UBIC integrates Lit I View EMAIL AUDITOR and Digital Arts' m-Filter to launch Information Leakage Solution Service
NEW YORK, NY: The provider of AI-based, big-data analytics solutions provider, has declared the launch an information leakage solution service by integrating Lit I View Email Auditor, its automated email auditing system, with m-Filter an email security software program developed by Digital Arts.
Both companies have been engaged in the process of email auditing by using m-Filter Archive’s advanced email collecting and preserving functions. The new solution will enable customers to easily transfer email data from m-filter to LiV EMAIL AUDITOR through the export function of m-FILTER. Now it’ll be possible to quickly identify emails sent or received by suspicious persons subject to audit and consequently either restrict/block those emails.
The most interesting feature of this solution lies in its capability to focus on the Conception Phase of fraud. In the conception phase, insiders who may be engaged in fraudulent activities exhibit suspicious signs, such as discontent and anxiety, before moving to the preparation and execution phases of fraud. However, the solution is also capable of detecting fraud risks in Preparation and Execution Phases. The risk reduction functionality is the latest addition to LiV EMAIL AUDITOR’s functionality, which also makes it possible to estimate how far in the future a fraudulent activity might be committed. Most of the features identify potential patterns of fraud based on comparisons to existing data accumulated by UBIC concerned to fraud.
Companies adopting this solution will be able to detect signs of potential leakage of confidential information or data at an early stage and take measures to prevent that leakage. In particular, the solution may provide effective protection against information leakage for organization where email auditing by human examiners is insufficient or impractical, such as organization with employee strength in thousands, companies handling massive volumes of confidential data, or companies whose operations are scattered across various countries. The introduction of this solution has the potential to reduce the time required for email auditing by a factor of 500 to 1,000, when compared with the time required for human auditing.
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....