contents | products | |||||||
| InBoxer Launches World’s First Email Monitoring Appliance The world’s first outbound and inbound email monitoring appliance designed to stop data loss, protect privacy, and manage inappropriate employee behavior for organizations and departments with 5000 or fewer employees was announced today by InBoxer. The InBoxer Anti-Risk Appliance, which is currently in test nationally at financial services, health care, and other organizations, can be installed quickly and without a re-design of a corporate network or a lengthy assessment. Compliance officers, corporate legal counsels and HR professionals can quickly analyze email content and find risky messages with minimal IT involvement. The Anti-Risk Appliance can be used to review previously processed messages (e-Discovery) and users can create alarms in real-time to identify messages as they are sent. While the InBoxer Anti-Risk Appliance is scaleable enough to support large organizations, it was designed specifically for the needs of departments and small to mid-sized organizations that do not want to change their corporate infrastructure. Once proper permissions are granted, customers can complete installations in minutes by plugging the appliance into the local network. End users simply log-into the web-based interface and see a dashboard that is updated in real-time using AJAX technologies. End-users can use pre-defined displays or they can easily customize the display in real-time. Users can also create reports and alarms just by instructing the appliance to memorize the display. InBoxer finds risky messages that other systems cannot, because of its award-winning, proprietary, language-based technology that rapidly classifies messages by risk type. With the InBoxer Anti-Risk Appliance, organizations can monitor a broad range of risks, including the following: • Objectionable / Acceptable Use • Personal content • Privacy violations (personally identifiable information), such as account, social security, and credit card numbers • Confidential documents and intellectual property leaks • Medical terminology (to show HIPAA compliance) • Productivity wasters • Excessive network traffic • Violations of communications restrictions. write your comments about the article :: © 2006 Networking News :: home page |