SlideShare a Scribd company logo
1 of 2
Download to read offline
SHAREPOINT SECURITY | CASE STUDY




THE MORAY COUNCIL
Secures SharePoint Data with TITUS
                                                                                                        ®




The public sector faces a major challenge when it comes to securing the millions of documents housed on document
management systems such as Microsoft SharePoint®. Traditionally, security on such systems has been fairly non-existent,
which in today’s privacy and security conscious environment is no longer acceptable. Securing data in SharePoint has
become an urgent priority for public sector organizations.




Company Profile                                                 Challenge
Moray is an area located in the North of Scotland. It           The Moray Council had been using another
covers 2,238 square miles and has a population of 88,000.       enterprise-class corporate document management
The Moray Council is one of 32 directly elected local           system in a small number of departments; however they
authorities in Scotland, and delivers services and functions    decided to move to Microsoft SharePoint for their
to the community of Moray – ranging from leisure,               corporate solution to maximize existing resources.
education and community care to housing, waste disposal         Paper-based documents are being scanned and added to
and roads. The council is working to design better              the SharePoint system, and the majority of documents
services which will achieve a significant, measurable and       used on a day-to-day basis by the council’s employees
demonstrable improvement in the quality of life of its          would be housed there.
citizens by more efficient delivery of excellent
customer-focused services. The Moray Council employs            With the move to SharePoint, the implementation team
approximately 5,000 staff. The main administrative centre       recognized that users have access to documents that may
is in the town of Elgin.                                        not be relevant and that these documents need to be
                                                                secured. SharePoint’s native security capabilities do not
Business Situation                                              easily allow for administrators to set up per item
As a local government body, the Moray Council handles           permissions.
a wide variety of information ranging from sensitive
government documents to personnel information to                “Security was a top priority for us when it came to our
information on citizens. With a large portion of this           new SharePoint system,” said Roy Poulsen, ICT Project
information housed on Microsoft SharePoint, the                 Leader, The Moray Council. “With the sheer amount of
organization required a way to secure documents on              information housed in the system, we needed to limit
the system to limit user access to only those files which       access to documents that aren’t relevant, as well as limit
are relevant to them.                                           access to various libraries. Working with SharePoint, we
                                                                quickly realized that the standard security inheritance
                                                                method would be inadequate when it came to meeting
                                                                our needs.”
SHAREPOINT SECURITY | CASE STUDY




Solution                                                                    Security and SharePoint. Poulsen elaborates, “TITUS
                                                                            automatically applies security permissions based on the
Poulsen and his team began to investigate methods of                        document’s metadata properties or content type. This
                                                                            makes per document security easy for us.”
securing SharePoint data and following a procurement
exercise identified TITUS Metadata Security™ for
                                                                            Furthermore, permissions are assigned to users or groups
SharePoint. The solution enables administrators to protect
                                                                            based on their Active Directory properties so security can
data in SharePoint by automatically limiting access to                      be based on user or group attributes such as department
documents and the resulting filtered views based on                         and position. This enables the implementation team to
document metadata properties.                                               ensure that users are able to quickly and easily locate the
                                                                            information they need to provide services to citizens on a
“We looked at different ways of                                             day-to-day basis.

