ZANTAZĀ® Appoints Charles Neal Vice President of Security
Neal Brings Extensive Security Expertise to Enhance ZANTAZ' Global Security Policies
PLEASANTON, CA (June 1, 2004) - ZANTAZ, Inc., the leader in e-communications management solutions for compliance, electronic discovery and storage management, today announced the appointment of Charles M. Neal III to Vice President of Security. In this newly created role, Neal will be responsible for developing and expanding the company's global security policies, standards, guidelines and procedures as part of its ongoing commitment to world-class security.
As a Certified Information Systems Security Professional (CISSP) and a Certified Information Security Manager (CISM), Neal brings over 30 years of experience in security and information technology to ZANTAZ. Prior to joining ZANTAZ, Neal worked for over 20 years for the Federal Bureau of Investigation (FBI) as a Special Agent who managed numerous complex white-collar crime and financial institution fraud cases. During his tenure with the FBI, Neal was among the founders that established and developed the science of computer forensic, fraud, and intrusion investigations.
"Leading Fortune 100 firms trust ZANTAZ to manage their most sensitive information, so it is imperative that our security procedures are of the highest quality," said Steve King, President and CEO of ZANTAZ. "Neal has an extensive background and track record building superior security programs for leading corporations and government agencies. He will play a key role expanding our current security processes and ensuring our security environment exceeds our customers' expectations."
In addition to his government service, Neal held numerous Vice President of Security positions in the private sector for market leaders, such as Exodus Communications, Cable and Wireless America and Savvis Inc., where he was responsible for the development and management of security services and internal security.
"Due to the increase in global security issues, it is crucial for companies to take precautionary measures to ensure they are protected. I am extremely impressed by ZANTAZ' commitment to security best practices and to delivering its customers with innovative solutions that ensure their valuable information is safe," said Neal.
About ZANTAZ
ZANTAZ is the global leader in Information Retention and Discovery Management solutions. ZANTAZ' solutions enable organizations to capture, preserve and access unstructured digital information-including email, IM, files, scanned documents, and other electronic records-and review and produce relevant documents in a manner that reduces operational risks and costs while complying with legal, regulatory and corporate policy requirements. ZANTAZ solutions are available as onsite software applications or on-demand hosted services, and include a broad set of professional services and integration support. ZANTAZ has over 600 customers, including many of the largest corporations, law firms and government agencies in the world. For more information, visit www.ZANTAZ.com.
Summary: ...IDOL has also been used by the Economic Crime Unit (ECU) to identify perpetrators as part of its serious fraud investigations. Thanks to IDOL, the Force Intelligence Bureau Organised Crime division has been able to identify an additional 67 unlinked incidents relating to firearms, grievous bodily harm...
Summary: ...company reigns as Canadaās #1 cable TV operator. It also has a 52% ownership in Rogers Wireless, one of Canadaās largest mobile phone operators. To serve its numerous subsidiary companies, Rogers operates a large call center network that handles thousands of calls each day. Recently, Rogers sought...
Summary: ...The E.W. Scripps Company Case Sudy - Media Publishing Sites. Case Study Company Background The E.W. Scripps Company is a diverse media empire with interests in newspaper publishing, broadcast television stations, cable television networks, comics and interactive media. The Need Scripps is experiencing...
Summary: ...South Yorkshire Police Case Study. POWER PROMOTE PROTECT South Yorkshire Police The Long Arm of the Law Organization Background The South Yorkshire Police Force is the 13th largest of the 44 police forces within England, Wales and Northern Ireland and is responsible for policing Barnsley, Doncaster, Rotherham...
Summary: ...proximity, and interpreting the actual meaning of documents. IDOL K2ās filtering technology is also crucial to a large company such as Bristol-Myers Squibb, where content is found in numerous file formatsāincluding HTML, Microsoft Office file types, and Adobe Acrobat PDF. The Benefits Autonomy delivers...
