Global Relay Archive captures and stores communications including email, instant messaging, and social media for compliance, with advanced search capabilities and robust reporting tools.
Systems that capture, archive, and monitor electronic communications including email, chat, and voice to ensure compliance with recordkeeping requirements and prevent inappropriate communications.
More Secure Communication Monitoring
More Risk & Compliance ...
End-to-End Encryption Ensures all data transmissions are encrypted between communicating parties. |
Global Relay Archive documentation references secure end-to-end encryption for messages in transit. | |
Data at Rest Encryption Protects stored data from unauthorized access using encryption. |
Global Relay states at-rest data is encrypted in their secure data centers. | |
Transport Layer Security (TLS) Utilizes TLS protocols for secure communications. |
TLS is specifically listed as their communications security protocol. | |
Key Management Robust system for managing encryption keys, including rotation and revocation policies. |
Product describes robust encryption key management practices. | |
Data Masking Ability to mask sensitive data to prevent unauthorized disclosure. |
Supports data masking features for sensitive information, per documentation. | |
Zero Trust Architecture Implements principles of zero trust to restrict lateral movement and access. |
No information available | |
Secure APIs APIs are protected with authentication and rate-limiting to prevent abuse. |
API documentation specifies authentication and rate limiting. | |
Audit Logging Maintains secure logs of all actions and changes for audit trail. |
Audit logging is a fundamental compliance feature in the platform. | |
Data Loss Prevention (DLP) Monitors and prevents unauthorized data exfiltration. |
DLP options are mentioned as available to prevent data leaks. | |
Anonymization/Pseudonymization Ability to anonymize or pseudonymize sensitive data for compliance. |
Anonymization and pseudonymization are referenced for GDPR compliance. | |
Multi-Factor Authentication Requires multiple forms of authentication for system access. |
MFA is available as a user authentication option. | |
Intrusion Detection Monitors data environments for signs of intrusion or compromise. |
Product monitors for suspicious activities, indicating some intrusion detection. | |
Compliance with Standards Adheres to recognized security standards such as ISO 27001 or SOC 2. |
Global Relay references several industry certifications including SOC 2. | |
Security Patch Management Ensures prompt deployment of security updates and patches. |
They document regular patch management as part of their security operations. | |
Granular Access Controls Fine-grained user and role-based access permissions. |
Role and user-based permissions supported in the product UI. |
Email Monitoring Can capture and analyze email communications from various providers. |
Captures and archives email from a wide variety of providers. | |
Instant Messaging Monitoring Supports chat applications like Bloomberg, Teams, Slack, and WhatsApp. |
Supports monitoring of instant messaging platforms, e.g., Teams, Bloomberg, Slack. | |
Voice Communication Monitoring Records and analyzes voice calls for compliance. |
Records and archives voice calls for surveillance compliance. | |
Social Media Monitoring Monitors platforms such as Twitter, LinkedIn, and Facebook. |
Supports social media communications including Twitter, LinkedIn, Facebook. | |
SMS/Text Message Monitoring Captures and analyzes text messages including SMS and MMS. |
SMS and MMS capture is supported, according to feature list. | |
Video Conferencing Monitoring Supports monitoring of Zoom, WebEx, and similar video platforms. |
Video conferencing monitoring (e.g., Zoom, Webex) is advertised. | |
Mobile Device Integration Ability to monitor communications on mobile platforms. |
Mobile app and mobile integration are part of their platform. | |
Multi-Language Support Understands and processes communications in multiple languages. |
No information available | |
Cloud App Integration Integrates with SaaS communication tools. |
Platform integrates with a wide array of SaaS apps, per their integration catalog. | |
Real-time Data Capture Ability to monitor and capture communications in real time. |
Real-time ingestion and monitoring supported per product technical specs. | |
Legacy System Integration Compatibility with on-premise and older systems. |
Legacy and on-premises system support is offered for older data sources. | |
Custom Channel Support Option to configure and monitor bespoke channels. |
Custom channel integration and support referenced in documentation. |
MiFID II Compliance Ensures monitoring features enable compliance with MiFID II. |
Product documents MiFID II compliance support. | |
SEC/FINRA Compliance Features suited for SEC/FINRA communication surveillance requirements. |
Specifically supports SEC/FINRA mandated retention and review. | |
GDPR Support Facilitates privacy and data protection under the European GDPR. |
Product built with GDPR and privacy in mind; supports related features. | |
Retention Policy Management Configurable message retention periods for regulatory requirements. |
Retention policies are central configurable parameters in the platform. | |
Automated Compliance Reporting Generates reports and monitoring summaries for auditors and regulators. |
System generates scheduled and on-demand compliance reports. | |