securing our SharePoint data, and TITUS                                     “The move to SharePoint was intended to make how we
was the only solution that offered a clear                                  execute services more efficient and save time spent on
                                                                            the document management system by IT,” said Poulsen.
and proven way to control access and
identify how data should be handled.                                        “TITUS has enabled us to greatly
This solution is a great complement to                                      improve both security and efficiency
our existing infrastructure and we were                                     which benefits our entire organization.
confident it would not be onerous for us                                    This helps save both time and money,
to manage.”                                                                 which ultimately benefits our citizens
                                                                            and helps us deliver better services.”
Roy Poulsen
ICT Project Leader, The Moray Council.
                                                                            Roy Poulsen
With over 1,500 desktop users, the Council generates                        ICT Project Leader, The Moray Council.
an immense number of documents to be housed in
SharePoint. With TITUS Metadata Security for SharePoint,
administrators can easily create a Document Library or List                 About TITUS
that specific groups of users can share. Each group can have                TITUS is the leading provider of security and compliance software that
                                                                            helps organizations share information securely while meeting policy and
different and specified types of permissions. “TITUS makes
                                                                            compliance requirements. Our solutions enable military, government, and
it very easy for us to set up one document library, accessed
                                                                            large enterprises to raise awareness and meet regulatory compliance by
by thousands of users with different permissions,” expanded                 visually alerting end users to the sensitivity of information. Products include
Poulsen.                                                                    TITUS Classification, the leading message, document and file classification
                                                                            and labeling solutions; TITUS Aware, products that enhance Data Loss

Benefits                                                                    Prevention by detecting sensitive information at the desktop; and the
                                                                            TITUS family of classification and security solutions for Microsoft
                                                                            SharePoint. TITUS solutions are deployed to over 1.5 million users within
TITUS Metadata Security for SharePoint delivers multiple
                                                                            our over 300 military, government and enterprise customers worldwide,
benefits to the Moray Council’s IT team and users.                          including Dow Corning, United States Air Force, NATO, G4S, Paternoster,
Ensuring documents are secured properly has become                          Pratt and Whitney, Australian Department of Defence, and the U.S.
simple with the tight integration between TITUS Metadata                    Department of Veterans Affairs. For more information, visit www.titus.com.




                                     Security & Compliance Solutions |      titus.com

                                   HEADQUARTERS: 343 Preston Street, Suite 800 | Ottawa, Canada K1S 1N4 | Tel: +1 613.820.5111 | info@titus.com
                                   USA: usa@titus.com | EMEA: emea@titus.com | Asia-Pacific: apac@titus.com


                                                                                                                                 TITUS-CS-MorayCouncil-June/11-2531

More Related Content

What's hot

Information Governance Maturity for Financial Services
Information Governance Maturity for Financial ServicesInformation Governance Maturity for Financial Services
Information Governance Maturity for Financial ServicesCraig Adams
 
Symantec Data Insight
Symantec Data InsightSymantec Data Insight
Symantec Data InsightSymantec
 
Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Everteam
 
Towards Patient Controlled Privacy
Towards Patient Controlled PrivacyTowards Patient Controlled Privacy
Towards Patient Controlled PrivacyOwen Sacco
 
Data Without Borders
Data Without BordersData Without Borders
Data Without BordersNair and Co.
 
Symantec Data Insight for Storage
Symantec Data Insight for StorageSymantec Data Insight for Storage
Symantec Data Insight for StorageSymantec
 
Towards a fair (My)Data economy
Towards a fair (My)Data economyTowards a fair (My)Data economy
Towards a fair (My)Data economyAlexandros Nousias
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYcscpconf
 
HP Information Governance Forum 2013 (IGF) iCognition information governance ...
HP Information Governance Forum 2013 (IGF) iCognition information governance ...HP Information Governance Forum 2013 (IGF) iCognition information governance ...
HP Information Governance Forum 2013 (IGF) iCognition information governance ...Nigel Carruthers-Taylor
 
Veritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-ENVeritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-ENRichard Williams
 
Information Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and SolutionsInformation Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and SolutionsIBMGovernmentCA
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
Data protection guide
Data protection guideData protection guide
Data protection guidepetertran
 
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...Osterman Research, Inc.
 
