02:27 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

Perimeter E-Security Introduces Archive Anywhere

Enables email users to access and search their entire mailbox archive on virtually any device

Perimeter E-Security, the leading provider of secure cloud services, today introduced a new offering that enables email users to easily access and search their entire mailbox archive on virtually any device, whether they are in the office, at home, or on-the-go. Perimeter's cloud-based Archive Anywhere service provides an easy alternative to remote Web portal access, helping organizations of all sizes provide easy, safe and secure messaging for their employees while reducing legal liability and ensuring business continuity.

"Customers want their email archives integrated into the app they use every day: their email client," said John Viega, executive vice president, Perimeter E-Security. "Perimeter's revolutionary Archive Anywhere service lets users search, save and see their archives just like the rest of their email. Our solution eliminates the pain of password juggling, separate search boxes and proprietary portals. Who says you have to trade off ease-of-use and enterprise archiving? With Archive Anywhere, you can have both — right in your inbox. Additionally, in the event of a global Exchange interruption, users are assured the ability to send and receive email – thereby ensuring critical messaging continuity."

This innovation paves the way for administrators to perform email compliance review on their iPad on the train home from work – all in the same inbox they've been using for the last 20 years.

Generally available today, Perimeter's Archive Anywhere enhances its existing Messaging Continuity and Messaging Compliance Manager services, and is available as a feature to all existing customers, as well as customers of other hosted mail solutions and in-house email. The service is also available as part of Perimeter's comprehensive suite of secure cloud messaging solutions.

Additional features include:

Any Device, Anywhere: Supports archive browsing and search across all desktop computing platforms including Windows, Apple and Linux, and email-enabled mobile devices including iPhone, iPad, BlackBerry, Android and Windows phones. Quick and Simple Deployment: Archive Anywhere can be up and running in under 30 minutes, for 100 or 100,000 users, without the need for additional software, costly on-premise hardware, or technical support. Easy Message Recovery: Message identification and recovery speeds are greatly improved through advanced search and filtering controls. Flexible Sync Options: Take control of what is synchronized to local storage: which folders, and for how long. Use Perimeter's recommended out-of-the-box defaults or pick specific folders. Instant Message Recovery: Eliminates the burdensome task for Exchange users to export and store emails to PST files. Premier Support: Perimeter's 24/7/365 network operations center provides constant monitoring and support to ensure organizations have consistent protection.

With more than one million secure messaging users, including 300,000 on Hosted Exchange, Perimeter E-Security is the only enterprise-class security services provider offering both comprehensive threat management and secure messaging, underpinned by strong compliance expertise. For more information on Archive Anywhere, please visit http://www.perimeterusa.com/services/messaging/archive-anywhere/.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web