Archive for ‘Classification’

AAAAAAHHHHH…NOT REPLY ALL!!!?

Wednesday, November 16th, 2016

nicole_baker-ns

We often talk to our customers and prospective customers about the various benefits of using classification, such as stopping the malicious insider, ensuring your sensitive information is secure, keeping internal information from inadvertently leaking, and many more.

But, what about the basics? What about the dreaded ‘reply all’?

Generally, we think about ‘reply all’ incidents as a source of embarrassment and potentially an information leak. But not every ‘reply all’ scenario impacts your reputation. I’m talking about the scenario of hitting reply all…and there are 840,000 colleagues on the distribution list. Uh oh…

Reply All Banner
(more…)

 

 

TITUS Classification for Box Governance

Thursday, October 20th, 2016

mark_cassetta-ns

As enterprises embrace a digital transformation strategy, they are innovating how they collaborate with and share data. Leading this charge for enterprises around the world is Box, and today TITUS is excited to be one of the partners included in their journey with security classification for Box Governance!

box_blog-image

(more…)

 

 

Enhancing Insight with Third Party Reporting

Thursday, October 13th, 2016

scott_masson-ns

My colleague Libby Robinson recently provided an overview of the benefits and insights built-in TITUS reports can provide. However, during my 16-year career in security & analytics, I have also come to appreciate working with a dedicated data reporting system. If you are like me, you enjoy having the flexibility to precisely control reporting logs in order to present the data exactly the way you want using your preferred tools. TITUS recognizes that there are not only “do it yourselfers” like me, but also different SIEM, business intelligence and insider threat detection systems that organizations rely on. TITUS log data provides unique insights into how users are working with your most sensitive information – so feeding this data into third party reporting systems will provide your organization with insights not otherwise available.

Reporting
(more…)

 

 

The Many Benefits of Built-in Reporting

Friday, October 7th, 2016

libby_robinson-ns

Part of the preparation to purchase any software requires some requirements analysis. What am I hoping to get from this? What benefits am I looking for? We go through RFIs, RFPs, POCs, and diligently map our requirements to the solution before making our decision.

But, once purchased and put into place, how do you measure the effectiveness of your investment?

The end goal of implementing a data classification solution is to help ensure that your sensitive data is secure and that both users and automated processes make the right sharing and handling decisions. The ability to monitor the usage of your classification solution (the trends in user behavior, the success of deployment, the machine health) is vital to ensuring you are getting the most out of your investment.

stats_blog-image2
(more…)

 

 

How to Overcome Obstacles to Effective Data Security with Data Classification

Thursday, September 29th, 2016

anca_ciuvar-ns

So, you’ve identified that your information is at risk of being lost or stolen – now what? The most common reaction is to rush the selection and implementation of some kind of technical control(s) to eliminate the risk.

Derek Brink, VP and Research Fellow at Aberdeen Group, points out in his recent report that this “bias towards action” often overlooks two critical components for securing information: identification of data and the definition of clear data handling policies.

email-banner-webinar-aberdeen
(more…)

 

 

A Culture of Security Across Generations

Tuesday, September 27th, 2016

craig_adams-ns

In the words of Bob Dylan, perhaps one of the most insightful of the 1960s’ poet-musicians “the times they are a-changin’”. The generation he was speaking to then are now today’s retirees. And as one generation moves out of the workforce, another generation is recruited.

The latest generation of employees is generally referred to as “Generation Y” or the “Millennials.” Typically defined as those born after 1979, they are our first truly digital generation, completely at home with the internet, mobile and new modes of working. These are the new graduates, apprentices, office workers and manual labourers that have been joining your workforce for the past 15 years. Millennials have also been referred to as the “echo boomers” due to the huge size of their generation – 16% larger than the boomers. By 2020, it’s estimated that millennials will form almost 50% of the global workforce, and 75% by 2025.

millenials_blog-image
(more…)

 

 

Introducing Classification for Mac, offering the broadest Outlook coverage on the market

Wednesday, September 14th, 2016

libby_robinson-ns

TITUS is excited to announce the addition of Outlook for Mac to our Classification for Outlook offering!

Email is everywhere.  It’s across various platforms and devices, even within a single organization.  While the majority of users may still be on Windows based computers, more and more are beginning to choose Macs.

According to Aberdeen Research, 20% of organizations have enterprise email installations that include both Windows and Mac. In isolation, this number may not seem particularly large, but often these Mac deployments are on desktops where the most sensitive information resides – primarily executive offices, as well as designers and developers.

If your efforts to secure the information transmitted via email is limited only to certain members of your organization, you are risking breaches of either your own intellectual property (IP), or of PII, PCI or PHI.  You don’t want to spill your secret sauce, or face the possibility of loss of consumer trust, market share, or substantial fines.
(more…)

 

 

Your Security Ecosystem Isn’t Broken, It’s Missing Classification

Thursday, September 8th, 2016

erin_pullyblank-ns

Having worked in marketing within companies dedicated to security, I have had the privilege to read numerous reports on the struggles organizations face while trying to protect themselves from breaches and insider threats. The conclusions of these reports all point to the same thing: there is no silver bullet!

Most enterprises have made significant investments (money/time/technology/people) to secure their current environment and to foster programs that facilitate a culture of security. So, when asked to modernize your “legacy” security infrastructures or potentially “rip and replace” particular solutions, you find the idea to be inconceivable from a budgetary and skillset standpoint.

chain-imageblog
(more…)

 

 

The People, Process & Technology Triangle – Squared with Data

Wednesday, August 31st, 2016

craig_adams-ns

When I joined the IT industry 20 years ago, the theme ‘du jour’ was the People-Process-Technology triangle. It’s a powerful concept that enables organisations to assess and improve their operational efficiency and capability. But the triangle was a child of 90’s and at the dawn of the Information Age. Twenty years on we are in a new digital age, where existing industries are being transformed overnight through revolutionary business models, such as cloud sync and share and mobile-enabled services. To reflect this new reality, the triangle needs to be updated to a square in order to include the currency of our age: data.

triangle-imageblog

(more…)

 

 

The TITUS Experience

Friday, August 26th, 2016

bergen_wilde-ns

During a recent TITUS event, I had the opportunity to listen to a conversation between a deployed customer and another still in the planning phase that highlighted the classification challenges many organizations are facing. The questions being asked of the deployed customer weren’t technical ones, but focused on business transformation, such as:

  • How did you train your users on the meaning of the classification levels?
  • Would you recommend a full-fledged, single phase implementation or break it into several smaller phases?
  • How much did you choose to involve the workers in the application of classification at first?

meeting-blog

(more…)