88 privacy breaches (sample book) 15 apr
88 privacy breaches (sample book) 15 apr88 privacy breaches (sample book) 15 apr
88 privacy breaches (sample book) 15 aprStraits Interactive
 
InfoDNA Everteam houston breakfast 06.29.17
InfoDNA Everteam houston breakfast 06.29.17InfoDNA Everteam houston breakfast 06.29.17
InfoDNA Everteam houston breakfast 06.29.17Everteam
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
Intro to cloud computing
Intro to cloud computingIntro to cloud computing
Intro to cloud computingKashif Bhatti
 
Dynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyenDynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyenThuan Ng
 

What's hot (20)

Information Governance Maturity for Financial Services
Information Governance Maturity for Financial ServicesInformation Governance Maturity for Financial Services
Information Governance Maturity for Financial Services
 
Symantec Data Insight
Symantec Data InsightSymantec Data Insight
Symantec Data Insight
 
Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2
 
Towards Patient Controlled Privacy
Towards Patient Controlled PrivacyTowards Patient Controlled Privacy
Towards Patient Controlled Privacy
 
Data Without Borders
Data Without BordersData Without Borders
Data Without Borders
 
Symantec Data Insight for Storage
Symantec Data Insight for StorageSymantec Data Insight for Storage
Symantec Data Insight for Storage
 
Towards a fair (My)Data economy
Towards a fair (My)Data economyTowards a fair (My)Data economy
Towards a fair (My)Data economy
 
C24 Top 12 tips
C24 Top 12 tipsC24 Top 12 tips
C24 Top 12 tips
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEY
 
HP Information Governance Forum 2013 (IGF) iCognition information governance ...
HP Information Governance Forum 2013 (IGF) iCognition information governance ...HP Information Governance Forum 2013 (IGF) iCognition information governance ...
HP Information Governance Forum 2013 (IGF) iCognition information governance ...
 
Veritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-ENVeritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-EN
 
Information Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and SolutionsInformation Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and Solutions
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
Data protection guide
Data protection guideData protection guide
Data protection guide
 
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
 
88 privacy breaches (sample book) 15 apr
88 privacy breaches (sample book) 15 apr88 privacy breaches (sample book) 15 apr
88 privacy breaches (sample book) 15 apr
 
InfoDNA Everteam houston breakfast 06.29.17
InfoDNA Everteam houston breakfast 06.29.17InfoDNA Everteam houston breakfast 06.29.17
InfoDNA Everteam houston breakfast 06.29.17
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Intro to cloud computing
Intro to cloud computingIntro to cloud computing
Intro to cloud computing
 
Dynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyenDynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyen
 

Similar to TITUS Metadata Security for SharePoint - Moray Council Case Study

Share point encryption
Share point encryptionShare point encryption
Share point encryptioncsmith2009
 
IDC-IL Webcast on Enterprise Content Collaboration
IDC-IL Webcast on Enterprise Content Collaboration IDC-IL Webcast on Enterprise Content Collaboration
IDC-IL Webcast on Enterprise Content Collaboration Sri Chilukuri
 
TITUS - Top Reasons For Data Classification
TITUS - Top Reasons For Data ClassificationTITUS - Top Reasons For Data Classification
TITUS - Top Reasons For Data ClassificationJohn Timmerman
 
Hitachi Content Platform Datasheet
Hitachi Content Platform DatasheetHitachi Content Platform Datasheet
Hitachi Content Platform DatasheetHitachi Vantara
 
6 Signs Your RMS Needs a Digital Facelift
6 Signs Your RMS Needs a Digital Facelift6 Signs Your RMS Needs a Digital Facelift
6 Signs Your RMS Needs a Digital FaceliftNandini839089
 
hitachi-content-platform-portfolio-esg-validation-report
hitachi-content-platform-portfolio-esg-validation-reporthitachi-content-platform-portfolio-esg-validation-report
hitachi-content-platform-portfolio-esg-validation-reportIngrid Fernandez, PhD
 
WatchDox CDCR CaseStudy Dec2014
WatchDox CDCR CaseStudy Dec2014WatchDox CDCR CaseStudy Dec2014
WatchDox CDCR CaseStudy Dec2014joepanora
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Angie Jorgensen
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 
M365VM - Project Cortex: AI Powered Knowledge Network for the Enterprise
M365VM - Project Cortex: AI Powered Knowledge Network for the EnterpriseM365VM - Project Cortex: AI Powered Knowledge Network for the Enterprise
M365VM - Project Cortex: AI Powered Knowledge Network for the EnterpriseJoel Oleson
 
The Metadata Secret in Your Data
The Metadata Secret in Your DataThe Metadata Secret in Your Data
The Metadata Secret in Your DataEverteam
 
CESSI Digital Library Case Study Eng
CESSI Digital Library Case Study EngCESSI Digital Library Case Study Eng
CESSI Digital Library Case Study Engatolomei
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernanceCloudera, Inc.
 
