Risk
7/19/2006
08:27 AM
50%
50%

ZipLip Enhances

ZipLip announces Version 5.2 of its Unified Email Archival Suite

SAN JOSE, Calif. -- ZipLip, Inc, a leader in email archiving for compliance, today announces Version 5.2 of its Unified Email Archival Suite, with enhanced features and functionality for full compliance with requirements from SEC, NASD, Sarbanes-Oxley and other regulations. The new functions in 5.2 allow organizations to search electronic communications, using concepts and categories defined by the firm, in a manner beyond conventional email address centric parameters such as "sent," "received," "subject" and "keywords". Customers can easily and intuitively refine their searches with parameters such as name, supervisory group, department, etc., producing the tightest, most accurate search response to an audit or subpoena, and limiting the normal raft of false-positive items in a typical search result.

Used by the biggest banks in the world, ZipLip provides email archiving, compliance, secure messaging and mailbox management capabilities on a single platform based on highly scalable GRID architecture. The ability to search emails based on roles and other specific categories produces faster, more complete results with fewer search iterations, and reduces the time and costs associated with typical searches. Further, by full text indexing email and attachments during ingest into the archive, ZipLip addresses one of the major challenges facing email archiving systems today -- conducting searches that factor more than email addresses, key words or certain time frames in a single pass. No extra time is lost capturing a broad result in order to index the data for a second, more detailed search.

“Customers constantly tell us that other available archiving solutions simply don't fully address the stringent needs of today's compliance requirements," said Kon Leong, CEO of ZipLip. "Recent events in the industry have proven that meeting basic regulatory requirements is no longer enough to keep businesses out of the headlines. In conjunction with a unified archival platform, businesses must take pro-active measures to prevent non-compliant activity from taking place,” said Leong. “ZipLip’s real-time surveillance and auto-categorization of electronic communications can eliminate the need for inefficient and random search and review processes, and ensure that only compliant and relevant emails are ultimately stored in the archive.”

ZipLip Inc.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How To Build An Effective Defense Against Ransomware
A compendium of Dark Reading´s best recent coverage of ransomware attacks, as well as best practices for defending your enterprise against them.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Tim Wilson speaks to two experts on vulnerability research – independent consultant Jeremiah Grossman and Black Duck Software’s Mike Pittenger – about the latest wave of vulnerabilities being exploited by online attackers