Archive for ‘Classification’

TITUS and Palo Alto Networks

Tuesday, June 20th, 2017

We at TITUS are excited about our new partnership with Palo Alto Networks and the value we will bring to organizations together.  Recognized as a leader in the Next-Generation Firewall market, Palo Alto Networks and TITUS integrate to enable secure sharing of sensitive information throughout the enterprise. Once a document has been classified by TITUS, Palo Alto Networks firewall can leverage our classification metadata to prevent data loss across email, the data center, and on insecure systems/managed devices.

For more information about the integration, visit the integration page on our website, and read our joint solution brief that further describes the integration value.




Turn Your Users Around

Wednesday, March 29th, 2017

It’s been a long time coming, but the mandatory breach notification laws will be in force in Australia next February (Privacy Amendment (Notifiable Data Breaches) Act 2017). Having seen similar regulations in effect in North America, and with the knowledge that they’re also coming to Europe next year in the form of the EU GDPR, it is impossible for any business to ignore the issue of data security. Organizational change is necessary across the globe.

I was recently in Australia, and the new legislation was a very hot topic in meetings with both existing partners and new customers, bringing up a multitude of questions. From a general perspective, it’s fantastic that more and more organizations are wising up to security (and there are countless surveys to back this up), but from our experience, most seem to be struggling with the myriad of different ways to protect their data and the persistent threat of breaches.




TITUS to Provide Solutions to NATO Agencies around the World

Tuesday, February 28th, 2017

TITUS and the NATO Communications and Information Agency (NCIA) recently signed a joint Master Service Agreement (MSA) that enables TITUS to supply our solutions to NCI Agency, NATO Member Nations and other NATO entities.

Cybersecurity is a major area of concern for NATO, and is considered the fourth domain of operations after air, land and water. NATO and its member agencies know that they need to be prepared to defend networks and operations against the increasingly sophisticated cyber threats and attacks.




Building Trust

Wednesday, January 18th, 2017


At a recent internal event, two of our large enterprise customers spoke to the entire TITUS team about the value of our products within their organization. What hit me most was how often they used the term ‘Trusted Partner’.

TITUS is grounded in the belief that building a trusted partner relationship with our customers is just as important as the products that we support. This begins by highlighting the experience and knowledge we possess which will make their data classification journey a success. However, just saying it is not enough. The TITUS Deployment Methodology, which our customers can reference from their initial deployment through future evolution and expansions, gives customers direct access to our vast experience and knowledge.




Protecting Information in a Multi-Cloud World

Wednesday, January 11th, 2017


Around our office there is a lot of talk about “hybrid Cloud” as we help our customers create strategies to safely migrate from on-premise to cloud storage and applications. A hybrid cloud strategy provides both flexibility and peace of mind, enabling organizations to ease into utilizing the Cloud at their pace. The actual challenge however is not finding the right balance between on-premise and the Cloud, but coping with the multitude of cloud options.





Wednesday, November 16th, 2016


We often talk to our customers and prospective customers about the various benefits of using classification, such as stopping the malicious insider, ensuring your sensitive information is secure, keeping internal information from inadvertently leaking, and many more.

But, what about the basics? What about the dreaded ‘reply all’?

Generally, we think about ‘reply all’ incidents as a source of embarrassment and potentially an information leak. But not every ‘reply all’ scenario impacts your reputation. I’m talking about the scenario of hitting reply all…and there are 840,000 colleagues on the distribution list. Uh oh…

Reply All Banner



TITUS Classification for Box Governance

Thursday, October 20th, 2016


As enterprises embrace a digital transformation strategy, they are innovating how they collaborate with and share data. Leading this charge for enterprises around the world is Box, and today TITUS is excited to be one of the partners included in their journey with security classification for Box Governance!





Enhancing Insight with Third Party Reporting

Thursday, October 13th, 2016


My colleague Libby Robinson recently provided an overview of the benefits and insights built-in TITUS reports can provide. However, during my 16-year career in security & analytics, I have also come to appreciate working with a dedicated data reporting system. If you are like me, you enjoy having the flexibility to precisely control reporting logs in order to present the data exactly the way you want using your preferred tools. TITUS recognizes that there are not only “do it yourselfers” like me, but also different SIEM, business intelligence and insider threat detection systems that organizations rely on. TITUS log data provides unique insights into how users are working with your most sensitive information – so feeding this data into third party reporting systems will provide your organization with insights not otherwise available.




The Many Benefits of Built-in Reporting

Friday, October 7th, 2016


Part of the preparation to purchase any software requires some requirements analysis. What am I hoping to get from this? What benefits am I looking for? We go through RFIs, RFPs, POCs, and diligently map our requirements to the solution before making our decision.

But, once purchased and put into place, how do you measure the effectiveness of your investment?

The end goal of implementing a data classification solution is to help ensure that your sensitive data is secure and that both users and automated processes make the right sharing and handling decisions. The ability to monitor the usage of your classification solution (the trends in user behavior, the success of deployment, the machine health) is vital to ensuring you are getting the most out of your investment.




How to Overcome Obstacles to Effective Data Security with Data Classification

Thursday, September 29th, 2016


So, you’ve identified that your information is at risk of being lost or stolen – now what? The most common reaction is to rush the selection and implementation of some kind of technical control(s) to eliminate the risk.

Derek Brink, VP and Research Fellow at Aberdeen Group, points out in his recent report that this “bias towards action” often overlooks two critical components for securing information: identification of data and the definition of clear data handling policies.