AUTONOMY UNVEILS INDUSTRY'S FIRST INTERACTION CONTROL ELEMENT TO MEET GROWING COMPLIANCE AND BUSINESS OPTIMIZATION NEEDS
Automates Policy-Driven Capture, Tagging, Classification, and Compliance for Multi-Channel Interactions
Cambridge, UK and San Francisco, Calif. - March 3, 2009 - Autonomy Corporation plc (LSE: AU. or AU.L), a global leader in infrastructure software for the enterprise today unveiled Autonomy Interaction Control Element (ICE), the industry's first solution to automate the policy-driven capture, classification, and real-time compliance for multi-channel customer interactions. By intelligently identifying relevant business activity, including traditional customer interactions, employee application usage and server events, and taking appropriate actions based on user-defined business policies, Autonomy ICE expands the enterprise's ability to govern and manage critical customer and business data. ICE delivers an unprecedented class of information that can be processed and analyzed using Autonomy's Meaning Based Computing technology, which understands the meaning of unstructured content, enabling organizations to maximize employee productivity, drive a higher level of business intelligence and more comprehensively enforce regulatory compliance.
"The advent of meaning-based technologies enables forward-thinking organizations to harness the true value of this traditionally untapped resource while at the same time mitigating the risks endemic to its proliferation," commented Andrew Joiner, CEO of Autonomy Customer Interaction Solutions. "Autonomy ICE is the only product of its kind that can dynamically monitor desktop activity such as CRM and helpdesk applications as well as live email and chat interactions, and take the appropriate action automatically and in real-time, whether it be masking credit card information for security purposes or attaching customer data to a recording."
Autonomy ICE enables business and compliance executives to establish customized policy events that target specific interactions important to the organization. By intelligently monitoring the end user's desktop activity and forming a conceptual understanding of the meaning of interactions, Autonomy ICE can automatically apply compliance and governance policies to enforce Payment Card Industry data security needs, retention and disposition policies, and legal holds. Autonomy ICE's intuitive tagging and classification capabilities provide unparalleled support for Autonomy's pan-enterprise search and litigation readiness technologies, streamlining processes such as eDiscovery and early case assessment.
Autonomy ICE offers unique benefits including:
Automatic synchronization of live interactions, whether they be voice, email, or chat, with corresponding desktop activity, ensuring only relevant interactions are captured, classified, and appropriately governed
Enterprise-class architecture that uses a centralized, scalable policy server to intelligently classify and manage interactions, irrespective of their format or language
Application independent solution that enables policies to be defined and identified in all CRM, helpdesk, email, chat, and browser-based applications, and 24/7 monitoring of all desktop and server events
PCI-compliant security, including masking or muting sensitive materials such as credit card information from the audio or screen recording; security can be applied for any industry, federal or internal policy or regulation
Please visit www.autonomy.com to find out more.
About Autonomy
Autonomy Corporation plc (LSE: AU. or AU.L), a global leader in infrastructure software for the enterprise, is spearheading the meaning-based computing movement and was recently ranked by IDC as the clear market share leader in enterprise search with market share nearly double that of its nearest competitor. Autonomy's technology allows computers to harness the full richness of human information, forming a conceptual and contextual understanding of any piece of electronic data including unstructured information, be it text, email, voice or video. Autonomy's software powers the full spectrum of mission-critical enterprise applications including information access technology, pan-enterprise search, information governance, end-to-end eDiscovery and archiving, records management, business process management, customer interaction solutions, and video and audio analysis, and is recognized by industry analysts as the clear leader in enterprise search.
Autonomy's customer base is comprised of more than 17,000 global companies and organizations including: 3, ABN AMRO, AOL, BAE Systems, BBC, Bloomberg, Boeing, Citigroup, Coca Cola, Daimler AG, Deutsche Bank, Ericsson, Ford, GlaxoSmithKline, Lloyd TSB, NASA, Nestle, the New York Stock Exchange, Reuters, Shell, T-Mobile, the U.S. Department of Energy, the U.S. Department of Homeland Security and the U.S. Securities and Exchange Commission. More than 350 companies OEM Autonomy technology, including BEA, Citrix, EDS, H-P, Novell, Oracle, Sybase and TIBCO, and the company has over 400 VARs and Systems Integrators. The company has offices worldwide. Please visit www.autonomy.com for more information on Autonomy.
Autonomy and the Autonomy logo are registered trademarks or trademarks of Autonomy Corporation plc. All other trademarks are the property of their respective owners.