Summary: ...and simplifying the process. Most important, the software has allowed us to easily handle more studies, with a smaller commitment of personnel.ā Prior to the implementation of TeleForm, UCSF required three programmers to perform many of the crucial data management tasks related to a single research...
Summary: ...clients mean that the frmās professionals draw on content ranging from fnancial records, to audit guidelines and legal documents. To date, this content had existed in paper form ā creating numerous problems for the frm. Storing and transporting physical fles among the frmās offces and client locations...
Summary: ...University of Sydney - Case Study. The solution was first rolled out to a core group of users responsible for managing the corporate website. This allowed the university to develop the necessary change management processes and new branding guidelines that it would then apply across its entire web presence....
Summary: ...Rodyk & Davidson Case Study. āInterwovenās commitment to the legal sector, its exciting product roadmap, and the availability of strong support resources in the Asia-Pacific region make it the ideal technology partner for our rapidly growing firm.ā Rodyk & Davidson LLP Rodyk & Davidson Supports...
Summary: ...to guide users to the brand assets and guidelines their work requires. Case Study Customer Harrah's Entertainment Industry Gaming Challenges ⢠Consistent branding was difficult to maintain across Harrahās distributed marketing organization ⢠To help drive response, each direct mail piece had to...
Summary: ...as voice coaching and instruction in how to create and maintain positive relationships with subscribers. In addition, in recognition of the crucial role that the customer contact centers play, Sky invested £50 million to ensure that its centers are superbly equipped and provide the best possible working...
Summary: ...Belga Press Agency - Breaking The News - Case Study. POWER PROMOTE PROTECT Belga Press AgencyBreaking the news Organization Background Belga is a leading news agency, providing a critical daily news service to editors and journalists, governments and companies all over Belgium, in addition to most of...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...automatically to supplement the conflicts process by offering suggestions for parties to the search and their roles in the search. ⢠Intuitive and Integrated Workflows ā Numerous workflows are embedded in the application to manage the conflicts process more seamlessly and integrate with new business...
Summary: ...and intra-document access control by user, group, and role level entitlement. ⢠Global language support ā Enable delivery of content in multiple languages. ⢠Support for future technologies ā Increase your agility through Autonomyās extensible architecture that allows you to expand and adapt...
Summary: ...Autonomy Optimost - Product Overview. PROMOTE POWER PROTECT Autonomy Optimost A Multichannel Marketing Suite to Attract and Convert Customers Customers are changing. They are more savvy and connected and their unfettered access to information makes them in full control. However, marketersā charters...
Summary: ...Collaboration and Expertise Networks Product Brief. the technology clusters disparate pieces of information automatically by concept, matching them to the conceptual profiles of experts in real-time in order to highlight crucial information and expertise resources. ⢠Alerting: staff can be alerted to...
Summary: ...and profiled when reconnected to the active network, ensuring that the emails are stored within the client file and keeping consistent with the organizations information management policies. For efficiency, operations such as the filing of emails work in the background, allowing users to continue using...
Summary: ...Autonomy Virage Command and Control Product Brief. Anti-clustering ā Halo collates and analyses related pieces of data, automatically detecting any anomalies in the system which might signify a threat. Profiling ā Using implicit and explicit profiling techniques, Halo automatically creates an individual...
Summary: ...to all WorkSite users. Customer Benefits As firms invest in productivity applications, and enforce company policies regarding the management and retention of information, it is imperative that the integrity of client, matter, engagement, and project files is maintained with current and complete content....
Summary: ...non-privileged documents. But the challenge of identifying relevant information is exacerbated by the fact that, according to IDC, about 60 percent of enterprise data is located not on centrally managed servers, but on remote servers, desktops, and laptops. With an increasingly mobile workforce expanding...
Summary: ...Web Interface Autonomy Explore provides a browser-based front end which is highly configurable based on the user and their corresponding role and related permissions within an organization. Explore contains a visually appealing charts package; any data set can be easily exported for use with any existing...
