{"id":1547,"date":"2008-04-16T00:00:00","date_gmt":"2008-04-16T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/04\/16\/new-version-of-zertificon-secure-virtual-mailroom\/"},"modified":"2021-12-30T11:39:34","modified_gmt":"2021-12-30T11:39:34","slug":"new-version-of-zertificon-secure-virtual-mailroom","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/04\/16\/new-version-of-zertificon-secure-virtual-mailroom\/","title":{"rendered":"New version of Zertificon secure virtual mailroom"},"content":{"rendered":"<p>Z1 SecureMail family of products safeguards a company&#8217;s e-mail transmissions across the board with its encryption and signature &#8211; and, in the process, remains completely invisible to the sender.  The new version comes up with an extended functional scope, along with qualitative improvements plus features such as signature confirmation by the user, validation and archiving link for attached documents with a qualified signature &#8211; and full-scale compatibility with Solaris 9.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It functions in compliance with S\/MIME and OpenPGP, the two internationally established standards for e-mail security, and is compatible to all current e-mail programmes.<\/p>\n<p>Another new feature of this product is its validation and archiving link for attached documents &#8212; such as i.e., invoices with a qualified signature.<\/p>\n<p>The new version recognises, effective immediately, any attachments in incoming e-mails with a qualified signature (SigG\/SigV), then validates them and transmits the validation report as an XML file, analogue to GDPDU &#8211; along with the e-mail itself &#8212; to an existing archiving system.<\/p>\n<p>http:\/\/www.net-security.org\/secworld.php?id=6023<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1547","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1547"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1547\/revisions"}],"predecessor-version":[{"id":4034,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1547\/revisions\/4034"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}