Summary: ...of creating and routing trade documentation. The bank has automated the generation of OTC derivative confirmations for a number of asset classes, such as Rates, Credit, and FX. Now, rules and regulations are enforced via the system and templates are protected from staff editing and access, eliminating...
Summary: ...to wrongly configure an order allowing orders to never sit idle without action taken.” Bruno is also using Cardiff’s TeleForm content capture solution to automatically process the 50 to 60 warranty cards it receives daily.
...
Summary: ...to wrongly configure an order allowing orders to never sit idle without action taken.” Bruno is also using Cardiff’s TeleForm content capture solution to automatically process the 50 to 60 warranty cards it receives daily.
...
Summary: ...personnel action request process. When employees need to perform an HR-related activity such as a personal leave request, department transfer, or salary review, they securely log onto LiquidOffice and enter the information into the appropriate electronic form. With logic programmed by Napa County, LiquidOffice...
Summary: ...news and analysis microsites on www.janes.com. “IDOL K2’s easily customized business rules ensure the appropriate content gets directed to the appropriate site with extreme accuracy,” says Andrew Robinson, Head of Jane’s e-Services. “This is a powerful tool. It makes it even easier for our subscribers...
Summary: ...backups. They can also determine what should and should not be backed up while managing the network and storage impact of user data. In addition, Connected Backup for PC provides a secure web portal, through which users can recover data – without relying on IT department or helpdesk intervention. The...
Summary: ...To learn more and see how Autonomy software solutions enable other organizations to leverage Meaning Based Governance, visit www.autonomy.com/ protect. About Autonomy Autonomy Corporation plc (LSE: AU. or AU.L), a global leader in infrastructure software for the enterprise, spearheads the Meaning Based...
Summary: ...protecting the information of staff and faculty. Autonomy's Connected® Backup product provides the ideal solution for backing up both Mac and PC desktops and laptops. About Autonomy Autonomy Corporation plc (LSE: AU. or AU.L), a global leader in infrastructure software for the enterprise, spearheads...
Summary: ...infrastructure which usually consists of tape, libraries and backup servers. Now all of CFI’s data protection requirements can be automated for fast and reliable data recovery without the burden of time consuming and complex manual processes. About Autonomy Autonomy Corporation plc (LSE: AU. or AU.L),...
Summary: ...at other remote locations. A high level of granularity provides IT with the access control and maintain effective control over the frm’s content without impeding its productive use.Meanwhile, helpdesk dropped dramatically, freeing technical personnel for higher-value work. The unifed, matter-centric...
Summary: ...said. “What we like about the Autonomy solution is that it offers something for everyone, using a combination of methods via multiple mediums, whether it’s the Web, email, or PDF.” About Autonomy Autonomy Corporation plc (LSE: AU. or AU.L), a global leader in infrastructure software for the enterprise,...
Summary: ...The School District of Palm Beach County - Case Study. or AU.L), a global leader in infrastructure software for the enterprise, spearheads the Meaning Based Computing movement. It was recently ranked by IDC as the clear leader in enterprise search revenues, with market share nearly double that of its...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...Autonomy ICE: Compliance and Risk Management. Autonomy ICE intelligently identifies which parts of which interactions require masking or muting for enterprise risk management or compliance, which strictly limit access to data such as credit card numbers and medical information. Autonomy ICE automatically...
Summary: ...as there is technology that can prevent the recording of this customer sensitive data. Deployment of Autonomy ICE with the Autonomy Qfiniti recording module, Observe, is highly recommended for all companies that record calls that include credit card data and the associated CCV number. We are unaware of...
Summary: ...Explore, every recording can be automatically searched with unprecedented accuracy and speed. • Custom data attachment • Call classification • Advanced search • Agent call and recording status • Rules-based archive management • P ayment Card Industry (PCI) compliance • Intelligent archiving...
Summary: ...the desktop integration between an existing CRM or 3rd party desktop application, Autonomy ICE and the Autonomy Qfiniti component, Agent Monitor Engine (AME). Autonomy Qfiniti Desktop Components Enabling Qfiniti to record a team member’s screen activity requires the installation, on the desktop, of...
Summary: ...brief describes the desktop integration between an existing CRM or 3rd party desktop application, Autonomy ICE and the Autonomy Qfiniti component, Agent Monitor Engine (AME). Autonomy Qfiniti Desktop Components Enabling Qfiniti to record a team member’s screen activity requires the installation, on...
Summary: ...media interactions • Integrate social media discovery with leading eDiscovery and information governance platform • Create proactive policies for real-time monitoring and discovery to enforce information risk policies • Ensure FRCP and regulatory compliance •Pr eserve and collect content subject...
