TITUS Aware for Microsoft Outlook review
TITUS Aware for Microsoft Outlook is designed to stop email data leakage at the desktop, while educating and involving users at the same time. Does it achieve these commendable goals? Dave Mitchell thinks it's a remarkably simple solution to a serious problem.
Email data leakage is a constant worry for businesses but TITUS Aware (TA) takes a refreshingly new approach to this problem. Instead of rigidly enforcing DLP (data leakage prevention) policies it engages Microsoft Outlook users in the process of reviewing their emails and rectifying those that violate security policies.
The only other requirement on each client is a couple of registry modifications to point it at the location of the TA policy files. We manually edited our clients' registries, but this can also be done via Group Policies for larger user bases.
An Administration Tool is provided to create and manage all policies. Each policy uses a proprietary file which contains settings that determine how the TA client component should behave and links to sets of XML content validation files.
All the control and XML files can be stored in a central location on the network. They are then tied to each client by their respective registry entries. This allows a variety of policies to be assigned to different groups and XML files can be shared where a base set of content validation checks is applied to multiple groups.
The XML files store a specific set of content validation criteria which makes TA very versatile. You can use them to store lists of restricted external mail domains and countries, permitted mail domains, attachment controls and mail content checks.
TA offers a good range of controls over mail attachments as it can apply size restrictions and only allow certain file types to be sent. More importantly, it can scan the message subject and body plus the contents of attachments looking for keywords and phrases.
In This Article
The IT Pro guide to Windows 10 migration
Everything you need to know for a successful transitionDownload now
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Software-defined storage for dummies
Control storage costs, eliminate storage bottlenecks and solve storage management challengesDownload now
6 best practices for escaping ransomware
A complete guide to tackling ransomware attacksDownload now