O2 Business Case Study - My Dentist
O2 Business Case Study - My DentistO2 Business Case Study - My Dentist
O2 Business Case Study - My DentistO2 Business UK
 
Recommind-AXC-Data-Management-Intelligent-Information-Governance-DS
Recommind-AXC-Data-Management-Intelligent-Information-Governance-DSRecommind-AXC-Data-Management-Intelligent-Information-Governance-DS
Recommind-AXC-Data-Management-Intelligent-Information-Governance-DSrschrader1954
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerZia Consulting
 
Microservices Approaches for Continuous Data Integration
Microservices Approaches for Continuous Data IntegrationMicroservices Approaches for Continuous Data Integration
Microservices Approaches for Continuous Data IntegrationVMware Tanzu
 
comparision between IT and Information system
comparision between IT and Information systemcomparision between IT and Information system
comparision between IT and Information systemtayyab3052
 
A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)Denodo
 

Similar to TITUS Metadata Security for SharePoint - Moray Council Case Study (20)

Share point encryption
Share point encryptionShare point encryption
Share point encryption
 
IDC-IL Webcast on Enterprise Content Collaboration
IDC-IL Webcast on Enterprise Content Collaboration IDC-IL Webcast on Enterprise Content Collaboration
IDC-IL Webcast on Enterprise Content Collaboration
 
TITUS - Top Reasons For Data Classification
TITUS - Top Reasons For Data ClassificationTITUS - Top Reasons For Data Classification
TITUS - Top Reasons For Data Classification
 
Hitachi Content Platform Datasheet
Hitachi Content Platform DatasheetHitachi Content Platform Datasheet
Hitachi Content Platform Datasheet
 
6 Signs Your RMS Needs a Digital Facelift
6 Signs Your RMS Needs a Digital Facelift6 Signs Your RMS Needs a Digital Facelift
6 Signs Your RMS Needs a Digital Facelift
 
hitachi-content-platform-portfolio-esg-validation-report
hitachi-content-platform-portfolio-esg-validation-reporthitachi-content-platform-portfolio-esg-validation-report
hitachi-content-platform-portfolio-esg-validation-report
 
WatchDox CDCR CaseStudy Dec2014
WatchDox CDCR CaseStudy Dec2014WatchDox CDCR CaseStudy Dec2014
WatchDox CDCR CaseStudy Dec2014
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
M365VM - Project Cortex: AI Powered Knowledge Network for the Enterprise
M365VM - Project Cortex: AI Powered Knowledge Network for the EnterpriseM365VM - Project Cortex: AI Powered Knowledge Network for the Enterprise
M365VM - Project Cortex: AI Powered Knowledge Network for the Enterprise
 
The Metadata Secret in Your Data
The Metadata Secret in Your DataThe Metadata Secret in Your Data
The Metadata Secret in Your Data
 
CESSI Digital Library Case Study Eng
CESSI Digital Library Case Study EngCESSI Digital Library Case Study Eng
CESSI Digital Library Case Study Eng
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
 
O2 Business Case Study - My Dentist
O2 Business Case Study - My DentistO2 Business Case Study - My Dentist
O2 Business Case Study - My Dentist
 
Recommind-AXC-Data-Management-Intelligent-Information-Governance-DS
Recommind-AXC-Data-Management-Intelligent-Information-Governance-DSRecommind-AXC-Data-Management-Intelligent-Information-Governance-DS
Recommind-AXC-Data-Management-Intelligent-Information-Governance-DS
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
 
