Hi [[ session.user.profile.firstName ]]

TITUS

  • Date
  • Rating
  • Views
  • Overcoming Two Biggest Obstacles Effective Data Centric Security
    Overcoming Two Biggest Obstacles Effective Data Centric Security TITUS Recorded: Jul 10 2017 59 mins
    The first problem is that organizations don’t really know where their sensitive data is – because their data is pretty much everywhere: on premise, in the cloud, and on a diverse range of platforms and devices. The second difficulty is ensuring people and processes make the right decisions about how data should be handled. Both of these challenges need to be addressed before it is possible to make decisions about the various technical means for data protection. (e.g., access controls, monitoring, encryption, rights management)

    Listen to this webcast and you will learn how to:

    1) Discover your data at rest, and intercept your data in motion
    2) Analyze both your data and your user behaviors to monitor trends, and to identify areas of risk
    3) Classify your data, and refine policies for how it should be protected
    4) Implement mechanisms to allow people and processes to make better day-to-day decisions on how data should be handled
  • Security with Increased Productivity and Usability
    Security with Increased Productivity and Usability TITUS and McAfee Recorded: Jul 10 2017 56 mins
    To address insider security threats, many organizations deploy data loss prevention (DLP) solutions. Often, the scope of the process and policies are overwhelming to accommodate every scenario. Administrators quickly find it impossible to accurately identify every type of sensitive document, as well as predict the behavior of every type of user. As a result, some businesses deploy their DLP systems in “watch-mode”, where they monitor for behavior, but don’t realize the true benefits of actually preventing data loss.

    McAfee DLP will quickly reach its full potential by leveraging TITUS Classification metadata to set active DLP policy. Join TITUS and McAfee for a discussion about:

    1) Why it is crucial to include users as the first line of defense
    2) How DLP, NDLP, and ESM leverage TITUS
    3) The role of TITUS Classification in the DLP architecture
  • Extending Classification to Protect Sensitive Data in the Cloud
    Extending Classification to Protect Sensitive Data in the Cloud 451 Research and TITUS Recorded: Jul 7 2017 58 mins
    As organizations look to embrace the benefits of cloud collaboration, defining the sensitivity of information is critical. The combination of TITUS Classification and Netskope’s cloud access security broker (CASB) solutions enables enterprises to embrace the cloud while ensuring sensitive information is protected.

    Listen to 451 Research, Netskope and TITUS and discover how to:

    1) Increase security awareness and accountability
    2) Control and govern cloud usage
    3) Distinguish between personal and enterprise app instances
    4) Protect sensitive data in the cloud
    5) Improve insider threat detection and response
    6) Protect against cloud-borne malware, including ransomware
  • Top Four Recommendations to Enhance Your Data Security Strategy
    Top Four Recommendations to Enhance Your Data Security Strategy Forrester and TITUS Recorded: Jul 6 2017 60 mins
    Join guest speaker John Kindervag, VP and Principal Analyst at Forrester Research, Inc., and Stephane Charbonneau, CTO at TITUS, where we will discuss the top four recommendations for a successful data security strategy.

    Learn about:

    1) Understanding and knowing your information
    2) Identifying and defining your data
    3) Taking a multilayered approach to security
    4) Effectively communicating with employees

    View it today.

    TITUS Website: www.titus.com
  • TITUS - Building a Case for Data Classification in Healthcare
    TITUS - Building a Case for Data Classification in Healthcare TITUS and Sienna Group Recorded: Jul 6 2017 55 mins
    The volume of sensitive data spanning healthcare organizations is large and growing at an increasing rate. This is a fast paced environment where patient data (PHI, PII) and intellectual property (IP) can easily be sent to unauthorized recipients, putting this sensitive information at risk.

    Join John Ford, CEO of Sienna Group, former Chief Privacy Officer at WellCare Health Plans, and TITUS for an upcoming webinar where we will discuss the specific challenges facing healthcare organizations today, and why data classification is the foundation in helping them achieve information protection.
  • Protect Your Data: How to Stop Data Leaking Out of Your Enterprise
    Protect Your Data: How to Stop Data Leaking Out of Your Enterprise 451 Research, SAFRAN Morpho and TITUS Recorded: Jul 6 2017 59 mins
    Explosion of unstructured data and de-perimeterization now makes it easier for sensitive data to be shared across the organization – at any time, in any place, from any mobile device. Some unstructured data is sensitive (PII, IP, ITAR) andmust be handled more carefully due to legal restrictions, and to prevent the risk of loss or exposure.

    Join 451 Research, SAFRAN Morpho and TITUS for a discussion which will touch on:

    1) Major risk points for information leaks
    2) Best practices for building a data security plan
    3) Case study and practical advice from SAFRAN Morpho
    4) Techniques to increase end user security awareness
    5) How classification can play a key role in your data protection initiative
  • How Provident Bank Transformed Their IP Strategy
    How Provident Bank Transformed Their IP Strategy TITUS Recorded: Jul 5 2017 60 mins
    Learn how Provident Bank involves their end-users in data classification for protecting their valuable information.
  • Transform Your Security Culture to Enable Digital Transformation
    Transform Your Security Culture to Enable Digital Transformation Forrester and TITUS Recorded: Jul 5 2017 40 mins
    Successful digital transformation requires organizations to keep up with an unprecedented pace of change. There is an ever increasing need and ability to share information - but this also brings new risks and challenges.

    Join Forrester Research and TITUS in this On Demand Webinar as they discuss strategies and solutions to help your organization embed positive information security behaviors in your employees, helping reduce the risk of information loss while simultaneously growing your business.
  • TITUS and Forrester Webcast: Tackle Your Insider Threat
    TITUS and Forrester Webcast: Tackle Your Insider Threat Forrester and TITUS Recorded: Jul 5 2017 62 mins
    Listen to Forrester and TITUS to learn how you can sharpen your security edge by implementing tools to identify sensitive information, developing policies that protect data, and running reports that help recognize and prevent internal threats.

    Learn how to:

    1) Accurately identify the sensitivity and value of corporate information
    2) Prevent inadvertent data leaks and detect insider threats
    3) Create policies and metrics that matter
    4) Establish a culture of security and privacy throughout your organization
  • Wynn Resorts Transformed Their Information Governance Strategy
    Wynn Resorts Transformed Their Information Governance Strategy TITUS and Wynn Resorts Recorded: Jul 4 2017 57 mins
    Today, 80% of data is unstructured, and it’s doubling every two years . Your organization’s unstructured information is comprised of emails, documents, and other file types, and is saved to computers, mobile devices, the cloud, everywhere. So how do you go about securing your most important electronically stored information (ESI), mitigating risk, controlling costs, and reducing data loss if you don’t know what data you have and where it is?

    With data growing exponentially and increasing demands being placed on how to regain control of this data, information governance is transforming the way we do business. The default strategy of “let’s keep everything” has led to soaring storage costs, high legal costs in lawsuits, a heavy burden on IT for eDiscovery requests, and increased risk that sensitive data will get lost in the data chaos.

    Join David Tyburski, Global Director of Information Security at Wynn Resorts and Lara Bender, Sr. Product Marketing Manager at TITUS, to learn how a proactive Information Governance Strategy:

    1) Drives down costs, mitigates risk, and prevents data loss
    2) Enhances eDiscovery – Easily find relevant information for legal, compliance and regulatory requests
    3) Enables Defensible Deletion – Get rid of information as it goes from asset to liability
    4) Starts with your users – Gain control over data at time of creation

Embed in website or blog