Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
IBM® Sterling Global Mailbox 6.0 offers businesses a dependable data storage solution tailored for high availability and redundancy across various geographic locations. This innovative solution promotes active-active communications to enhance disruption resilience and facilitates near real-time disaster recovery. It seamlessly integrates with IBM Sterling B2B Integrator and IBM Sterling File Gateway, and it is designed to complement IBM Sterling Control Center. With features that ensure constant availability and effective disaster recovery, including active-active communication capabilities, it significantly simplifies operational resilience. The technology provides real-time data replication, eliminating the necessity for backup databases or customized disaster recovery frameworks. Furthermore, its adaptable and configurable geographic distribution meets both performance and customer service standards, enabling uninterrupted operations. The user-friendly and intuitive interface enhances usability for all stakeholders involved. By leveraging these features, organizations can ensure that their operations remain continuously functional, even in the face of potential disruptions.
Description
The only security platform approved by FedRAMP that offers support for file sharing, managed file transfer, and email data communications, enabling organizations to comply with various standards such as CMMC 2.0, ITAR, IRAP, NIS 2, HIPAA, and more. A disjointed array of communication tools leads to heightened costs and inefficiencies in resource management. The challenge of centrally managing zero-trust security policies renders it nearly impossible for organizations to maintain a clear view of their security and compliance, particularly regarding sensitive content communication, thereby exacerbating risks. The absence of effective governance further amplifies compliance and security vulnerabilities. It is crucial for organizations to monitor and control access to content, regulate editing permissions, and determine who can send or share information and where it is directed. Sensitive data, including personally identifiable information (PII), intellectual property (IP), financial records, and protected health information (PHI), becomes a prime target for cybercriminals and malicious insiders, who recognize its potential for monetization or exploitation. As such, organizations must implement stringent measures to safeguard this critical information against potential threats.
API Access
Has API
API Access
Has API
Integrations
IBM B2B Integrator
IBM Sterling Control Center Monitor
IBM Sterling File Gateway
Integrations
IBM B2B Integrator
IBM Sterling Control Center Monitor
IBM Sterling File Gateway
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
IBM
Founded
1911
Country
United States
Website
www.ibm.com/products/global-mailbox
Vendor Details
Company Name
Kiteworks
Country
United States
Website
www.kiteworks.com
Product Features
Cloud Storage
Access Control
Archiving & Retention
Backup
Data Migration
Data Synchronization
Encryption
File Sharing
Version Control
Managed File Transfer (MFT)
API Integration
Authentication / Auditing
Compression
Data Sharing
Data Transmission Protocol Integration
Database Management
Encryption Support
Fail-Over / Load Balancing
Product Features
File Sharing
Audit Trail
Chat / Messaging
Collaboration
Document Management
Drag & Drop
Electronic Signature
Encryption
File Synchronization
Search
User Management
Version Control
Workflow Management
Managed File Transfer (MFT)
API Integration
Authentication / Auditing
Compression
Data Sharing
Data Transmission Protocol Integration
Database Management
Encryption Support
Fail-Over / Load Balancing