Microservices Approaches for Continuous Data Integration
Microservices Approaches for Continuous Data IntegrationMicroservices Approaches for Continuous Data Integration
Microservices Approaches for Continuous Data Integration
 
comparision between IT and Information system
comparision between IT and Information systemcomparision between IT and Information system
comparision between IT and Information system
 
A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)
 

More from Clever Consulting

TITUS all'evento ICT Sicurezza 2014
TITUS all'evento ICT Sicurezza 2014TITUS all'evento ICT Sicurezza 2014
TITUS all'evento ICT Sicurezza 2014Clever Consulting
 
Black berry è ora di migrare
Black berry è ora di migrareBlack berry è ora di migrare
Black berry è ora di migrareClever Consulting
 
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...Clever Consulting
 
La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...
La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...
La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...Clever Consulting
 
"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar
"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar
"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile WebinarClever Consulting
 
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013Clever Consulting
 
Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar
Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar
Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar Clever Consulting
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Clever Consulting
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Clever Consulting
 
Newsletter Clever Consulting - Dicembre 2012
Newsletter Clever Consulting - Dicembre 2012Newsletter Clever Consulting - Dicembre 2012
Newsletter Clever Consulting - Dicembre 2012Clever Consulting
 
Newsletter Clever Consulting - Ottobre 2012
Newsletter Clever Consulting - Ottobre 2012Newsletter Clever Consulting - Ottobre 2012
Newsletter Clever Consulting - Ottobre 2012Clever Consulting
 
Clever Consulting Newsletter - Settembre 2012
Clever Consulting Newsletter - Settembre 2012Clever Consulting Newsletter - Settembre 2012
Clever Consulting Newsletter - Settembre 2012Clever Consulting
 
Clever Consulting Newsletter - Luglio 2012
Clever Consulting Newsletter - Luglio 2012Clever Consulting Newsletter - Luglio 2012
Clever Consulting Newsletter - Luglio 2012Clever Consulting
 
Clever Consulting Newsletter > Giugno 2012
Clever Consulting Newsletter > Giugno 2012Clever Consulting Newsletter > Giugno 2012
Clever Consulting Newsletter > Giugno 2012Clever Consulting
 
Clever Consulting Newsletter > Marzo 2012
Clever Consulting Newsletter > Marzo 2012Clever Consulting Newsletter > Marzo 2012
Clever Consulting Newsletter > Marzo 2012Clever Consulting
 
Clever Consulting Newsletter > Febbraio 2012
Clever Consulting Newsletter > Febbraio 2012Clever Consulting Newsletter > Febbraio 2012
Clever Consulting Newsletter > Febbraio 2012Clever Consulting
 
Clever Consulting Newsletter > Gennaio 2012
Clever Consulting Newsletter > Gennaio 2012Clever Consulting Newsletter > Gennaio 2012
Clever Consulting Newsletter > Gennaio 2012Clever Consulting
 
Clever Consulting Newsletter > Dicembre 2011
Clever Consulting Newsletter > Dicembre 2011Clever Consulting Newsletter > Dicembre 2011
Clever Consulting Newsletter > Dicembre 2011Clever Consulting
 
Clever Consulting Newsletter > Novembre 2011
Clever Consulting Newsletter >  Novembre 2011Clever Consulting Newsletter >  Novembre 2011
Clever Consulting Newsletter > Novembre 2011Clever Consulting
 
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven SecurityTITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven SecurityClever Consulting
 

More from Clever Consulting (20)

TITUS all'evento ICT Sicurezza 2014
TITUS all'evento ICT Sicurezza 2014TITUS all'evento ICT Sicurezza 2014
TITUS all'evento ICT Sicurezza 2014
 
Black berry è ora di migrare
Black berry è ora di migrareBlack berry è ora di migrare
Black berry è ora di migrare
 
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...
Enterprise Mobility: MobileIron & Accellion insieme per il successo | Clever ...
 
