SlideShare a Scribd company logo
1 of 1
Download to read offline
PRODUCTREVIEW




           TITUS Aware for
          Microsoft Outlook



PRODUCT REVIEW              REVIEW PRODUCT REV
                    PRODUCT
   E
          mail is a major focus for businesses         settings control the Aware component and it           If permitted, users can choose to send the
          attempting to implement data loss            can be enabled for Outlook's calendar and           original message without changing it, but
          prevention (DLP) strategies and Aware        tasks also, allowing DLP policies to be             they must provide a justification for doing so.
   from TITUS offers a refreshingly new                applied to shared appointments and task             If they receive a message from a co-worker
   approach. Whereas most solutions enforce            assignments. The file also contains Policy          that already has an Aware classification set,
   rigid DLP policies with no user interaction, this   Group references which point to the XML files       they may be allowed to downgrade its status,
   one actively engages users, allowing them to        that you want to apply to email. When users         but they also will need to justify it.
   review emails that violate security policies and    first load Outlook and create an email, they'll
   rectify content themselves. It supports all         notice a new set of icons in the Ribbon. If          Along with advisory headers and footers,
   versions of Microsoft Outlook and was very          one-click message classification is enabled,        metadata can be added to emails which
   easy to deploy. It doesn't require expensive        the Ribbon will also contain predefined             security gateways can query to confirm that
   management hardware or software platforms,          message categories to choose from.                  Aware message processing has taken place.
   and it works with any mail server application                                                           All Aware and user activity is posted in the
   including Microsoft Exchange.                         The range of policy controls is impressive as     Windows Event Log, so any application that
                                                       Aware can detect keywords and phrases in            can access this can use it for reporting and
     We found installing Aware in the lab to be a      the message subject, body, and within               auditing purposes.
   simple process. Each client requires an MSI         attachments. For the latter Aware supports all
   package installed which can be loaded               versions of Word, Excel and PowerPoint,               TITUS Aware is ideal for medium sized
   manually, via a Group Policy, or using a third      along with Visio, OneNote, Open Office and          businesses requiring a versatile email DLP
   party software deployment tool. To apply            PDFs; it can also peer inside archives. If          solution but without the complexity and high
   policies Aware uses a proprietary file              message classification is active, users can         cost inherent in many other products.
   containing the control settings. This policy file   select a category from the Outlook Ribbon           Furthermore, involving users in the process
   holds information about each of the policies,       which determines what checks should be              will reduce training requirements and will
   including which content validation functions        applied. If, for example, the message is            ensure they are fully aware of company
   to perform. This can range from permitted           classified as internal, it could have a basic set   security policies regarding the emailing of
   external recipient domains and countries,           of content check policies applied, but if it's      potentially sensitive or offensive
   unacceptable words, permissible                     classified as external, then more rigorous          information. NC
   attachments, including maximum file sizes,          content checks could be enforced.
   and patterns including credit card numbers.                                                             Product: TITUS Aware for Microsoft Outlook
                                                         If a user violates a security policy, a warning   Supplier: TITUS
    Each client requires a single registry entry to    dialogue box pops up showing them why               Sales:    emea@titus.com
   be added which defines the location of the          their message has failed. They can then             Telephone: 08000 159 731
   policy file. This approach allows the files to      modify the message to conform, or redact it         Web site: www.titus.com
   be accessed from a central location such as a       using an electronic black marker pen to blot        Price:    100-499 seats is £15.25 per seat
                                                                                                                         4
   network share or a web server. Global policy        out selected keywords.                              excluding VAT with volume discounts




   26 NETWORK computing MAY/JUNE 2011                                                                                     WWW.NETWORKCOMPUTING.CO.UK

More Related Content

More from Clever Consulting

Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Clever Consulting
 
Newsletter Clever Consulting - Dicembre 2012
Newsletter Clever Consulting - Dicembre 2012Newsletter Clever Consulting - Dicembre 2012
Newsletter Clever Consulting - Dicembre 2012Clever Consulting
 
