Risk
7/13/2012
02:27 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Perimeter E-Security Introduces Archive Anywhere

Enables email users to access and search their entire mailbox archive on virtually any device

Perimeter E-Security, the leading provider of secure cloud services, today introduced a new offering that enables email users to easily access and search their entire mailbox archive on virtually any device, whether they are in the office, at home, or on-the-go. Perimeter's cloud-based Archive Anywhere service provides an easy alternative to remote Web portal access, helping organizations of all sizes provide easy, safe and secure messaging for their employees while reducing legal liability and ensuring business continuity.

"Customers want their email archives integrated into the app they use every day: their email client," said John Viega, executive vice president, Perimeter E-Security. "Perimeter's revolutionary Archive Anywhere service lets users search, save and see their archives just like the rest of their email. Our solution eliminates the pain of password juggling, separate search boxes and proprietary portals. Who says you have to trade off ease-of-use and enterprise archiving? With Archive Anywhere, you can have both — right in your inbox. Additionally, in the event of a global Exchange interruption, users are assured the ability to send and receive email – thereby ensuring critical messaging continuity."

This innovation paves the way for administrators to perform email compliance review on their iPad on the train home from work – all in the same inbox they've been using for the last 20 years.

Generally available today, Perimeter's Archive Anywhere enhances its existing Messaging Continuity and Messaging Compliance Manager services, and is available as a feature to all existing customers, as well as customers of other hosted mail solutions and in-house email. The service is also available as part of Perimeter's comprehensive suite of secure cloud messaging solutions.

Additional features include:

Any Device, Anywhere: Supports archive browsing and search across all desktop computing platforms including Windows, Apple and Linux, and email-enabled mobile devices including iPhone, iPad, BlackBerry, Android and Windows phones. Quick and Simple Deployment: Archive Anywhere can be up and running in under 30 minutes, for 100 or 100,000 users, without the need for additional software, costly on-premise hardware, or technical support. Easy Message Recovery: Message identification and recovery speeds are greatly improved through advanced search and filtering controls. Flexible Sync Options: Take control of what is synchronized to local storage: which folders, and for how long. Use Perimeter's recommended out-of-the-box defaults or pick specific folders. Instant Message Recovery: Eliminates the burdensome task for Exchange users to export and store emails to PST files. Premier Support: Perimeter's 24/7/365 network operations center provides constant monitoring and support to ensure organizations have consistent protection.

With more than one million secure messaging users, including 300,000 on Hosted Exchange, Perimeter E-Security is the only enterprise-class security services provider offering both comprehensive threat management and secure messaging, underpinned by strong compliance expertise. For more information on Archive Anywhere, please visit http://www.perimeterusa.com/services/messaging/archive-anywhere/.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-4988
Published: 2014-07-09
Heap-based buffer overflow in the xjpegls.dll (aka JLS, JPEG-LS, or JPEG lossless) format plugin in XnView 1.99 and 1.99.1 allows remote attackers to execute arbitrary code via a crafted JLS image file.

CVE-2014-0207
Published: 2014-07-09
The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.

CVE-2014-0537
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-0539
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-3309
Published: 2014-07-09
The NTP implementation in Cisco IOS and IOS XE does not properly support use of the access-group command for a "deny all" configuration, which allows remote attackers to bypass intended restrictions on time synchronization via a standard query, aka Bug ID CSCuj66318.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.