La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...
La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...
La prima generazione di Enterprise App: che cosa ci ha insegnato | Clever New...
 
"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar
"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar
"BYOD Toolkit": Bring Your Own Device chiavi in mano | CleverMobile Webinar
 
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
"BYOD Toolkit": Bring Your Own Device chiavi in mano | Clever News, 02/2013
 
Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar
Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar
Passare da RIM a iOS: ci stai pensando? | CleverMobile Webinar
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
 
Newsletter Clever Consulting - Dicembre 2012
Newsletter Clever Consulting - Dicembre 2012Newsletter Clever Consulting - Dicembre 2012
Newsletter Clever Consulting - Dicembre 2012
 
Newsletter Clever Consulting - Ottobre 2012
Newsletter Clever Consulting - Ottobre 2012Newsletter Clever Consulting - Ottobre 2012
Newsletter Clever Consulting - Ottobre 2012
 
Clever Consulting Newsletter - Settembre 2012
Clever Consulting Newsletter - Settembre 2012Clever Consulting Newsletter - Settembre 2012
Clever Consulting Newsletter - Settembre 2012
 
Clever Consulting Newsletter - Luglio 2012
Clever Consulting Newsletter - Luglio 2012Clever Consulting Newsletter - Luglio 2012
Clever Consulting Newsletter - Luglio 2012
 
Clever Consulting Newsletter > Giugno 2012
Clever Consulting Newsletter > Giugno 2012Clever Consulting Newsletter > Giugno 2012
Clever Consulting Newsletter > Giugno 2012
 
Clever Consulting Newsletter > Marzo 2012
Clever Consulting Newsletter > Marzo 2012Clever Consulting Newsletter > Marzo 2012
Clever Consulting Newsletter > Marzo 2012
 
Clever Consulting Newsletter > Febbraio 2012
Clever Consulting Newsletter > Febbraio 2012Clever Consulting Newsletter > Febbraio 2012
Clever Consulting Newsletter > Febbraio 2012
 
Clever Consulting Newsletter > Gennaio 2012
Clever Consulting Newsletter > Gennaio 2012Clever Consulting Newsletter > Gennaio 2012
Clever Consulting Newsletter > Gennaio 2012
 
Clever Consulting Newsletter > Dicembre 2011
Clever Consulting Newsletter > Dicembre 2011Clever Consulting Newsletter > Dicembre 2011
Clever Consulting Newsletter > Dicembre 2011
 
Clever Consulting Newsletter > Novembre 2011
Clever Consulting Newsletter >  Novembre 2011Clever Consulting Newsletter >  Novembre 2011
Clever Consulting Newsletter > Novembre 2011
 
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven SecurityTITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

