TITUS Aware for Microsoft Outlook review
TITUS Aware for Microsoft Outlook is designed to stop email data leakage at the desktop, while educating and involving users at the same time. Does it achieve these commendable goals? Dave Mitchell thinks it's a remarkably simple solution to a serious problem.
Email data leakage is a constant worry for businesses but TITUS Aware (TA) takes a refreshingly new approach to this problem. Instead of rigidly enforcing DLP (data leakage prevention) policies it engages Microsoft Outlook users in the process of reviewing their emails and rectifying those that violate security policies.
The only other requirement on each client is a couple of registry modifications to point it at the location of the TA policy files. We manually edited our clients' registries, but this can also be done via Group Policies for larger user bases.
An Administration Tool is provided to create and manage all policies. Each policy uses a proprietary file which contains settings that determine how the TA client component should behave and links to sets of XML content validation files.
All the control and XML files can be stored in a central location on the network. They are then tied to each client by their respective registry entries. This allows a variety of policies to be assigned to different groups and XML files can be shared where a base set of content validation checks is applied to multiple groups.
The XML files store a specific set of content validation criteria which makes TA very versatile. You can use them to store lists of restricted external mail domains and countries, permitted mail domains, attachment controls and mail content checks.
TA offers a good range of controls over mail attachments as it can apply size restrictions and only allow certain file types to be sent. More importantly, it can scan the message subject and body plus the contents of attachments looking for keywords and phrases.
In This Article
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now