ZANTAZĀ® Appoints Charles Neal Vice President of Security
Neal Brings Extensive Security Expertise to Enhance ZANTAZ' Global Security Policies
PLEASANTON, CA (June 1, 2004) - ZANTAZ, Inc., the leader in e-communications management solutions for compliance, electronic discovery and storage management, today announced the appointment of Charles M. Neal III to Vice President of Security. In this newly created role, Neal will be responsible for developing and expanding the company's global security policies, standards, guidelines and procedures as part of its ongoing commitment to world-class security.
As a Certified Information Systems Security Professional (CISSP) and a Certified Information Security Manager (CISM), Neal brings over 30 years of experience in security and information technology to ZANTAZ. Prior to joining ZANTAZ, Neal worked for over 20 years for the Federal Bureau of Investigation (FBI) as a Special Agent who managed numerous complex white-collar crime and financial institution fraud cases. During his tenure with the FBI, Neal was among the founders that established and developed the science of computer forensic, fraud, and intrusion investigations.
"Leading Fortune 100 firms trust ZANTAZ to manage their most sensitive information, so it is imperative that our security procedures are of the highest quality," said Steve King, President and CEO of ZANTAZ. "Neal has an extensive background and track record building superior security programs for leading corporations and government agencies. He will play a key role expanding our current security processes and ensuring our security environment exceeds our customers' expectations."
In addition to his government service, Neal held numerous Vice President of Security positions in the private sector for market leaders, such as Exodus Communications, Cable and Wireless America and Savvis Inc., where he was responsible for the development and management of security services and internal security.
"Due to the increase in global security issues, it is crucial for companies to take precautionary measures to ensure they are protected. I am extremely impressed by ZANTAZ' commitment to security best practices and to delivering its customers with innovative solutions that ensure their valuable information is safe," said Neal.
About ZANTAZ
ZANTAZ is the global leader in Information Retention and Discovery Management solutions. ZANTAZ' solutions enable organizations to capture, preserve and access unstructured digital information-including email, IM, files, scanned documents, and other electronic records-and review and produce relevant documents in a manner that reduces operational risks and costs while complying with legal, regulatory and corporate policy requirements. ZANTAZ solutions are available as onsite software applications or on-demand hosted services, and include a broad set of professional services and integration support. ZANTAZ has over 600 customers, including many of the largest corporations, law firms and government agencies in the world. For more information, visit www.ZANTAZ.com.
Summary: ...IDOL has also been used by the Economic Crime Unit (ECU) to identify perpetrators as part of its serious fraud investigations. Thanks to IDOL, the Force Intelligence Bureau Organised Crime division has been able to identify an additional 67 unlinked incidents relating to firearms, grievous bodily harm...
Summary: ...company reigns as Canadaās #1 cable TV operator. It also has a 52% ownership in Rogers Wireless, one of Canadaās largest mobile phone operators. To serve its numerous subsidiary companies, Rogers operates a large call center network that handles thousands of calls each day. Recently, Rogers sought...
Summary: ...to guide users to the brand assets and guidelines their work requires. Case Study Customer Harrah's Entertainment Industry Gaming Challenges ⢠Consistent branding was difficult to maintain across Harrahās distributed marketing organization ⢠To help drive response, each direct mail piece had to...
Summary: ...South Yorkshire Police Case Study. POWER PROMOTE PROTECT South Yorkshire Police The Long Arm of the Law Organization Background The South Yorkshire Police Force is the 13th largest of the 44 police forces within England, Wales and Northern Ireland and is responsible for policing Barnsley, Doncaster, Rotherham...
Summary: ...County of San Diego - case study. Some forms have been redesigned numerous times to accommodate changes to State of California regulations governing pesticide use as well as the unique reporting requirements. With these forms, inspectors measure and record the impact of pesticide residues in the stateās...
