The TITUS team is on the road again this week. We’re excited to be in San Francisco to take part in Dropbox Open – an event which brings together tech leaders, Dropbox partners, and product experts. Attendees will learn how innovative companies are making collaboration simple and flexible by tapping into a network of over 8 million businesses and 2 billion connections through Dropbox. (more…)
Archive for the ‘Uncategorized’ Category
With so many metrics focused on the “cost of a data breach” as well as how much money is spent on data security, is it crazy to think that boards of directors will begin asking for financial statements around data value in the next couple of years?
The concept of placing value on your data is not new – analysts have been talking about infonomics and information valuation for a while now. In fact, it just appeared on a recent Gartner hype cycle which suggested infonomics will take 5 to 10 years to plateau. However, with the pressure on organizations to build a strong culture around data security, I would argue we are going to see the need for data value statements within the next 2-3 years.
TITUS to Showcase Real-Time Insider Threat Protection at Intel Security’s FOCUS ’15 Security ConferenceMonday, October 26th, 2015
TITUS is once again a sponsor of the Intel Security (formerly McAfee) FOCUS Security Conference, taking place in Las Vegas this week. It might be hard to top our presence last year, especially after being named SIA Partner of the Year for 2014, but we’re sure going to try!
TITUS will be demonstrating how our data classification solutions integrate with McAfee’s Data Exchange Layer (DXL) and Threat Intelligence Exchange (TIE) solution for real-time analysis, alerts, and instant remediation when user activity is deemed suspicious or dangerous. (more…)
I love the Gartner Hype Cycle, it’s one of my favorite things about working in the software industry. For anyone who hasn’t seen a Gartner Hype Cycle it looks like this:
Now I’ve never seen any statistical proof that new technologies progress from a “Innovation Trigger” through the “Peak of Inflated Expectations” and the “Trough of Disillusionment” before climbing the “Slope of Enlightenment’ and arriving at the “Plateau of Productivity”. But if you’ve been around a while, and seen technologies come and go, it seems true. Stephen Colbert might claim it has “truthiness”. It’s a lot like that old joke about the 7 stages of a software project:
Wouldn’t it be great to say there is one product, from one vendor, that can protect all of your data? The reality, however, is that you need a security ecosystem and framework to protect your most valuable data assets. Forrester Research Inc. has developed a Data Security And Privacy Playbook which helps organizations build the framework they need to protect sensitive information. (more…)
The June 2015 issue of SC Magazine features a “Data Classification and DLP Group Product Test”. TITUS Classification Suite received a 5 star rating and is SC Magazine’s Recommended Product!
The TITUS team is on the move again – this time we’re heading to London for Infosecurity Europe 2015, taking place from June 2 to 4 at Olympia, London.
On Tuesday, June 2 at 10:00am, join Laurent Porracchia, CIO at Safran Morpho and Stephane Charbonneau, CTO at TITUS, for a presentation in the Strategy Talks theatre on, “Overcoming Insider Threats to Intellectual Property.” They will review the challenges and strategies that Morpho has used to manage insider intellectual property breaches, and how these same strategies can be applied to your organization. (more…)
Insider threats are a serious issue for any organization. In a survey conducted by Osterman Research in February 2015, we found that during the previous 12 months 26% of organizations have had sensitive or confidential information accidentally or maliciously leaked through email, 8% had experienced data leakage through a cloud-based tool, and 5% had experienced it through social media. Adding to the problem of data exfiltration are issues like phishing and malware installed from simple activities like Web surfing or accessing email: the same survey found that 67% of organizations were victims of malware infiltration from a successful email-based phishing attack, while 63% were victims of malware infiltration through employee Web surfing. (more…)