Risk
7/19/2006
08:27 AM
50%
50%

ZipLip Enhances

ZipLip announces Version 5.2 of its Unified Email Archival Suite

SAN JOSE, Calif. -- ZipLip, Inc, a leader in email archiving for compliance, today announces Version 5.2 of its Unified Email Archival Suite, with enhanced features and functionality for full compliance with requirements from SEC, NASD, Sarbanes-Oxley and other regulations. The new functions in 5.2 allow organizations to search electronic communications, using concepts and categories defined by the firm, in a manner beyond conventional email address centric parameters such as "sent," "received," "subject" and "keywords". Customers can easily and intuitively refine their searches with parameters such as name, supervisory group, department, etc., producing the tightest, most accurate search response to an audit or subpoena, and limiting the normal raft of false-positive items in a typical search result.

Used by the biggest banks in the world, ZipLip provides email archiving, compliance, secure messaging and mailbox management capabilities on a single platform based on highly scalable GRID architecture. The ability to search emails based on roles and other specific categories produces faster, more complete results with fewer search iterations, and reduces the time and costs associated with typical searches. Further, by full text indexing email and attachments during ingest into the archive, ZipLip addresses one of the major challenges facing email archiving systems today -- conducting searches that factor more than email addresses, key words or certain time frames in a single pass. No extra time is lost capturing a broad result in order to index the data for a second, more detailed search.

“Customers constantly tell us that other available archiving solutions simply don't fully address the stringent needs of today's compliance requirements," said Kon Leong, CEO of ZipLip. "Recent events in the industry have proven that meeting basic regulatory requirements is no longer enough to keep businesses out of the headlines. In conjunction with a unified archival platform, businesses must take pro-active measures to prevent non-compliant activity from taking place,” said Leong. “ZipLip’s real-time surveillance and auto-categorization of electronic communications can eliminate the need for inefficient and random search and review processes, and ensure that only compliant and relevant emails are ultimately stored in the archive.”

ZipLip Inc.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2188
Published: 2015-02-26
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connecti...

CVE-2015-0594
Published: 2015-02-26
Multiple cross-site scripting (XSS) vulnerabilities in the help pages in Cisco Common Services, as used in Cisco Prime LAN Management Solution (LMS) and Cisco Security Manager, allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCuq54654 and CSCun1...

CVE-2015-0632
Published: 2015-02-26
Race condition in the Neighbor Discovery (ND) protocol implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service via a flood of Router Solicitation messages on the local network, aka Bug ID CSCuo67770.

CVE-2015-0651
Published: 2015-02-26
Cross-site request forgery (CSRF) vulnerability in the web GUI in Cisco Application Networking Manager (ANM), and Device Manager (DM) on Cisco 4710 Application Control Engine (ACE) appliances, allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuo99753.

CVE-2015-0882
Published: 2015-02-26
Multiple cross-site scripting (XSS) vulnerabilities in zencart-ja (aka Zen Cart Japanese edition) 1.3 jp through 1.3.0.2 jp8 and 1.5 ja through 1.5.1 ja allow remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to admin/includes/init_includes/init_sanitize.php an...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.