ZANTAZĀ® Appoints Charles Neal Vice President of Security
Neal Brings Extensive Security Expertise to Enhance ZANTAZ' Global Security Policies
PLEASANTON, CA (June 1, 2004) - ZANTAZ, Inc., the leader in e-communications management solutions for compliance, electronic discovery and storage management, today announced the appointment of Charles M. Neal III to Vice President of Security. In this newly created role, Neal will be responsible for developing and expanding the company's global security policies, standards, guidelines and procedures as part of its ongoing commitment to world-class security.
As a Certified Information Systems Security Professional (CISSP) and a Certified Information Security Manager (CISM), Neal brings over 30 years of experience in security and information technology to ZANTAZ. Prior to joining ZANTAZ, Neal worked for over 20 years for the Federal Bureau of Investigation (FBI) as a Special Agent who managed numerous complex white-collar crime and financial institution fraud cases. During his tenure with the FBI, Neal was among the founders that established and developed the science of computer forensic, fraud, and intrusion investigations.
"Leading Fortune 100 firms trust ZANTAZ to manage their most sensitive information, so it is imperative that our security procedures are of the highest quality," said Steve King, President and CEO of ZANTAZ. "Neal has an extensive background and track record building superior security programs for leading corporations and government agencies. He will play a key role expanding our current security processes and ensuring our security environment exceeds our customers' expectations."
In addition to his government service, Neal held numerous Vice President of Security positions in the private sector for market leaders, such as Exodus Communications, Cable and Wireless America and Savvis Inc., where he was responsible for the development and management of security services and internal security.
"Due to the increase in global security issues, it is crucial for companies to take precautionary measures to ensure they are protected. I am extremely impressed by ZANTAZ' commitment to security best practices and to delivering its customers with innovative solutions that ensure their valuable information is safe," said Neal.
About ZANTAZ
ZANTAZ is the global leader in Information Retention and Discovery Management solutions. ZANTAZ' solutions enable organizations to capture, preserve and access unstructured digital information-including email, IM, files, scanned documents, and other electronic records-and review and produce relevant documents in a manner that reduces operational risks and costs while complying with legal, regulatory and corporate policy requirements. ZANTAZ solutions are available as onsite software applications or on-demand hosted services, and include a broad set of professional services and integration support. ZANTAZ has over 600 customers, including many of the largest corporations, law firms and government agencies in the world. For more information, visit www.ZANTAZ.com.
Summary: ...IDOL has also been used by the Economic Crime Unit (ECU) to identify perpetrators as part of its serious fraud investigations. Thanks to IDOL, the Force Intelligence Bureau Organised Crime division has been able to identify an additional 67 unlinked incidents relating to firearms, grievous bodily harm...
Summary: ...South Yorkshire Police Case Study. POWER PROMOTE PROTECT South Yorkshire Police The Long Arm of the Law Organization Background The South Yorkshire Police Force is the 13th largest of the 44 police forces within England, Wales and Northern Ireland and is responsible for policing Barnsley, Doncaster, Rotherham...
Summary: ...company reigns as Canadaās #1 cable TV operator. It also has a 52% ownership in Rogers Wireless, one of Canadaās largest mobile phone operators. To serve its numerous subsidiary companies, Rogers operates a large call center network that handles thousands of calls each day. Recently, Rogers sought...
Summary: ...to guide users to the brand assets and guidelines their work requires. Case Study Customer Harrah's Entertainment Industry Gaming Challenges ⢠Consistent branding was difficult to maintain across Harrahās distributed marketing organization ⢠To help drive response, each direct mail piece had to...
Summary: ...The E.W. Scripps Company Case Sudy - Media Publishing Sites. Case Study Company Background The E.W. Scripps Company is a diverse media empire with interests in newspaper publishing, broadcast television stations, cable television networks, comics and interactive media. The Need Scripps is experiencing...
