Risk
7/19/2006
08:27 AM
Connect Directly
RSS
E-Mail
50%
50%

ZipLip Enhances

ZipLip announces Version 5.2 of its Unified Email Archival Suite

SAN JOSE, Calif. -- ZipLip, Inc, a leader in email archiving for compliance, today announces Version 5.2 of its Unified Email Archival Suite, with enhanced features and functionality for full compliance with requirements from SEC, NASD, Sarbanes-Oxley and other regulations. The new functions in 5.2 allow organizations to search electronic communications, using concepts and categories defined by the firm, in a manner beyond conventional email address centric parameters such as "sent," "received," "subject" and "keywords". Customers can easily and intuitively refine their searches with parameters such as name, supervisory group, department, etc., producing the tightest, most accurate search response to an audit or subpoena, and limiting the normal raft of false-positive items in a typical search result.

Used by the biggest banks in the world, ZipLip provides email archiving, compliance, secure messaging and mailbox management capabilities on a single platform based on highly scalable GRID architecture. The ability to search emails based on roles and other specific categories produces faster, more complete results with fewer search iterations, and reduces the time and costs associated with typical searches. Further, by full text indexing email and attachments during ingest into the archive, ZipLip addresses one of the major challenges facing email archiving systems today -- conducting searches that factor more than email addresses, key words or certain time frames in a single pass. No extra time is lost capturing a broad result in order to index the data for a second, more detailed search.

“Customers constantly tell us that other available archiving solutions simply don't fully address the stringent needs of today's compliance requirements," said Kon Leong, CEO of ZipLip. "Recent events in the industry have proven that meeting basic regulatory requirements is no longer enough to keep businesses out of the headlines. In conjunction with a unified archival platform, businesses must take pro-active measures to prevent non-compliant activity from taking place,” said Leong. “ZipLip’s real-time surveillance and auto-categorization of electronic communications can eliminate the need for inefficient and random search and review processes, and ensure that only compliant and relevant emails are ultimately stored in the archive.”

ZipLip Inc.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7407
Published: 2014-10-22
Cross-site request forgery (CSRF) vulnerability in the MRBS module for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

CVE-2014-3675
Published: 2014-10-22
Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.

CVE-2014-3676
Published: 2014-10-22
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."

CVE-2014-3677
Published: 2014-10-22
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.

CVE-2014-4448
Published: 2014-10-22
House Arrest in Apple iOS before 8.1 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information from a Documents directory by obtaining this UID.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.