Risk
7/19/2006
08:27 AM
Connect Directly
RSS
E-Mail
50%
50%

ZipLip Enhances

ZipLip announces Version 5.2 of its Unified Email Archival Suite

SAN JOSE, Calif. -- ZipLip, Inc, a leader in email archiving for compliance, today announces Version 5.2 of its Unified Email Archival Suite, with enhanced features and functionality for full compliance with requirements from SEC, NASD, Sarbanes-Oxley and other regulations. The new functions in 5.2 allow organizations to search electronic communications, using concepts and categories defined by the firm, in a manner beyond conventional email address centric parameters such as "sent," "received," "subject" and "keywords". Customers can easily and intuitively refine their searches with parameters such as name, supervisory group, department, etc., producing the tightest, most accurate search response to an audit or subpoena, and limiting the normal raft of false-positive items in a typical search result.

Used by the biggest banks in the world, ZipLip provides email archiving, compliance, secure messaging and mailbox management capabilities on a single platform based on highly scalable GRID architecture. The ability to search emails based on roles and other specific categories produces faster, more complete results with fewer search iterations, and reduces the time and costs associated with typical searches. Further, by full text indexing email and attachments during ingest into the archive, ZipLip addresses one of the major challenges facing email archiving systems today -- conducting searches that factor more than email addresses, key words or certain time frames in a single pass. No extra time is lost capturing a broad result in order to index the data for a second, more detailed search.

“Customers constantly tell us that other available archiving solutions simply don't fully address the stringent needs of today's compliance requirements," said Kon Leong, CEO of ZipLip. "Recent events in the industry have proven that meeting basic regulatory requirements is no longer enough to keep businesses out of the headlines. In conjunction with a unified archival platform, businesses must take pro-active measures to prevent non-compliant activity from taking place,” said Leong. “ZipLip’s real-time surveillance and auto-categorization of electronic communications can eliminate the need for inefficient and random search and review processes, and ensure that only compliant and relevant emails are ultimately stored in the archive.”

ZipLip Inc.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6306
Published: 2014-08-22
Unspecified vulnerability on IBM Power 7 Systems 740 before 740.70 01Ax740_121, 760 before 760.40 Ax760_078, and 770 before 770.30 01Ax770_062 allows local users to gain Service Processor privileges via unknown vectors.

CVE-2014-0232
Published: 2014-08-22
Multiple cross-site scripting (XSS) vulnerabilities in framework/common/webcommon/includes/messages.ftl in Apache OFBiz 11.04.01 before 11.04.05 and 12.04.01 before 12.04.04 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a (1)...

CVE-2014-3525
Published: 2014-08-22
Unspecified vulnerability in Apache Traffic Server 4.2.1.1 and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.

CVE-2014-3563
Published: 2014-08-22
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.

CVE-2014-3587
Published: 2014-08-22
Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file. NOTE: this vulnerability exists bec...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.