Top 6 Reasons Financial Services Companies Classify Data

February 25th, 2015

Next week, SC Magazine will be hosting a webinar on how Provident Bank transformed their information protection strategy. While it might be a bit of a spoiler, I will let you know that Provident Bank thought enough of classification to make it central to their data protection transformation, as have many other financial organizations. I have worked with a number of different financial services companies, and while each might deal with much of the same kinds of data – payment card information (PCI), personally identifiable information (PII), and intellectual property (IP) – they all had their own unique drivers for implementing classification. It made me wonder — what are the top 5 reasons that financial organizations have asked TITUS to help them classify their data? Here is what I found:
Read the rest of this entry »

TITUS Named One of the ‘500 Hot Cybersecurity Companies to Watch in 2015’

February 24th, 2015

We were pleased to learn last week that TITUS has been named to the Cybersecurity Ventures first annual list of top 500 Hot Cybersecurity Companies it Watch in 2015. TITUS was ranked 167 on the list, placing it firmly in the top half of list of cybersecurity companies to watch in the coming year.

According to the press release from Cybersecurity Ventures, they “selected thousands of potential companies for inclusion in the Cybersecurity 500 by soliciting feedback from CISOs and end-user security practitioners, researching hundreds of cybersecurity events, and researching dozens of cybersecurity news sources”.

Their selection criteria included a number of factors including security problems solved by the company/software; customer base; feedback from CISOs and decision makers; feedback from IT security evaluators and recommenders; company growth; media coverage; and more.

Remarked TITUS Co-Founder and CEO Tim Upton, “We are pleased to be among such an impressive group of international security companies as the ones included on this list. For over a decade, TITUS has been developing information security solutions that are being used in some of the largest and most reputable enterprises around the world. Our customers know the importance of accurately identifying and classifying their information in order to effectively protect it, and we are seeing significant growth as more and more organizations realize the importance of information identification and classification as a way to increase the effectiveness of their existing security infrastructure.”

Targeting Healthcare Data

February 9th, 2015

In light of last week’s announcement that the records of 80 million customers were stolen from healthcare insurer Anthem, it is worth noting that healthcare organizations have a particularly heavy data protection burden to bear. As the NY Times reported, Protected Health Information (PHI) is incredibly valuable. Where credit card records were selling for just 33 cents each, a patient medical record on the black market sold for $251.

Why is PHI so valuable?
Read the rest of this entry »

World Data Privacy Day

January 28th, 2015

It’s Data Privacy Day today, and TITUS is participating with other organizations around the world to raise awareness about the need to protect personal data. While much of the focus of Data Privacy Day is on how individuals can protect their data from the mischievous, the opportunist and the criminal, here at TITUS we like to look at it from the other side. How can the bank, the clinic, the department store, the utility, the educational institution, and all of the other legitimate organizations that collect personal details be good stewards of this information?
Read the rest of this entry »

Extending SharePoint RMS (IRM) Support to Mobile

January 2nd, 2015

Microsoft RMS support, also know as Information Rights Management (IRM), has been supported in SharePoint since the SharePoint V3 release. This functionality allows you to limit the actions that users can take on documents or files that have been downloaded from SharePoint lists or libraries. RMS encrypts the downloaded files and limits the set of users that are allowed to decrypt these files. RMS can also limit the rights of the users who are allowed to read files so that they cannot do additional things such as print copies of the files or copy text from them. When people download files in an IRM-enabled list or library, the files are encrypted so that only authorized people can view them. This functionality works great if you are opening a SharePoint file on your desktop, but what happens if you want to access these SharePoint files on your mobile device? TITUS has introduced an iOS app that allow you to extend SharePoint IRM to iPhone and iPad devices.

A growing number of Mobile Device Management (MDM) vendors now offer secure document containers and direct access to SharePoint to allow users to view SharePoint documents on mobile devices. MobileIron offers their Docs@Work app and AirWatch has their Secure Content Locker. The problem with these apps, as well as the iOS and Android operating systems, is that they are not RMS aware. Read the rest of this entry »

The Sony Hack Highlights the Need for Classification, not Castlefication

December 24th, 2014

The way we do business has changed, which has data security professionals recently speaking a lot about data-centric security. With dispersed, global workforces and the proliferation of mobile devices, it is not possible to keep all of our sensitive data behind the “castle” wall. Data today must be shared, at least some of the time, outside of the citadel of the central network. Data-centric security solutions help organizations properly manage and protect data throughout its lifecycle. If Sony Pictures Entertainment had implemented a data-centric security approach, they likely would not have suffered as severe a breach.

So what is data-centric security? One way to look at data-centric security is to consider it as “data encryption”. Read the rest of this entry »

Search:
Delivered by FeedBurner