security ecosystem · outcome by focusing on risk-based, data-centric controls and capabilities for...

11
Titus TIMES Security Ecosystem ISSUE 2 / SERIES 2

Upload: others

Post on 05-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security Ecosystem · outcome by focusing on risk-based, data-centric controls and capabilities for the security team,” Thacker says. “The ecosystem should be enabled to share

Titus TIMES

SecurityEcosystem

ISSUE 2 / SERIES 2

Page 2: Security Ecosystem · outcome by focusing on risk-based, data-centric controls and capabilities for the security team,” Thacker says. “The ecosystem should be enabled to share

SecurityEcosystem

Page 3: Security Ecosystem · outcome by focusing on risk-based, data-centric controls and capabilities for the security team,” Thacker says. “The ecosystem should be enabled to share

SEBASTIEN ROQUESVice President, Sales EMEA

As VP of Sales for EMEA Sébastien Roques is responsible for driving the EMEA sales and channel with a focus on growing the company’s enterprise, channel and client base. Sébastien has a successful track record of more than 18 years of leadership po-sitions and sales achievements in the cyber security industry.

NO SECURITY SOLUTION IS AN ISLAND

To put it simply: Technology is complicated. No one solution provider can take care of all your technology needs. Even when it comes to something as specific as information privacy and data protection, you likely need several technologies that work together to help realize your data security strategy. Working together requires industry collaboration and technological integration to create a more valuable security ecosystem.

That’s why Titus has built a robust security ecosystem with a network of technology

partners offering solutions that integrate seamlessly with Titus’ core technologies and product offerings. Our mutually beneficial partnerships enable products and solutions to integrate with or build upon one another.

The agnostic and open design of Titus’ data protection solutions underpins their unparalleled interoperability. Titus acts as the policy broker at the heart of your security ecosystem, applying the rich, persistent metadata that enables all your data protection solutions to work better together — data loss prevention (DLP) technologies as well as cloud access security brokers (CASBs), firewalls, encryption technologies, and others. This gives you the flexibility to use the technologies of your choice to guard against security threats, stop unintended exfiltration of sensitive data, and ensure compliance with data privacy regulations.

I hope you enjoy this edition of Titus Times. As always, we welcome your feedback — and if you would like to know more about Titus and our ecosystem of partners, please visit our website.

Letter from the Editor

Page 4: Security Ecosystem · outcome by focusing on risk-based, data-centric controls and capabilities for the security team,” Thacker says. “The ecosystem should be enabled to share

Information architectures become ecosystems. When different media and different contexts are tightly intertwined, no artifact can stand as a single isolated entity. Every single artifact becomes an element in a larger ecosystem.

— Peter Morville, President, Semantic Studios

Page 5: Security Ecosystem · outcome by focusing on risk-based, data-centric controls and capabilities for the security team,” Thacker says. “The ecosystem should be enabled to share
Page 6: Security Ecosystem · outcome by focusing on risk-based, data-centric controls and capabilities for the security team,” Thacker says. “The ecosystem should be enabled to share

ONE OF TITUS’ CORE BUSINESS VALUES HAS ALWAYS BEEN TO CREATE TECHNOLOGIES THAT FOSTER AN OPEN ECOSYSTEM, AND WE UNDERSTAND THAT DATA IDENTIFICATION AND CLASSIFICATION SOLUTIONS ARE JUST ONE PART OF A MUCH LARGER DATA PROTECTION STRATEGY THAT IS UNIQUE TO EVERY ORGANIZATION.

Protecting your ever-growing collection of data — financial, health, intellectual property — is one of the biggest challenges in business today and one that cannot be solved with a single technology. Instead, you need an integrated technology ecosystem of solutions that can communicate with one another, easily share information, and ensure privacy and security policies are covered from all angles.

Your security ecosystem is made up of all the hardware and software providers helping keep your data safe. These may include data loss prevention (DLP) technologies and cloud access security brokers (CASBs), as well as enterprise rights management (ERM) and mobile data security solutions. Titus functions as a central hub

Data security requires interconnected technologies and platforms

Page 7: Security Ecosystem · outcome by focusing on risk-based, data-centric controls and capabilities for the security team,” Thacker says. “The ecosystem should be enabled to share

for all of the players in your extended security ecosystem by injecting metadata into everything it touches. This metadata can then be accessed by your other security solutions, ensuring consistent handling and functionality throughout your data environment.

Titus metadata adds vital context to your data so that the other technologies in your security ecosystem are equipped to make accurate and effective data security decisions. Titus helps make your security ecosystem smarter, acting as your corporate policy broker, and gives you the flexibility to choose the tools that best meet your business needs.