Summary: ...as there is technology that can prevent the recording of this customer sensitive data. Deployment of Autonomy ICE with the Autonomy Qfiniti recording module, Observe, is highly recommended for all companies that record calls that include credit card data and the associated CCV number. We are unaware of...
Summary: ...out on data-flows. Additional functionality can also be integrated into the Command and Control System to automate advance data analysis technology and harness the value of security data. Complex pre-defined rules can be programmed based on if A and B while C, then Z equations to trigger the appropriate...
Summary: ...Card Field and the CCV number. 4. For the next action, select “MuteAudioOn” to mute the audio recording. There are no additional parameters for this action. Policy Definition – Stop Masking The next step of the process is the definition of the trigger to stop the masking and or muting of the call....
Summary: ...selected the Credit Card Field and the CCV number. 4. For the next action, select “MuteAudioOn” to mute the audio recording. There are no additional parameters for this action. Policy Definition – Stop Masking The next step of the process is the definition of the trigger to stop the masking and...
Summary: ...what your customers are experiencing online to glean insights as to which action steps to take to improve business opportunities. Text Analytics. Understand the meaning of text-based communications such as survey results, complete with open-end verbatim or CRM notes, and automatically classify and categorize...
Summary: ...media transactions, across all applications, in a completely invisible manner for the end user, Autonomy monitors both server and desktop events and takes the appropriate action on the interactions based on pre-defined policies and an understanding of the interaction. Autonomy Social Media Governance...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...recording systems, CRM and helpdesk suites, email systems, and chat applications. By combining defined parameters with a real-time understanding of the content within an interaction made via phone, email, chat, web, or desktop application, Autonomy ICE identifies and takes action on any suspicious or...
Summary: ...centers will need to ensure that the Primary Account Number (PAN) is masked when displayed in CRM Desktop Applications (no more than the first six and last four digits should be displayed). • Call centers will need to ensure that PAN data is rendered unreadable (for example, encrypted using strong cryptography)...
Summary: ...data monitoring, masking, muting, triggers, and alerts. Organizations may monitor all channels including customer and client communications occurring via email, chat, phone, CRM applications, and collaboration tools. Auditing Capabilities – Regular compliance audits of company information are key to...
Summary: ...with their application and executes actions such as attach metadata, execute Record on Demand, and identify calls that require voice and or screen masking or muting. PCI Compliance 5 Requirement 8: Assign a unique ID to each person You assign a unique user ID for each user defined in the system.
...
Summary: ...Data Because customer data will be needed by some users but not others, it is critical that businesses have a means to mask sensitive data during playback, both in voice and screen recordings. Masking data may involve distorting or bleeping out spoken credit card numbers or blacking out the numbers in...
Summary: ...for both commercial and law enforcement purposes. The ability to identify vehicles in all conditions and trigger appropriate actions automatically is a key requirement in many environments ranging from car park surveillance and monitoring forecourts to traffic law enforcement and border controls. With...
Summary: ...advanced operations, Autonomy presents customers with a compelling value proposition. With this ability, Autonomy enables organizations to penetrate their information silos, derive maximum value from their corporate assets, and boost productivity while minimizing the risks endemic to information proliferation....
Summary: ...the constraints and rules defined around a workfow, and activates tasks as appropriate. • Caching. Workfows are cached in memory for fast performance. Workfows that are active are likely to be found in memory, thereby reducing the probability of accessing the persistent store, which tends to be expensive....
Summary: ...with capturing such a large number of recorded interactions. One of the most common challenges is being able to protect sensitive data once it is inside the organization. Security standards such as the Payment Card Industry Data Security Standards (PCI DSS), Sarbanes-Oxley Act (SOX) and the Health Insurance...
Summary: ...intelligent electronic forms, realtime business activity monitoring, secure connectivity, and rich capabilities for modeling business processes. Autonomy Policy Based Information Governance helps businesses convey critical information for line of business (LOB) management via clear dashboards that reveal...
Summary: ...chat to be indexed and searched alongside other data formats Unrivalled accuracy by understanding words in context Speaker and audio segmentation, speaker recognition and classification, and audio/text synchronization Automatic capture, encoding and indexing of video and audio content Automatic generation...
Summary: ...the monitoring of the completeness of the compliance effort and provides the ability to report on risk at multiple levels within the organization. Such capabilities coupled with automated workflow and process management functionality can then enable sophisticated active monitoring and triggering features...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.