Newsletter Clever Consulting - Ottobre 2012
Newsletter Clever Consulting - Ottobre 2012Newsletter Clever Consulting - Ottobre 2012
Newsletter Clever Consulting - Ottobre 2012Clever Consulting
 
Clever Consulting Newsletter - Settembre 2012
Clever Consulting Newsletter - Settembre 2012Clever Consulting Newsletter - Settembre 2012
Clever Consulting Newsletter - Settembre 2012Clever Consulting
 
Clever Consulting Newsletter - Luglio 2012
Clever Consulting Newsletter - Luglio 2012Clever Consulting Newsletter - Luglio 2012
Clever Consulting Newsletter - Luglio 2012Clever Consulting
 
Clever Consulting Newsletter > Giugno 2012
Clever Consulting Newsletter > Giugno 2012Clever Consulting Newsletter > Giugno 2012
Clever Consulting Newsletter > Giugno 2012Clever Consulting
 
Clever Consulting Newsletter > Marzo 2012
Clever Consulting Newsletter > Marzo 2012Clever Consulting Newsletter > Marzo 2012
Clever Consulting Newsletter > Marzo 2012Clever Consulting
 
Clever Consulting Newsletter > Febbraio 2012
Clever Consulting Newsletter > Febbraio 2012Clever Consulting Newsletter > Febbraio 2012
Clever Consulting Newsletter > Febbraio 2012Clever Consulting
 
Clever Consulting Newsletter > Gennaio 2012
Clever Consulting Newsletter > Gennaio 2012Clever Consulting Newsletter > Gennaio 2012
Clever Consulting Newsletter > Gennaio 2012Clever Consulting
 
Clever Consulting Newsletter > Dicembre 2011
Clever Consulting Newsletter > Dicembre 2011Clever Consulting Newsletter > Dicembre 2011
Clever Consulting Newsletter > Dicembre 2011Clever Consulting
 
Clever Consulting Newsletter > Novembre 2011
Clever Consulting Newsletter >  Novembre 2011Clever Consulting Newsletter >  Novembre 2011
Clever Consulting Newsletter > Novembre 2011Clever Consulting
 
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven SecurityTITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven SecurityClever Consulting
 
Clever Consulting Newsletter > Luglio 2011
Clever Consulting Newsletter > Luglio 2011Clever Consulting Newsletter > Luglio 2011
Clever Consulting Newsletter > Luglio 2011Clever Consulting
 
Clever Consulting Newsletter > Settembre 2011
Clever Consulting Newsletter > Settembre 2011Clever Consulting Newsletter > Settembre 2011
Clever Consulting Newsletter > Settembre 2011Clever Consulting
 
ObserveIT whitepaper: "Log Blindspots" > generare i Log in automatico per un ...
ObserveIT whitepaper: "Log Blindspots" > generare i Log in automatico per un ...ObserveIT whitepaper: "Log Blindspots" > generare i Log in automatico per un ...
ObserveIT whitepaper: "Log Blindspots" > generare i Log in automatico per un ...Clever Consulting
 
TITUS Security Suite per Microsoft SharePoint
TITUS Security Suite per Microsoft SharePointTITUS Security Suite per Microsoft SharePoint
TITUS Security Suite per Microsoft SharePointClever Consulting
 
TITUS Metadata Security for SharePoint - Moray Council Case Study
TITUS Metadata Security for SharePoint -  Moray Council Case StudyTITUS Metadata Security for SharePoint -  Moray Council Case Study
TITUS Metadata Security for SharePoint - Moray Council Case StudyClever Consulting
 
TITUS @ Security Summit Roma 2011 - Classificazione, Compliance, DLP
TITUS @ Security Summit Roma 2011 -  Classificazione, Compliance, DLPTITUS @ Security Summit Roma 2011 -  Classificazione, Compliance, DLP
TITUS @ Security Summit Roma 2011 - Classificazione, Compliance, DLPClever Consulting
 
