywhere is an innovative service that enables email users to easily access and search their entire mailbox archive on virtually any device, whether they are in the office, at home, or on-the-go. The service is available as a feature to all existing customers, as well as customers of other hosted mail solutions and in-house email, and is also available as part of Perimeter's comprehensive suite of secure cloud messaging solutions.

Perimeter E-Security has more than one million secure messaging users and is the only enterprise-class security services provider offering both comprehensive threat management and secure messaging, underpinned by strong compliance expertise. For more information on Archive Anywhere, please visit http://www.perimeterusa.com/services/messaging/archive-anywhere/.

About Perimeter E-Security Perimeter E-Security delivers secure infrastructure from the cloud that businesses of all sizes rely on. Our advanced technology, expert intelligence, and superior scale makes our clients' information more secure, more highly available, compliant with regulations and less costly to manage. By using our solutions, our customers can focus on their core businesses and take advantage of new opportunities. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit www.perimeterusa.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-4988
Published: 2014-07-09
Heap-based buffer overflow in the xjpegls.dll (aka JLS, JPEG-LS, or JPEG lossless) format plugin in XnView 1.99 and 1.99.1 allows remote attackers to execute arbitrary code via a crafted JLS image file.

CVE-2014-0207
Published: 2014-07-09
The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.

CVE-2014-0537
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-0539
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-3309
Published: 2014-07-09
The NTP implementation in Cisco IOS and IOS XE does not properly support use of the access-group command for a "deny all" configuration, which allows remote attackers to bypass intended restrictions on time synchronization via a standard query, aka Bug ID CSCuj66318.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.