Summary: ...clients mean that the frmās professionals draw on content ranging from fnancial records, to audit guidelines and legal documents. To date, this content had existed in paper form ā creating numerous problems for the frm. Storing and transporting physical fles among the frmās offces and client locations...
Summary: ...and simplifying the process. Most important, the software has allowed us to easily handle more studies, with a smaller commitment of personnel.ā Prior to the implementation of TeleForm, UCSF required three programmers to perform many of the crucial data management tasks related to a single research...
Summary: ...Metropolitan Police leverage social media to engage local community. The trial| helped MPS formulate a long-term strategy to social media and provided insight as to how social media could be used to advance community engagement, intelligence gathering, and crime investigation. The solution Fast turnaround,...
Summary: ...Metropolitan Police leverage social media to engage local community. The trial helped MPS formulate a long term strategy to social media and provided insight as to how social media could be used to advance community engagement, intelligence gathering and crime investigation. Solution Fast turnaround,...
Summary: ...Rodyk & Davidson Case Study. āInterwovenās commitment to the legal sector, its exciting product roadmap, and the availability of strong support resources in the Asia-Pacific region make it the ideal technology partner for our rapidly growing firm.ā Rodyk & Davidson LLP Rodyk & Davidson Supports...
Summary: ...to bid on survey processing projects from other universities and local, state and national government agencies, essentially acting as a service bureau. āWeāve expanded the scope of operation and have been able to inherently increase business coming into the center,ā said Stagg. āTeleForm has allowed...
Summary: ...the enterprise With a reliable data backup solution in place, the RNIB can look to securing data across their entire organization. HP Autonomy offers the RNIB the flexibility and scalability to expand its operations while ensuring complete data security and legal compliance. IDOLās adaptability enables...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...automatically to supplement the conflicts process by offering suggestions for parties to the search and their roles in the search. ⢠Intuitive and Integrated Workflows ā Numerous workflows are embedded in the application to manage the conflicts process more seamlessly and integrate with new business...
Summary: ...or a folder. Frequently performed searches can be saved and shared. ⢠Powerful Security Control access to system functionality and content at the object level based on user, group or role, so that sensitive information remains in the hands of authorized users. ⢠Add-Ons for Tight E-mail Integration...
Summary: ...Enable delivery of content in multiple languages. ⢠Support for future technologies ā Increase your agility through Autonomyās extensible architecture that allows you to expand and adapt to new requirements and technologies. Autonomy Supervisor for government communications oversight Government...
Summary: ...Retrieve relevant intelligence in real time. With CEP, you can form a conceptual understanding of the meaning of any piece of data, be it in the form of text, video, or audio. By deriving an understanding of the available information assets, CEP automatically provides users with relevant background information,...
Summary: ...Autonomy Explore - Product brief. speech analytics Voice of the customer Customer experience analytics Customer interaction survey Real-time topic indexing Fraud and risk mitigation Social media monitoring 2 Automatic alerting and tagging Once an emerging trend has been discovered, Autonomy Explore offers...
Summary: ...Collaboration and Expertise Networks Product Brief. the technology clusters disparate pieces of information automatically by concept, matching them to the conceptual profiles of experts in real-time in order to highlight crucial information and expertise resources. ⢠Alerting: staff can be alerted to...
Summary: ...Autonomy Optimost - Product Overview. PROMOTE POWER PROTECT Autonomy Optimost A Multichannel Marketing Suite to Attract and Convert Customers Customers are changing. They are more savvy and connected and their unfettered access to information makes them in full control. However, marketersā charters...
Summary: ...of enterprise data is located not on centrally managed servers, but on remote servers, desktops, and laptops. With an increasingly mobile workforce expanding by more than 20 percent annually ā currently about 900 million workersāthat figure is certain to grow. This scattering of sensitive data represents...
Summary: ...it says and that a failure to preserveārecords, paper or electronicāand to search in the right places for those records will inevitably result in the spoliation of evidence.ā āPension Committee v. Banc of America Securities 2010 WL 184312 (S.D.N.Y.) *(emphasis added) Brochure | Autonomy Legal...
