World Data Privacy Day

January 28th, 2015

It’s Data Privacy Day today, and TITUS is participating with other organizations around the world to raise awareness about the need to protect personal data. While much of the focus of Data Privacy Day is on how individuals can protect their data from the mischievous, the opportunist and the criminal, here at TITUS we like to look at it from the other side. How can the bank, the clinic, the department store, the utility, the educational institution, and all of the other legitimate organizations that collect personal details be good stewards of this information?
Read the rest of this entry »

Extending SharePoint RMS (IRM) Support to Mobile

January 2nd, 2015

Microsoft RMS support, also know as Information Rights Management (IRM), has been supported in SharePoint since the SharePoint V3 release. This functionality allows you to limit the actions that users can take on documents or files that have been downloaded from SharePoint lists or libraries. RMS encrypts the downloaded files and limits the set of users that are allowed to decrypt these files. RMS can also limit the rights of the users who are allowed to read files so that they cannot do additional things such as print copies of the files or copy text from them. When people download files in an IRM-enabled list or library, the files are encrypted so that only authorized people can view them. This functionality works great if you are opening a SharePoint file on your desktop, but what happens if you want to access these SharePoint files on your mobile device? TITUS has introduced an iOS app that allow you to extend SharePoint IRM to iPhone and iPad devices.

A growing number of Mobile Device Management (MDM) vendors now offer secure document containers and direct access to SharePoint to allow users to view SharePoint documents on mobile devices. MobileIron offers their Docs@Work app and AirWatch has their Secure Content Locker. The problem with these apps, as well as the iOS and Android operating systems, is that they are not RMS aware. Read the rest of this entry »

The Sony Hack Highlights the Need for Classification, not Castlefication

December 24th, 2014

The way we do business has changed, which has data security professionals recently speaking a lot about data-centric security. With dispersed, global workforces and the proliferation of mobile devices, it is not possible to keep all of our sensitive data behind the “castle” wall. Data today must be shared, at least some of the time, outside of the citadel of the central network. Data-centric security solutions help organizations properly manage and protect data throughout its lifecycle. If Sony Pictures Entertainment had implemented a data-centric security approach, they likely would not have suffered as severe a breach.

So what is data-centric security? One way to look at data-centric security is to consider it as “data encryption”. Read the rest of this entry »

Involving Your Users in 2015

December 11th, 2014

Recently, CIO Online ran an article by Thor Olavsrud entitled, ‘5 Information Security Trends That Will Dominate 2015’. The trends ranged from the growing prevalence of cybercriminals, to the increasing regulation around the collection, storage and use of information, to the continuation of BYOD trends in the workplace and the need for organizations to develop strong policies around this. Read the rest of this entry »

Enforcing RMS usage … automatically!

November 10th, 2014

Having just returned from an RMS User Group meeting in Dusseldorf, Germany, where multiple Microsoft partners and customers were in attendance, writing about classification capabilities combined with RMS is a no-brainer.
Read the rest of this entry »

Search:
Delivered by FeedBurner