Summary: ...clients mean that the frmās professionals draw on content ranging from fnancial records, to audit guidelines and legal documents. To date, this content had existed in paper form ā creating numerous problems for the frm. Storing and transporting physical fles among the frmās offces and client locations...
Summary: ...and simplifying the process. Most important, the software has allowed us to easily handle more studies, with a smaller commitment of personnel.ā Prior to the implementation of TeleForm, UCSF required three programmers to perform many of the crucial data management tasks related to a single research...
Summary: ...proximity, and interpreting the actual meaning of documents. IDOL K2ās filtering technology is also crucial to a large company such as Bristol-Myers Squibb, where content is found in numerous file formatsāincluding HTML, Microsoft Office file types, and Adobe Acrobat PDF. The Benefits Autonomy delivers...
Summary: ...capture parcel PODs, An Post has expanded the system to capture registered mail PODs. An Post also used Autonomy's solution to amalgamate its accounts and tracking system to bill customers for its services. This allows the customer to see exactly what it has spent and where it has spent it. With Special...
Summary: ...Rodyk & Davidson Case Study. āInterwovenās commitment to the legal sector, its exciting product roadmap, and the availability of strong support resources in the Asia-Pacific region make it the ideal technology partner for our rapidly growing firm.ā Rodyk & Davidson LLP Rodyk & Davidson Supports...
Summary: ...as voice coaching and instruction in how to create and maintain positive relationships with subscribers. In addition, in recognition of the crucial role that the customer contact centers play, Sky invested £50 million to ensure that its centers are superbly equipped and provide the best possible working...
Summary: ...Belga Press Agency - Breaking The News - Case Study. POWER PROMOTE PROTECT Belga Press AgencyBreaking the news Organization Background Belga is a leading news agency, providing a critical daily news service to editors and journalists, governments and companies all over Belgium, in addition to most of...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...automatically to supplement the conflicts process by offering suggestions for parties to the search and their roles in the search. ⢠Intuitive and Integrated Workflows ā Numerous workflows are embedded in the application to manage the conflicts process more seamlessly and integrate with new business...
Summary: ...or a folder. Frequently performed searches can be saved and shared. ⢠Powerful Security Control access to system functionality and content at the object level based on user, group or role, so that sensitive information remains in the hands of authorized users. ⢠Add-Ons for Tight E-mail Integration...
Summary: ...Enable delivery of content in multiple languages. ⢠Support for future technologies ā Increase your agility through Autonomyās extensible architecture that allows you to expand and adapt to new requirements and technologies. Autonomy Supervisor for government communications oversight Government...
Summary: ...Security ā Control access to system functionality and content at the object level based on user, group or role, so that sensitive information remains accessible only by authorized users. ⢠Web Application Integration Toolkit ā A collection of Web services, callable dialogs and ASP.Net controls enables...
Summary: ...Autonomy Explore - Product brief. speech analytics Voice of the customer Customer experience analytics Customer interaction survey Real-time topic indexing Fraud and risk mitigation Social media monitoring 2 Automatic alerting and tagging Once an emerging trend has been discovered, Autonomy Explore offers...
Summary: ...Collaboration and Expertise Networks Product Brief. the technology clusters disparate pieces of information automatically by concept, matching them to the conceptual profiles of experts in real-time in order to highlight crucial information and expertise resources. ⢠Alerting: staff can be alerted to...
Summary: ...Autonomy Optimost - Product Overview. PROMOTE POWER PROTECT Autonomy Optimost A Multichannel Marketing Suite to Attract and Convert Customers Customers are changing. They are more savvy and connected and their unfettered access to information makes them in full control. However, marketersā charters...
Summary: ...of enterprise data is located not on centrally managed servers, but on remote servers, desktops, and laptops. With an increasingly mobile workforce expanding by more than 20 percent annually ā currently about 900 million workersāthat figure is certain to grow. This scattering of sensitive data represents...