Summary: ...to all WorkSite users. Customer Benefits As firms invest in productivity applications, and enforce company policies regarding the management and retention of information, it is imperative that the integrity of client, matter, engagement, and project files is maintained with current and complete content....
Summary: ...to protect privileged information Top Provider 2 0 0 8 S o c h a - G e l b m a n n E L E C T R O N I C D I S C O V E R Y S U R V E Y 6 T H A N N U A L Top 5 Ranking Overall in Software AND Services Categories EDRM Founding member, Advisory Committee and EDRM XML Leadership A leading commercial bank has...
Summary: ...effect, reminders if a custodian does not respond to the notice, and the ability to escalate the matter to a supervisor or direct report if a timely response is not received ā each of which is critical to create repeatable and defensible good faith process in accordance with FRCP requirements. āTrust...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...4 Advisory Committee Report at 28. 5 Id. At 25 (citing Subrin, Fishing Expeditions Allowed: The Historical Background of the 1938 Federal Discovery Rules, 39 Boston Coll. L. Rev. 691, 730 (1998)). 6 Standing Committee Report at 22. 7 Id. at 22-23. 8 Allman at 4. 9 Id.
...
Summary: ...to prevent the needless leakage of sensitive information are a risk to their customers and business partnersā clients who may soon rethink the practice of exchanging data with unsecured organizations. Do not invite data crime with insecure applications and unrestricted employee access to sensitive data....
Summary: ...Manage the sensitive information in devices that are easy to misplace Despite heightened attention on security issues, enterprises will not, and should not, accept compromising the performance of their infrastructure platforms. Vendors must provide sub-second response times, and promises must be backed...
Summary: ...Magazine, February, 2008. http://www. certmag.com/read.php?in=3310). As a result, IT is taking on an ever-greater role in designing and implementing regulatory compliance procedures and systems. These systems protect sensitive data (private and other), flag unusual or non-compliant activities, produce...
Summary: ...Designer to quickly and easily create new pesticide inspection forms or redesign existing ones. Ease-ofuse is critical. Some forms have been redesigned numerous times to accommodate changes to State of California regulations governing pesticide use as well as the unique reporting requirements. With these...
Summary: ...worked in collaboration to optimize the infrastructure within, which the survey and report system would operate. āThe department wanted the data to be processed centrally from numerous remote sites and a report generated within five minutes after turning the survey in, so that Riverside County Department...
Summary: ...as well as in non-compliance penalties and data breaches, increase. Concurrently, IT is taking on a greater role in designing and implementing regulatory compliance procedures and systems. These systems protect sensitive data (private and other) and help ensure business continuity. One of the primary...
Summary: ...Encrypting Recordings is Not Enough: Steps to Protect Your Most Sensitive Data. According to Gartner research, about 15 million Americans experienced fraud related to identity theft between August 2005 and August 2006.1 Non-compliance with PCI requirements can create easy access to this data for any person...
Summary: ...Compliance After the Global Credit Crisis. While telling investors and counterparties that the fund had weathered the worst, numerous email exchanges occurred through both private and corporate messaging systems indicating the potential peril faced by the fund.9 Finally, one of the fundās principals...
Summary: ...more weight would be given to a word that appears in the title of an article. MapReduce segments the problem into parallel components, and then processes the data in parallel. MapReduce and Big Data analytics To perform Big Data analytics, you could layer analytics on top of MapReduce to detect fraud...
Summary: ...not only notifying custodians and data stewards of the legal hold, but also making reasonable efforts to identify, preserve, and collect potentially responsive ESI in a forensically sound manner. Adding to the challenge, the process requirements are constantly changing and expanding. Reminders of the...
Summary: ...records management (ERM) systems. Users resist attempts to increase their workloads, and do not want to think about how and where to store content. Traditional classification approaches, whether alphabetical, chronological, color-coded, numerical, or based on the organization chart have been superseded...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.