I recently decided to switch from my iPhone to an Android device (LG G4). It wasn’t system functionality that made me switch to Android, but the price (and the ability to swap batteries). However, I now have to face the fact that I have lost some of the functionality I was used to, and some of the apps I used daily. For organizations that have a bring-your-own-device (BYOD) policy like TITUS does, it is important that your business apps support key functionality across platforms.
Archive for the ‘Classification’ Category
In the few short years I have been with TITUS, I have experienced a transition from having to educate organizations about “why classification is important” to explaining how TITUS will make their classification initiative a success. With the rapid growth in the classification market comes some fun dynamics such as new competition, new partnership opportunities and even new ways of looking at the definition of what data classification means.
Data classification was recently added on two different Gartner hype cycles: Information Governance, and Data Security. This suggests there are many ways that vendors position data classification solutions, which can create confusion for those looking to classify their data. Knowing your data is foundational to both information governance and data security; the challenge is knowing if the classification solution you are considering meets both your immediate and future requirements.
We’re looking forward to more fun and excitement this week at Infosecurity Europe. TITUS will be presenting, partnering, exhibiting (Stand S50), and generally keeping ourselves as busy as possible! Partners, customers and attendees will have plenty of opportunities to meet with TITUS and learn how our data discovery and classification solutions can help you protect your most sensitive information.
We all have one… that place in the house or garage that becomes the container of last refuge (or even refuse) for those items we should file in the right place but we haven’t quite gotten around to doing that yet. It could contain an old credit card, some bits of string, important mementoes or other innumerable items that you just don’t know what to do with but somehow can’t throw away. For me, it’s my ‘Man Drawer’—my little haven in the kitchen that much to my wife’s annoyance I don’t allow her to touch, let alone clean-up! I’m not quite sure what’s in it, what’s valuable, what I really should throw away or what I should put in a safer location. It just sits there as the place I stuff things into, and the first place I look when I can’t find something I need.
Quantum computing promises to be the most profound advance since the invention of electronic computers in the 1930s. Perhaps one could say even since the invention of Babbage’s first mechanical computer in the 1830s because quantum computing offers an fundamentally new paradigm of computing itself.
The idea of quantum computing was brought forth in 1982 by renowned physicist Richard Feynman. He proposed that the superposition principle of quantum physics could be used to create “qubits” (quantum bits) that held different states simultaneously in contrast to regular binary computers in which each bit is only ever either on or off at any point in time. This superposition phenomenon means that quantum computers can be vastly more powerful than binary computers, able to perform some types of calculations in seconds that would take years otherwise, and thus they have unprecedented ramifications for technology and society. (For more details, this excellent video from Microsoft provides a gentle introduction to the physics and potential of quantum computing.)
It is a long held view by data classification advocates that the best people to classify data are the end users. After all, they’re the ones who know the content and understand how the data is to be used, right? Yet, some data breaches still happen because users are simply not aware of how sensitive the data truly is, or they don’t fully understand the consequences that disclosure of the data may have to the organisation.
One of the top reasons that customers purchase TITUS Classification Suite is to provide a tool to reinforce their data security education and awareness programs. The user-driven classification approach can be effective as long as your users understand the meaning of the classification labels they are assigning, as well as the definition of sensitive information in the context of your business. (more…)
We’ve all been there; heart racing, palms sweating, and gasps of remorse while frantically pressing the email recall button and praying you haven’t done what you think you have just done. You guessed it, I’m talking about the “oops” email – the email that you should not have just sent. The email that could cost you your job, your reputation and a sizable amount of regret!
Suggesting that IT is responsible for protecting today’s data is like suggesting a car dealership is responsible for the safety of drivers. Ultimately, you can buy a car from a dealership, but it’s your responsibility to be safe and avoid accidents. IT alone can’t cover the “oops” email or any other user blunders. As we move forward in a world where users are responsible for creating and handling an organization’s most important asset – data – it’s imperative to make users aware of their responsibility. After all, users are often much more aware of the sensitivity of a file than a machine can be.
I hear you asking: “Why is it my responsibility when we have all these great security systems?”
This weekend the latest superhero movie will open – pitting the two most popular superheroes of them all against each other: Batman versus Superman. In the film, Batman, the regular guy fighting the good fight with only his personal strength, wits, and a few gadgets, faces off against Superman, the almost limitlessly powerful alien. It is an interesting battle which I find parallels the argument between those that support user-driven, manual classification (Batman) and those that swear that only machine generated automatic classification (Superman) should ever be used.
In the business world, our “superheroes” consist of technologies that help us manage and protect data from the moment it is created to the day it is finally deleted. It would be great if we actually didn’t need superheroes to fight crime, but crime is a fact of life we cannot escape. Criminals are actively trying to steal our data and we need to protect it, be that preventing inadvertent data breaches, protecting data when shared outside our home perimeter, or safely disposing of data when it becomes a liability. So, in the battle of “Batman” versus “Superman,” who do you choose?