• General Inquiries +1 613 820 5111
  • North America Toll Free +1 866 530 5111
  • Europe Toll Free +800 6006 6006
  • APAC HQ (Australia) +61 1800 764 459
  • Singapore Toll Free 8001013348
Data protection concept image: person working on various devices with illustrated virtual locks

Why “good enough” is no longer a data protection strategy

by Corey Markell

I recently attended the Spark User Group in Boston, Massachusetts, hosted by Palo Alto Networks. During this one-day session, attendees were encouraged to network, collaborate and learn more about the state of the security software industry. While there were many important updates shared with the group of cybersecurity professionals throughout the day, the overall message was exactly this: Traditional security methods aren’t enough to combat security breaches that companies now face on a daily basis. In other words, “good enough” is no longer good enough when it comes to protecting your data.

John Kindervag, the field CTO at Palo Alto Networks opened up the day with a talk about the future of cybersecurity and the evolution of the Palo Alto Networks platform. He concluded that traditional methods aren’t working and stressed the importance of starting with what you’re protecting when developing a cybersecurity strategy. That starting place is all about the data and user interaction with that data – confidential, sensitive information that they create, access and share on a daily basis.

Identify, classify and secure data with user input and automation

Another theme of the event was using automation, when possible, to build an effective, efficient security platform. Enabling a combination of user-driven and automated practices is both a practical and effective approach to identify sensitive information stored in data repositories. And once data is located and identified, you can automatically apply or suggest classification to the file, document, email before sharing internally or externally. 

This three-step process of identifying, classifying and securing data is fundamental to the approach TITUS and Palo Alto Networks take to provide a complete data protection solution for customers. 

TITUS + Palo Alto Networks: better than “good enough” to protect your data

If organizations start the process of building a security ecosystem with the data they need to protect, it’s easy to see the combined value offered by Palo Alto Networks integration with TITUS. With the TITUS Classification Suite, organizations can designate email and file classifications (e.g., confidential, internal). Once a document has been classified, persistent metadata is applied to it so that the classification stays with the document at all times. And TITUS Intelligent Protection gives organizations powerful automation capabilities through the use of trained models. 

Combined with the data filtering features of the Palo Alto Networks' next-generation firewall, administrators and Aperture CASB then have a powerful solution for identifying and controlling the flow of sensitive data within their networks and in the cloud based on the email/document classification provided by TITUS. 

Palo Alto Networks’ next-generation firewall leverages TITUS classification metadata to prevent data loss via email, at the data center, through insecure systems and unmanaged devices. It is a strong partnership with a value proposition that addresses what companies need today: to effectively enable data protection.

To learn more about how TITUS and Palo Alto Networks can enhance your security ecosystem, download our solution brief.

*****

Corey Markell is director, strategic partnerships for TITUS. He’s responsible for building and maintaining meaningful technology partnerships that create new opportunities and value for TITUS customers.