Summary: ...to protect privileged information Top Provider 2 0 0 8 S o c h a - G e l b m a n n E L E C T R O N I C D I S C O V E R Y S U R V E Y 6 T H A N N U A L Top 5 Ranking Overall in Software AND Services Categories EDRM Founding member, Advisory Committee and EDRM XML Leadership A leading commercial bank has...
Summary: ...effect, reminders if a custodian does not respond to the notice, and the ability to escalate the matter to a supervisor or direct report if a timely response is not received ā each of which is critical to create repeatable and defensible good faith process in accordance with FRCP requirements. āTrust...
Summary: ...industry, placing a premium on mitigating disruption to everything from home ownership and credit to consumer products and transportation. The economic meltdown has triggered unparalleled mergers and acquisitions and unfortunately massive litigation. The FBI has reported dozens of investigations and over...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...4 Advisory Committee Report at 28. 5 Id. At 25 (citing Subrin, Fishing Expeditions Allowed: The Historical Background of the 1938 Federal Discovery Rules, 39 Boston Coll. L. Rev. 691, 730 (1998)). 6 Standing Committee Report at 22. 7 Id. at 22-23. 8 Allman at 4. 9 Id.
...
Summary: ...worldwide. High quality digital and network recording facilities are a critical component of any successful CCTV strategy to ensure that potentially vital images are captured and retained safely for further analysis. While CCTV footage is popularly believed to play an important role in crime detection...
Summary: ...Designer to quickly and easily create new pesticide inspection forms or redesign existing ones. Ease-ofuse is critical. Some forms have been redesigned numerous times to accommodate changes to State of California regulations governing pesticide use as well as the unique reporting requirements. With these...
Summary: ...worked in collaboration to optimize the infrastructure within, which the survey and report system would operate. āThe department wanted the data to be processed centrally from numerous remote sites and a report generated within five minutes after turning the survey in, so that Riverside County Department...
Summary: ...not only notifying custodians and data stewards of the legal hold, but also making reasonable efforts to identify, preserve, and collect potentially responsive ESI in a forensically sound manner. Adding to the challenge, the process requirements are constantly changing and expanding. Reminders of the...
Summary: ...Compliance After the Global Credit Crisis. While telling investors and counterparties that the fund had weathered the worst, numerous email exchanges occurred through both private and corporate messaging systems indicating the potential peril faced by the fund.9 Finally, one of the fundās principals...
Summary: ...records management (ERM) systems. Users resist attempts to increase their workloads, and do not want to think about how and where to store content. Traditional classification approaches, whether alphabetical, chronological, color-coded, numerical, or based on the organization chart have been superseded...
Summary: ...Legal Technology: Enhancing profitability through an economic crisis. S P E C I A L F O C U S S U P P L E M E N T In association with Enhancing profitability through an economic crisis LEGAL TECHNOLOGY: Editor Richard Brent rbrent@ark-group.com Head of editorial Kate Clifton kclifton@ark-group.com Production...
Summary: ...diverse compliance requirements that can be based on numerous factors, including location (e.g. data segregation requirements), type of product or service (e.g. consumer products, wireless services), corporate structure (e.g. public, private, or non-profit), type of organization (e.g. corporate, legal,...
Summary: ...Responsible Information Management: Ensuring Data Privacy in the Enterprise. More importantly, if the data is leaked, either through malicious intent or by accident, the archives have been purged of sensitive information. By automatically monitoring and understanding all interactions, no matter how or...
Summary: ...destroy or create documents to impede, obstruct, or influence any existing or contemplated federal investigation. Section IX of Sarbanes-Oxley, also known as the White Collar Crime Penalty Enhancements Act of 2002 makes it a crime to tamper with a record or otherwise impede any official proceeding. 6....
Summary: ...and partner or customer sections, for example, may require additional levels of security which necessitate further authentication. The challenge is to ensure that all additional security checks are done in the background, hidden to the user. Company Intranets and Intelligence Applications Although the...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.