By strengthening your ecosystem, Titus enables you to:• Increase the accuracy and effectiveness of your DLP

technologies and prevent data loss through email using policies such as attachment checking and safe recipients.

• Use data identification in concert with access management products to allow or restrict access to data or an application based on the user’s location, title, role in the business, and other parameters.

• Enable CASBs to make informed decisions about which data can be migrated to cloud environments.

• Use metadata to bring visibility to downstream privacy management solutions and improve the scanning and tracking of possible privacy incidents. Titus policy and labelling solutions can be used to achieve compliance across multiple compliance regulations.

• Provide logs to automation and orchestration solutions that can trigger security workflows based on data categories and sensitivity levels. You can also add visualization and threat analysis tools based on data types to establish baseline behavior for insider threat detection.

“OUR RELATIONSHIP WITH TITUS IS VERY STRONG FROM AN EXECUTIVE LEADERSHIP PERSPECTIVE AND CONTINUES ACROSS ALL

DEPARTMENTS,” THACKER SAYS. “I ENVISION A CONTINUED STRONG PARTNERSHIP AND LOOK FORWARD TO THE MANY CHALLENGES WE CAN HELP OUR CUSTOMERS TACKLE NOW AND INTO

THE FUTURE.”

Titus products provide insight and automation; Netskope offers cloud security, Web security, and private access capabilities

Page 8: Security Ecosystem · outcome by focusing on risk-based, data-centric controls and capabilities for the security team,” Thacker says. “The ecosystem should be enabled to share

• Automatically apply intelligent, flexible encryption to emails and attachments, based on Titus metadata and protection policies.

Cloud policies in action

According to Neil Thacker, Chief Information Security Officer (CISO) EMEA at Netskope, “A security ecosystem is essential in today’s age of varying security requirements, technical controls, and information security challenges.”

One of Titus’ key technology partners, Netskope offers cloud-native solutions to businesses for data protection. Based in Santa Clara, California, the company’s CASB product was named a leader in Gartner’s 2019 Magic Quadrant for CASBs.

“An ecosystem is an essential series of interconnected security technologies and platforms that work together to deliver a good outcome by focusing on risk-based, data-centric controls and capabilities for the security team,” Thacker says.

“The ecosystem should be enabled to share certain event indicators and ensure that the technologies operate together to meet the overall goals of the organization from a data protection, privacy, and cybersecurity perspective.”

Titus Classification Suite combined with Netskope technologies allow mutual enterprise customers to embrace the cloud while ensuring

their sensitive information is not at risk. Netskope leverages Titus metadata to enforce appropriate data protection policies before files are uploaded to the cloud.

“Our partnership with Titus is key,” Thacker says, “as our joint customers leverage the insight and automation provided by the Titus data protection products, and combine these with Netskope’s cloud security, Web security, and private access capabilities.”

Collaboration among technology ecosystem partners provides a better understanding of industry challenges and customer needs. Titus and Netskope regularly work together to develop products that interoperate to best support our mutual customers.

“Data classification supports a broader data protection program that aims to protect certain categories of data that are not simple to identify using other technologies,” Thacker says. “By leveraging Titus functionality, Netskope can be more accurate in blocking events that could otherwise lead to a major security incident.”

Thanks to the partnership with Netskope, Titus customers have access to a combined next-generation secure Web gateway (NG-SWG), CASB, and a zero trust network access (ZTNA) solution that uses Netskope’s Security Cloud to deliver inline and API cloud proxy capabilities.

Page 9: Security Ecosystem · outcome by focusing on risk-based, data-centric controls and capabilities for the security team,” Thacker says. “The ecosystem should be enabled to share
Page 10: Security Ecosystem · outcome by focusing on risk-based, data-centric controls and capabilities for the security team,” Thacker says. “The ecosystem should be enabled to share

Connectwith Titus.

STAY CONNECTED.UP TO SPEED WITHTHE LATEST

/Titus- @Titus [email protected] www.titus.com

WHAT’S NEW

Titus Data Security Podcast

Matt Henson, CEO and Co-founder of Trade Collaboration Engine joins Titus’ Andy Maahs to discuss the challenges of regulatory compliance in the world of international trade

Together we are stronger – Partnerships that work

Senior Marketing Manager, James Phillips, discusses how our partners help us in our goal to be the best data security vendor.

Read More

WHAT’S NEXT

What does true data breach protection look like? Explore the trifecta.

Titus VP of Strategy Mark Cassetta and Ovum Analyst Maxine Holt explore what enterprises must do to achieve a strong data security stance and robust data privacy.

Watch Webinar

Page 11: Security Ecosystem · outcome by focusing on risk-based, data-centric controls and capabilities for the security team,” Thacker says. “The ecosystem should be enabled to share

© 2020 Titus Inc. ALL RIGHTS RESERVED