Top of Page
In addition to email security functions, compliance functions are available to maintain corporate compliance in emails, such as email data storage (archives) as trail storage and supervisor approval at the time of sending.
Inbound and outbound email logs useful for evidence retention and troubleshooting are stored by IIJ. These logs can be downloaded into CSV format from the customer's exclusive management page. Statistics on spam, viruses, and other information can be viewed graphically.
All exchanged email is stored in our highly reliable data centers in Japan. Storage periods can be specified between 1 and 10 years. Unlimited capacity is provided with this service for peace of mind.
This option also provides online, high-speed, full-text search of email data stored on the disks, including headers, body text, and attachments. Search results are tested for tampering, and email messages including attachments can be downloaded and restored.
You can prevent information leaks by setting corporate policies for outbound emails as rules and by inspecting the emails according to the applicable rules. You can inspect various conditions such as recipients, attachments, and keywords, and set flexible actions according to the policies such as supervisor approval or suspension of sending.* Classic information leakage handling software GUARDIANWALL* is adopted.
(Japanese text only)
End of the page.