Invito al #SecuritySummit di Roma - 8 e 9 Giugno 2011
Invito al #SecuritySummit di Roma - 8 e 9 Giugno 2011Invito al #SecuritySummit di Roma - 8 e 9 Giugno 2011
Invito al #SecuritySummit di Roma - 8 e 9 Giugno 2011Clever Consulting
 

More from Clever Consulting (19)

Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
 
Newsletter Clever Consulting - Dicembre 2012
Newsletter Clever Consulting - Dicembre 2012Newsletter Clever Consulting - Dicembre 2012
Newsletter Clever Consulting - Dicembre 2012
 
Newsletter Clever Consulting - Ottobre 2012
Newsletter Clever Consulting - Ottobre 2012Newsletter Clever Consulting - Ottobre 2012
Newsletter Clever Consulting - Ottobre 2012
 
Clever Consulting Newsletter - Settembre 2012
Clever Consulting Newsletter - Settembre 2012Clever Consulting Newsletter - Settembre 2012
Clever Consulting Newsletter - Settembre 2012
 
Clever Consulting Newsletter - Luglio 2012
Clever Consulting Newsletter - Luglio 2012Clever Consulting Newsletter - Luglio 2012
Clever Consulting Newsletter - Luglio 2012
 
Clever Consulting Newsletter > Giugno 2012
Clever Consulting Newsletter > Giugno 2012Clever Consulting Newsletter > Giugno 2012
Clever Consulting Newsletter > Giugno 2012
 
Clever Consulting Newsletter > Marzo 2012
Clever Consulting Newsletter > Marzo 2012Clever Consulting Newsletter > Marzo 2012
Clever Consulting Newsletter > Marzo 2012
 
Clever Consulting Newsletter > Febbraio 2012
Clever Consulting Newsletter > Febbraio 2012Clever Consulting Newsletter > Febbraio 2012
Clever Consulting Newsletter > Febbraio 2012
 
Clever Consulting Newsletter > Gennaio 2012
Clever Consulting Newsletter > Gennaio 2012Clever Consulting Newsletter > Gennaio 2012
Clever Consulting Newsletter > Gennaio 2012
 
Clever Consulting Newsletter > Dicembre 2011
Clever Consulting Newsletter > Dicembre 2011Clever Consulting Newsletter > Dicembre 2011
Clever Consulting Newsletter > Dicembre 2011
 
Clever Consulting Newsletter > Novembre 2011
Clever Consulting Newsletter >  Novembre 2011Clever Consulting Newsletter >  Novembre 2011
Clever Consulting Newsletter > Novembre 2011
 
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven SecurityTITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
 
Clever Consulting Newsletter > Luglio 2011
Clever Consulting Newsletter > Luglio 2011Clever Consulting Newsletter > Luglio 2011
Clever Consulting Newsletter > Luglio 2011
 
Clever Consulting Newsletter > Settembre 2011
Clever Consulting Newsletter > Settembre 2011Clever Consulting Newsletter > Settembre 2011
Clever Consulting Newsletter > Settembre 2011
 
ObserveIT whitepaper: "Log Blindspots" > generare i Log in automatico per un ...
ObserveIT whitepaper: "Log Blindspots" > generare i Log in automatico per un ...ObserveIT whitepaper: "Log Blindspots" > generare i Log in automatico per un ...
ObserveIT whitepaper: "Log Blindspots" > generare i Log in automatico per un ...
 