TITUS Metadata Security for SharePoint - Moray Council Case Study

  • 1. SHAREPOINT SECURITY | CASE STUDY THE MORAY COUNCIL Secures SharePoint Data with TITUS ® The public sector faces a major challenge when it comes to securing the millions of documents housed on document management systems such as Microsoft SharePoint®. Traditionally, security on such systems has been fairly non-existent, which in today’s privacy and security conscious environment is no longer acceptable. Securing data in SharePoint has become an urgent priority for public sector organizations. Company Profile Challenge Moray is an area located in the North of Scotland. It The Moray Council had been using another covers 2,238 square miles and has a population of 88,000. enterprise-class corporate document management The Moray Council is one of 32 directly elected local system in a small number of departments; however they authorities in Scotland, and delivers services and functions decided to move to Microsoft SharePoint for their to the community of Moray – ranging from leisure, corporate solution to maximize existing resources. education and community care to housing, waste disposal Paper-based documents are being scanned and added to and roads. The council is working to design better the SharePoint system, and the majority of documents services which will achieve a significant, measurable and used on a day-to-day basis by the council’s employees demonstrable improvement in the quality of life of its would be housed there. citizens by more efficient delivery of excellent customer-focused services. The Moray Council employs With the move to SharePoint, the implementation team approximately 5,000 staff. The main administrative centre recognized that users have access to documents that may is in the town of Elgin. not be relevant and that these documents need to be secured. SharePoint’s native security capabilities do not Business Situation easily allow for administrators to set up per item As a local government body, the Moray Council handles permissions. a wide variety of information ranging from sensitive government documents to personnel information to “Security was a top priority for us when it came to our information on citizens. With a large portion of this new SharePoint system,” said Roy Poulsen, ICT Project information housed on Microsoft SharePoint, the Leader, The Moray Council. “With the sheer amount of organization required a way to secure documents on information housed in the system, we needed to limit the system to limit user access to only those files which access to documents that aren’t relevant, as well as limit are relevant to them. access to various libraries. Working with SharePoint, we quickly realized that the standard security inheritance method would be inadequate when it came to meeting our needs.”
  • 2. SHAREPOINT SECURITY | CASE STUDY Solution Security and SharePoint. Poulsen elaborates, “TITUS automatically applies security permissions based on the Poulsen and his team began to investigate methods of document’s metadata properties or content type. This makes per document security easy for us.” securing SharePoint data and following a procurement exercise identified TITUS Metadata Security™ for Furthermore, permissions are assigned to users or groups SharePoint. The solution enables administrators to protect based on their Active Directory properties so security can data in SharePoint by automatically limiting access to be based on user or group attributes such as department documents and the resulting filtered views based on and position. This enables the implementation team to document metadata properties. ensure that users are able to quickly and easily locate the information they need to provide services to citizens on a “We looked at different ways of day-to-day basis. securing our SharePoint data, and TITUS “The move to SharePoint was intended to make how we was the only solution that offered a clear execute services more efficient and save time spent on the document management system by IT,” said Poulsen. and proven way to control access and identify how data should be handled. “TITUS has enabled us to greatly This solution is a great complement to improve both security and efficiency our existing infrastructure and we were which benefits our entire organization. confident it would not be onerous for us This helps save both time and money, to manage.” which ultimately benefits our citizens and helps us deliver better services.” Roy Poulsen ICT Project Leader, The Moray Council. Roy Poulsen With over 1,500 desktop users, the Council generates ICT Project Leader, The Moray Council. an immense number of documents to be housed in SharePoint. With TITUS Metadata Security for SharePoint, administrators can easily create a Document Library or List About TITUS that specific groups of users can share. Each group can have TITUS is the leading provider of security and compliance software that helps organizations share information securely while meeting policy and different and specified types of permissions. “TITUS makes compliance requirements. Our solutions enable military, government, and it very easy for us to set up one document library, accessed large enterprises to raise awareness and meet regulatory compliance by by thousands of users with different permissions,” expanded visually alerting end users to the sensitivity of information. Products include Poulsen. TITUS Classification, the leading message, document and file classification and labeling solutions; TITUS Aware, products that enhance Data Loss Benefits Prevention by detecting sensitive information at the desktop; and the TITUS family of classification and security solutions for Microsoft SharePoint. TITUS solutions are deployed to over 1.5 million users within TITUS Metadata Security for SharePoint delivers multiple our over 300 military, government and enterprise customers worldwide, benefits to the Moray Council’s IT team and users. including Dow Corning, United States Air Force, NATO, G4S, Paternoster, Ensuring documents are secured properly has become Pratt and Whitney, Australian Department of Defence, and the U.S. simple with the tight integration between TITUS Metadata Department of Veterans Affairs. For more information, visit www.titus.com. Security & Compliance Solutions | titus.com HEADQUARTERS: 343 Preston Street, Suite 800 | Ottawa, Canada K1S 1N4 | Tel: +1 613.820.5111 | info@titus.com USA: usa@titus.com | EMEA: emea@titus.com | Asia-Pacific: apac@titus.com TITUS-CS-MorayCouncil-June/11-2531