TITUS Aware for Microsoft Outlook review

TITUS Aware for Microsoft Outlook is designed to stop email data leakage at the desktop, while educating and involving users at the same time. Does it achieve these commendable goals? Dave Mitchell thinks it's a remarkably simple solution to a serious problem.


Email data leakage is a constant worry for businesses but TITUS Aware (TA) takes a refreshingly new approach to this problem. Instead of rigidly enforcing DLP (data leakage prevention) policies it engages Microsoft Outlook users in the process of reviewing their emails and rectifying those that violate security policies.

ITPRO Innovation award

The only other requirement on each client is a couple of registry modifications to point it at the location of the TA policy files. We manually edited our clients' registries, but this can also be done via Group Policies for larger user bases.

An Administration Tool is provided to create and manage all policies. Each policy uses a proprietary file which contains settings that determine how the TA client component should behave and links to sets of XML content validation files.

The Administration Tool is where all policies are defined and you can apply an extensive range of content checks to users’ em

All the control and XML files can be stored in a central location on the network. They are then tied to each client by their respective registry entries. This allows a variety of policies to be assigned to different groups and XML files can be shared where a base set of content validation checks is applied to multiple groups.

Advertisement - Article continues below
Advertisement - Article continues below

The XML files store a specific set of content validation criteria which makes TA very versatile. You can use them to store lists of restricted external mail domains and countries, permitted mail domains, attachment controls and mail content checks.

TA offers a good range of controls over mail attachments as it can apply size restrictions and only allow certain file types to be sent. More importantly, it can scan the message subject and body plus the contents of attachments looking for keywords and phrases.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now

Most Popular

mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
public sector

UK gov launches £300,000 SEN EdTech initiative

22 Jan 2020
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020