TITUS Security Suite per Microsoft SharePoint
TITUS Security Suite per Microsoft SharePointTITUS Security Suite per Microsoft SharePoint
TITUS Security Suite per Microsoft SharePoint
 
TITUS Metadata Security for SharePoint - Moray Council Case Study
TITUS Metadata Security for SharePoint -  Moray Council Case StudyTITUS Metadata Security for SharePoint -  Moray Council Case Study
TITUS Metadata Security for SharePoint - Moray Council Case Study
 
TITUS @ Security Summit Roma 2011 - Classificazione, Compliance, DLP
TITUS @ Security Summit Roma 2011 -  Classificazione, Compliance, DLPTITUS @ Security Summit Roma 2011 -  Classificazione, Compliance, DLP
TITUS @ Security Summit Roma 2011 - Classificazione, Compliance, DLP
 
Invito al #SecuritySummit di Roma - 8 e 9 Giugno 2011
Invito al #SecuritySummit di Roma - 8 e 9 Giugno 2011Invito al #SecuritySummit di Roma - 8 e 9 Giugno 2011
Invito al #SecuritySummit di Roma - 8 e 9 Giugno 2011
 

Recently uploaded

Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 

Recently uploaded (20)

Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 

TITUS Aware for Microsoft Outlook - Network Computing UK Review

  • 1. PRODUCTREVIEW TITUS Aware for Microsoft Outlook PRODUCT REVIEW REVIEW PRODUCT REV PRODUCT E mail is a major focus for businesses settings control the Aware component and it If permitted, users can choose to send the attempting to implement data loss can be enabled for Outlook's calendar and original message without changing it, but prevention (DLP) strategies and Aware tasks also, allowing DLP policies to be they must provide a justification for doing so. from TITUS offers a refreshingly new applied to shared appointments and task If they receive a message from a co-worker approach. Whereas most solutions enforce assignments. The file also contains Policy that already has an Aware classification set, rigid DLP policies with no user interaction, this Group references which point to the XML files they may be allowed to downgrade its status, one actively engages users, allowing them to that you want to apply to email. When users but they also will need to justify it. review emails that violate security policies and first load Outlook and create an email, they'll rectify content themselves. It supports all notice a new set of icons in the Ribbon. If Along with advisory headers and footers, versions of Microsoft Outlook and was very one-click message classification is enabled, metadata can be added to emails which easy to deploy. It doesn't require expensive the Ribbon will also contain predefined security gateways can query to confirm that management hardware or software platforms, message categories to choose from. Aware message processing has taken place. and it works with any mail server application All Aware and user activity is posted in the including Microsoft Exchange. The range of policy controls is impressive as Windows Event Log, so any application that Aware can detect keywords and phrases in can access this can use it for reporting and We found installing Aware in the lab to be a the message subject, body, and within auditing purposes. simple process. Each client requires an MSI attachments. For the latter Aware supports all package installed which can be loaded versions of Word, Excel and PowerPoint, TITUS Aware is ideal for medium sized manually, via a Group Policy, or using a third along with Visio, OneNote, Open Office and businesses requiring a versatile email DLP party software deployment tool. To apply PDFs; it can also peer inside archives. If solution but without the complexity and high policies Aware uses a proprietary file message classification is active, users can cost inherent in many other products. containing the control settings. This policy file select a category from the Outlook Ribbon Furthermore, involving users in the process holds information about each of the policies, which determines what checks should be will reduce training requirements and will including which content validation functions applied. If, for example, the message is ensure they are fully aware of company to perform. This can range from permitted classified as internal, it could have a basic set security policies regarding the emailing of external recipient domains and countries, of content check policies applied, but if it's potentially sensitive or offensive unacceptable words, permissible classified as external, then more rigorous information. NC attachments, including maximum file sizes, content checks could be enforced. and patterns including credit card numbers. Product: TITUS Aware for Microsoft Outlook If a user violates a security policy, a warning Supplier: TITUS Each client requires a single registry entry to dialogue box pops up showing them why Sales: emea@titus.com be added which defines the location of the their message has failed. They can then Telephone: 08000 159 731 policy file. This approach allows the files to modify the message to conform, or redact it Web site: www.titus.com be accessed from a central location such as a using an electronic black marker pen to blot Price: 100-499 seats is £15.25 per seat 4 network share or a web server. Global policy out selected keywords. excluding VAT with volume discounts 26 NETWORK computing MAY/JUNE 2011 WWW.NETWORKCOMPUTING.CO.UK