Archive for the ‘Uncategorized’ Category

Live from RSA 2015 – TITUS Launches Classification Suite 4

Tuesday, April 21st, 2015

RSA 2015 started off with a bang last evening for TITUS. Great crowds at the TITUS booth (1215), and lots of people interested in learning more about our information classifications solutions. Today will be an even bigger day for TITUS at RSA as we officially launch TITUS Classification Suite 4, a significant new release of our flagship data identification and information protection suite. (more…)

Data Classification Key to Effectively Protecting Information in the Financial Services Industry

Friday, March 6th, 2015

For financial services organizations, protecting their customers’ sensitive information is a top priority. When sensitive financial information is breached, fines, lawsuits, and embarrassing headlines are just a few of the many consequences that can occur. (more…)

TITUS Named One of the ‘500 Hot Cybersecurity Companies to Watch in 2015’

Tuesday, February 24th, 2015

We were pleased to learn last week that TITUS has been named to the Cybersecurity Ventures first annual list of top 500 Hot Cybersecurity Companies it Watch in 2015. TITUS was ranked 167 on the list, placing it firmly in the top half of list of cybersecurity companies to watch in the coming year.

According to the press release from Cybersecurity Ventures, they “selected thousands of potential companies for inclusion in the Cybersecurity 500 by soliciting feedback from CISOs and end-user security practitioners, researching hundreds of cybersecurity events, and researching dozens of cybersecurity news sources”.

Their selection criteria included a number of factors including security problems solved by the company/software; customer base; feedback from CISOs and decision makers; feedback from IT security evaluators and recommenders; company growth; media coverage; and more.

Remarked TITUS Co-Founder and CEO Tim Upton, “We are pleased to be among such an impressive group of international security companies as the ones included on this list. For over a decade, TITUS has been developing information security solutions that are being used in some of the largest and most reputable enterprises around the world. Our customers know the importance of accurately identifying and classifying their information in order to effectively protect it, and we are seeing significant growth as more and more organizations realize the importance of information identification and classification as a way to increase the effectiveness of their existing security infrastructure.”

Involving Your Users in 2015

Thursday, December 11th, 2014

Recently, CIO Online ran an article by Thor Olavsrud entitled, ‘5 Information Security Trends That Will Dominate 2015’. The trends ranged from the growing prevalence of cybercriminals, to the increasing regulation around the collection, storage and use of information, to the continuation of BYOD trends in the workplace and the need for organizations to develop strong policies around this. (more…)

Enforcing RMS usage … automatically!

Monday, November 10th, 2014

Having just returned from an RMS User Group meeting in Dusseldorf, Germany, where multiple Microsoft partners and customers were in attendance, writing about classification capabilities combined with RMS is a no-brainer.
(more…)

Looking for a secure solution for mobile email and documents?

Tuesday, October 7th, 2014

You know that a great many of your employees are working from their mobile devices – viewing and responding to email, reading attachments and forwarding them on. As Forrester analyst Chris Sherman noted in a report earlier this year, “On average, 15% of employees are accessing sensitive data such as customer information, non-public financial data, intellectual property, and corporate strategy from devices other than work laptops and desktops. Employees are continuing to use their personal devices to view confidential business information.” (more…)

Can you defend your decision to delete data?

Monday, July 14th, 2014

Can you defend your decision to delete data your organization no longer requires? That’s a critical question that every organization must address at some point.

MOST CONTENT SHOULD BE DELETED
A 2012 survey conducted by the Compliance, Governance and Oversight Counsel found that data can be placed into one of four “buckets”:

• At any given time, 1% of data must be retained for litigation holds
• 5% of data must be retained because of regulatory obligations
• 25% of data has some level of business value
• The remaining 69% of data has little or no business value

Consequently, more than two-thirds of data can be safely deleted with little or no consequence. (more…)