Summary: ...and profiled when reconnected to the active network, ensuring that the emails are stored within the client file and keeping consistent with the organizations information management policies. For efficiency, operations such as the filing of emails work in the background, allowing users to continue using...
Summary: ...Autonomy Virage Command and Control Product Brief. Anti-clustering ā Halo collates and analyses related pieces of data, automatically detecting any anomalies in the system which might signify a threat. Profiling ā Using implicit and explicit profiling techniques, Halo automatically creates an individual...
Summary: ...to all WorkSite users. Customer Benefits As firms invest in productivity applications, and enforce company policies regarding the management and retention of information, it is imperative that the integrity of client, matter, engagement, and project files is maintained with current and complete content....
Summary: ...effect, reminders if a custodian does not respond to the notice, and the ability to escalate the matter to a supervisor or direct report if a timely response is not received ā each of which is critical to create repeatable and defensible good faith process in accordance with FRCP requirements. āTrust...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...worldwide. High quality digital and network recording facilities are a critical component of any successful CCTV strategy to ensure that potentially vital images are captured and retained safely for further analysis. While CCTV footage is popularly believed to play an important role in crime detection...
Summary: ...4 Advisory Committee Report at 28. 5 Id. At 25 (citing Subrin, Fishing Expeditions Allowed: The Historical Background of the 1938 Federal Discovery Rules, 39 Boston Coll. L. Rev. 691, 730 (1998)). 6 Standing Committee Report at 22. 7 Id. at 22-23. 8 Allman at 4. 9 Id.
...
Summary: ...to prevent the needless leakage of sensitive information are a risk to their customers and business partnersā clients who may soon rethink the practice of exchanging data with unsecured organizations. Do not invite data crime with insecure applications and unrestricted employee access to sensitive data....
Summary: ...Manage the sensitive information in devices that are easy to misplace Despite heightened attention on security issues, enterprises will not, and should not, accept compromising the performance of their infrastructure platforms. Vendors must provide sub-second response times, and promises must be backed...
Summary: ...Magazine, February, 2008. http://www. certmag.com/read.php?in=3310). As a result, IT is taking on an ever-greater role in designing and implementing regulatory compliance procedures and systems. These systems protect sensitive data (private and other), flag unusual or non-compliant activities, produce...
Summary: ...as well as in non-compliance penalties and data breaches, increase. Concurrently, IT is taking on a greater role in designing and implementing regulatory compliance procedures and systems. These systems protect sensitive data (private and other) and help ensure business continuity. One of the primary...
Summary: ...worked in collaboration to optimize the infrastructure within, which the survey and report system would operate. āThe department wanted the data to be processed centrally from numerous remote sites and a report generated within five minutes after turning the survey in, so that Riverside County Department...
Summary: ...Designer to quickly and easily create new pesticide inspection forms or redesign existing ones. Ease-ofuse is critical. Some forms have been redesigned numerous times to accommodate changes to State of California regulations governing pesticide use as well as the unique reporting requirements. With these...
Summary: ...Encrypting Recordings is Not Enough: Steps to Protect Your Most Sensitive Data. According to Gartner research, about 15 million Americans experienced fraud related to identity theft between August 2005 and August 2006.1 Non-compliance with PCI requirements can create easy access to this data for any person...
Summary: ...Compliance After the Global Credit Crisis. While telling investors and counterparties that the fund had weathered the worst, numerous email exchanges occurred through both private and corporate messaging systems indicating the potential peril faced by the fund.9 Finally, one of the fundās principals...
Summary: ...records management (ERM) systems. Users resist attempts to increase their workloads, and do not want to think about how and where to store content. Traditional classification approaches, whether alphabetical, chronological, color-coded, numerical, or based on the organization chart have been superseded...
Summary: ...not only notifying custodians and data stewards of the legal hold, but also making reasonable efforts to identify, preserve, and collect potentially responsive ESI in a forensically sound manner. Adding to the challenge, the process requirements are constantly changing and expanding. Reminders of the...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.