Risk
7/19/2006
08:27 AM
50%
50%

ZipLip Enhances

ZipLip announces Version 5.2 of its Unified Email Archival Suite

SAN JOSE, Calif. -- ZipLip, Inc, a leader in email archiving for compliance, today announces Version 5.2 of its Unified Email Archival Suite, with enhanced features and functionality for full compliance with requirements from SEC, NASD, Sarbanes-Oxley and other regulations. The new functions in 5.2 allow organizations to search electronic communications, using concepts and categories defined by the firm, in a manner beyond conventional email address centric parameters such as "sent," "received," "subject" and "keywords". Customers can easily and intuitively refine their searches with parameters such as name, supervisory group, department, etc., producing the tightest, most accurate search response to an audit or subpoena, and limiting the normal raft of false-positive items in a typical search result.

Used by the biggest banks in the world, ZipLip provides email archiving, compliance, secure messaging and mailbox management capabilities on a single platform based on highly scalable GRID architecture. The ability to search emails based on roles and other specific categories produces faster, more complete results with fewer search iterations, and reduces the time and costs associated with typical searches. Further, by full text indexing email and attachments during ingest into the archive, ZipLip addresses one of the major challenges facing email archiving systems today -- conducting searches that factor more than email addresses, key words or certain time frames in a single pass. No extra time is lost capturing a broad result in order to index the data for a second, more detailed search.

“Customers constantly tell us that other available archiving solutions simply don't fully address the stringent needs of today's compliance requirements," said Kon Leong, CEO of ZipLip. "Recent events in the industry have proven that meeting basic regulatory requirements is no longer enough to keep businesses out of the headlines. In conjunction with a unified archival platform, businesses must take pro-active measures to prevent non-compliant activity from taking place,” said Leong. “ZipLip’s real-time surveillance and auto-categorization of electronic communications can eliminate the need for inefficient and random search and review processes, and ensure that only compliant and relevant emails are ultimately stored in the archive.”

ZipLip Inc.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: nice post
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1750
Published: 2015-07-01
Open redirect vulnerability in nokia-mapsplaces.php in the Nokia Maps & Places plugin 1.6.6 for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the href parameter to page/place.html. NOTE: this was originally reported as cross-sit...

CVE-2014-1836
Published: 2015-07-01
Absolute path traversal vulnerability in htdocs/libraries/image-editor/image-edit.php in ImpressCMS before 1.3.6 allows remote attackers to delete arbitrary files via a full pathname in the image_path parameter in a cancel action.

CVE-2015-0848
Published: 2015-07-01
Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.

CVE-2015-1330
Published: 2015-07-01
unattended-upgrades before 0.86.1 does not properly authenticate packages when the (1) force-confold or (2) force-confnew dpkg options are enabled in the DPkg::Options::* apt configuration, which allows remote man-in-the-middle attackers to upload and execute arbitrary packages via unspecified vecto...

CVE-2015-1950
Published: 2015-07-01
IBM PowerVC Standard Edition 1.2.2.1 through 1.2.2.2 does not require authentication for access to the Python interpreter with nova credentials, which allows KVM guest OS users to discover certain PowerVC credentials and bypass intended access restrictions via unspecified Python code.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report