Pre-configured Policy Templates Templates for standard compliance monitoring based on best practices. |
Pre-configured templates available to suit regulatory best practice. | |
Exportable Audit Trails Easily exportable, immutable logs to share with regulators. |
Audit trails are exportable for regulator use. | |
Data Sovereignty Controls Ensures data remains within legally required geographic boundaries. |
Offers data center-based geographic controls for data sovereignty. | |
Certification Documentation Provides compliance certificates and documentation support. |
Compliance documentation and certificates are provided for customers. | |
Workflow for Legal Hold Supports litigation hold requirements on communication records. |
Workflow for legal hold on records described in support resources. |
Keyword and Phrase Detection Advanced filtering to detect sensitive, risky, or banned terms. |
Advanced keyword and phrase detection engine is a basic capability. | |
Machine Learning/AI Detection AI-based pattern recognition for advanced risk insight and anomaly detection. |
AI and machine learning based detection capabilities available. | |
Natural Language Processing (NLP) Uses NLP to understand context and intent in communications. |
NLP capabilities are noted for context-aware analysis. | |
Sentiment Analysis Determines sentiment/tone to help flag negative or escalating conversations. |
Sentiment analysis to help flag negative/hostile messages is referenced in feature documentation. | |
Behavioral Analytics Identifies unusual behaviors such as off-channel or after-hours contact. |
Behavioral analytics functionality highlighted in marketing materials. | |
Insider Threat Detection Flags activities indicative of insider threats or compliance breaches. |
Insider threat detection, including off-channel behavior, is mentioned in solution overviews. | |
Automated Alert Generation Automatically generates alerts for high-risk communications. |
Automated alerts are generated for high-risk communications. | |
False Positive Reduction Tools Features for tuning and fine-tuning engines to minimize false positives. |
Platform provides tuning to reduce false positives according to product literature. | |
Rule-Based Monitoring Flexible creation of rules and scenarios for detection. |
Rule-based monitoring supported via configuration console. | |
Customizable Risk Scoring Assigns risk scores based on detected patterns and behaviors. |
Risk scoring and prioritization available in dashboard. | |
Volume of Communications Processed Maximum amount of data/messages processed per day. |
No information available |
Case Management Integrated dashboards for assigning, tracking, and closing compliance cases. |
Case management features described in UI screenshots and documentation. | |
Alert Workflow Management Custom workflows for triaging and resolving flagged incidents. |
Custom workflows for alert triage and escalation supported. | |
Evidence Preservation Capabilities to lock and secure critical evidence for legal or compliance needs. |
Product offers evidence preservation with legal and compliance locks. | |
Search and Filtering Advanced querying, filtering, and sorting for efficient review. |
Search and filtering functionality described as 'advanced' in marketing and user guides. | |
Keyword Highlighting Highlights detected keywords and phrases in investigator view. |
Keyword highlighting is present for selected/detected terms. | |
Bulk Actions Supports bulk tagging, commenting, escalation, or closure of alerts. |
No information available | |
Collaboration Tools Allows multiple reviewers to collaborate, communicate, and add notes. |
Collaboration tools/sharing and comment features are available. | |
Annotation and Tagging Ability to annotate and tag communications for future reference. |
Annotation and tagging functions are described in product literature. | |
Export and Print Options Enables secure export or print of evidence for regulatory requests. |
Export options for data and evidence noted broadly in technical features. | |
Time to Resolution Average time taken to close an alert or investigation. |
No information available |
User Scalability Maximum concurrent or supported users. |
No information available | |
Data Storage Capacity Maximum amount of data that can be stored. |
No information available | |
Processing Speed Average speed at which messages or records are processed. |
No information available | |
Cloud Deployment Options Availability of cloud-native, on-premises, or hybrid deployment. |
Platform available in cloud, hybrid, and on-premises deployment models. | |
High Availability Designed for minimal downtime with autoscaling and redundancy. |
Uptime, redundancy, and HA options advertised. | |
Disaster Recovery Built-in capabilities to recover from failures or outages. |
Disaster recovery in place with backup and failover. | |
Load Balancing Distributes workload across resources to ensure stability. |
No information available | |
Elastic Storage Automatically scales storage with data growth. |
No information available |
Intuitive Dashboard Modern, clear user interface for quick overview and navigation. |
Modern dashboard highlighted as a differentiator on website. | |
Customizable Views Personalized dashboard, reporting, and alert configurations. |
Customizable dashboards and filters available. | |
Role-Based Access Control Functionality and access limited by user roles and permissions. |
Role-based access controls per compliance standard. | |
