Research Library

Powered by

All Research Sponsored By:TITUS

  • Large Canadian Financial Institution Enhances Data Protection Strategy

    When sensitive information gets into the wrong hands, the costs can be severe. Using techniques such as data classification and content validation can help you mitigate data loss. In this case study, learn how one of the largest Canadian financial institutions did this with TITUS Classification.

  • TITUS Times: The Politics of Data Protection

    Most breaches that occur at the end user level aren’t malicious. The ideal security strategy addresses people, processes and policy with serious consideration given to the end user. So, rather than dictate policies, involve your end users as you develop your security strategies. Discover why it is critical to focus on the end user’s point of view.

  • Titus Accelerator for Privacy

    Privacy and data protection solutions can be cumbersome, ineffective, and costly. But yours doesn’t have to be. In this solution brief, see how Titus Accelerator for Privacy offers an effective way to reduce risk at your organization.

  • Hype Cycle for Privacy, 2019

    Privacy as a fundamental human right has in the recent year been operationalized in sweeping regulatory changes across the world. In this Gartner Hype Cycle, explore international regulatory developments and technologies that help protect personal data.

  • The Titus Times: The CEO & CTO

    In this e-magazine, learn about the roles of the CEO and the CTO and delve into how their concerns around data protection overlap – as well as where they diverge. Also, learn how to overcome discrepancies to build a strong data protection strategy.

  • Seamless Transition to CUI Markings

    While it is critical to set standardized controls for the way information is handled, the process of implementing CUI markings is complex, time-consuming, and sometimes unclear. In this solution brief, learn how Titus data protection solutions can help organizations to ensure they meet CUI requirements.

  • The Vital Role of Security in Digital Transformation

    A survey conducted by Market Strategies Internal showed that 78% of ITDMs believe that the success of their digital transformation relies heavily on strong IT security and data protection. In this research report, explore 2 different security professional personas and explore how they view digital transformation, security and data protection.

  • Titus Military Classification for NATO Security Compliance

    In recent years, intelligence and military communities have begun to embrace the need for sharing critical information with allies. In this solution brief, learn how Titus provides a common classification and policy solution that enables information-sharing in a way that minimizes the risk of compromise.

  • NIST SP 800-171 and CUI

    NIST Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, requires all current U.S. Department of Defense contractors to be compliant with DFARS Part 252.204-7012. In this solution brief, learn how Titus can help contractors comply with these requirements.

  • The California Consumer Privacy Act of 2018

    In this solution brief, discover more about how TITUS enhances CCPA compliance and its solution features and benefits.

  • Smarter Data Protection with Machine Learning

    Protecting sensitive data is critical, but it can be difficult to achieve without first enhancing how data is kept. Many organizations struggle to accurately identify complex data as it moves throughout workflows. In this white paper, learn how machine learning offers a way for organizations to better protect their sensitive data.

  • TITUS Intelligent Protection

    TITUS Intelligent Protection, powered by machine learning can provide organizations with a practical approach for enhancing their data protection program. Read on to learn more about the benefits of TITUS Intelligent Protection today.

  • Access & Protect Your Data – Anywhere, Anytime

    The explosion of data and complexity of regulatory governance have made data protection a moving target. In this white paper, learn how TITUS and Dataguise bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable data wherever it resides.

  • TITUS Military Classification Tool

    In this resource, learn about the TITUS Military Classification tool which is an easy-to-use classification and policy enforcement tool that ensures all Microsoft emails and documents are classified and protectively marked before they can be saved, printed or emailed.

  • TITUS Changes Tack, Places Big Bet on Machine-Learning-Based Classification

    One of the primary reasons data security is less adopted than other security areas is that it can be complex, and often places a burden on users in terms of changes to workflows. In this white paper, learn how TITUS Intelligence Protection (TIP) with machine-learning-based classifications can greatly reduce the need for user involvement.

  • Can You Handle Your Data?

    The modern world is swimming in data, with no signs of that changing any time soon. Threats to the security of all this data have grown in number and sophistication, meaning data regulations are more complicated than ever. In this white paper, learn how organizations can improve information handling practices to better protect their sensitive data.

  • The Moray Council Secures SharePoint Data with TITUS

    This brief white paper details a SharePoint security system that protects your content while also allowing easy access to those who are authorized.

  • TITUS Meets SharePoint Security Needs of Document Management System of Turkish Prime Minister's Office

    Read this white paper to discover how the Turkish Prime Minister's office implemented a secure SharePoint system to protect-- yet keep their content accessible to those authorized to use it.

  • Effectively Manage Permissions in Microsoft SharePoint 2010

    This white paper details security permissions of SharePoint. Read on to learn how you can apply security permissions  to sensitive content in SharePoint and further you understanding of fine grained permissions within SharePoint without affecting business operations.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.