Single Sign-On (SSO) Integration with enterprise SSO providers for seamless access. |
SSO integration with enterprise identity providers supported. | |
Mobile Access Ability to access monitoring functions from mobile devices. |
Mobile app and mobile access available. | |
Accessibility Compliance Adherence to standards such as WCAG for disabled users. |
No information available | |
Multi-Lingual Interface User interface available in multiple languages. |
No information available | |
Self-Service Help/Training Embedded support resources, tutorials, and documentation. |
Self-service help, knowledge base, and tutorials provided within the product. | |
Notification Preferences Users can customize the types and frequency of alerts/notifications. |
Notification and alert preferences are available in user settings. |
Open API Comprehensive API for integrating with other enterprise systems. |
APIs available for external integration and development. | |
HR System Integration Ability to import user/entity metadata from HR databases. |
Integration with popular HR systems available. | |
SIEM Integration Integrates with Security Information and Event Management tools. |
SIEM integration referenced in partner ecosystem. | |
Data Export Capabilities Supports export of raw and processed data to external systems. |
Supports data exporting in multiple formats. | |
Active Directory Compatibility Syncs with corporate directory and identity management solutions. |
Supports Active Directory sync and compatibility. | |
Custom Integration Support Provides professional services for custom integrations. |
No information available | |
Webhook Notifications Supports real-time event notification through webhooks. |
Webhook/event notification support mentioned in developer documentation. | |
Third-party Marketplace Connectors Integration-ready connectors for popular SaaS and compliance tools. |
Marketplace/app directory lists connectors for third-party tools. |
Custom Report Builder Easy-to-use interface for generating tailored reports. |
Users can build custom reports via reporting dashboard. | |
Scheduled Reporting Automated delivery of regular reports to specified recipients. |
Allows scheduling of compliance and activity reports. | |
Export to Multiple Formats Reports can be exported to PDFs, Excel, CSV, etc. |
Export to CSV/Excel/PDF and other formats supported. | |
Data Visualization Tools Graphs, heatmaps, and other visual tools to spot trends. |
Data visualization tools (heatmaps, graphs) exist in dashboard. | |
Drill-Down Capabilities Ability to investigate from aggregated data down to individual messages. |
Drill-down on communication/message details available. | |
Regulatory Filing Support Templates and exports for regulatory reporting. |
Regulatory filing/export templates available. | |
Access Control on Reports Limits report access by user/role. |
Reports can be restricted by user or role. | |
Historical Data Comparison Compare metrics and alert rates over different timeframes. |
No information available |
Privacy-by-Design Features Default settings and architectures protect user privacy. |
Privacy-oriented default design and privacy controls throughout the solution. | |
Ethical Filtering Opportunities to exclude personal or confidential discussions from monitoring. |
Configuration can exclude personal/confidential content from monitoring. | |
Employee Consent Management Tracks and enforces employee consent for monitored channels. |
Employee consent tools and audit capabilities referenced for monitored channels. | |
Privacy Notices and Disclosures Built-in mechanisms for notifying monitored users. |
Platform includes automated and user-initiated privacy notifications. | |
Redaction Tools Ability to redact data from records before access or sharing. |
Redaction capabilities are referenced for compliant data sharing. | |
Right to be Forgotten Supports deletion of records upon legitimate requests. |
Supports deletion requests in line with GDPR and similar regulations. | |
Data Minimization Collects and retains only necessary data. |
Data minimization configured to only collect and store necessary information. | |
Access Review Automation Monitors and reports on who accesses what data and when. |
Review and reporting on access provided by audit features. |
24/7 Support Availability Round-the-clock customer or technical support. |
24/7 global customer and technical support is highlighted on the website. | |
Onboarding Assistance Help with initial setup, configuration, and migration. |
Onboarding team and migration support discussed in onboarding literature. | |
Regular Updates Continuous improvement and maintenance with regular updates. |
Service receives regular feature and security updates. | |
Knowledge Base Access Comprehensive support portal with documentation and FAQs. |
Knowledge base and support portal accessible to users. | |
User Community Active online community for sharing best practices and troubleshooting. |
User community is available via forums and customer events. | |
Dedicated Account Manager Single point-of-contact for customer relationship. |
Dedicated account manager included for enterprise customers. | |
Service Level Agreement (SLA) Defined response and resolution times for support inquiries. |
SLA terms are included in customer service contracts. | |
Training Options Availability of live or web-based training sessions. |
Live and web-based training sessions are promoted as available. |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.