TITUS Aware for Microsoft Outlook review

TITUS Aware for Microsoft Outlook is designed to stop email data leakage at the desktop, while educating and involving users at the same time. Does it achieve these commendable goals? Dave Mitchell thinks it's a remarkably simple solution to a serious problem.

The XML files are also used to maintain lists of unacceptable words or phrases and patterns such as social security or credit card numbers. If required, you can add advisory headers and footers to outbound messages along with metadata that may be used by security appliances to check that TA message processing has occurred.

The Administration Tool is simple to use and groups all policy components under a set of nested folders. The controls in the Global Options tab let you enable or disable TA and modify general settings such as loading a splash screen for Outlook users. A useful option is support for Outlook's calendar and tasks, so appointments and job assignments can also be included in DLP policies.

The Global Options are used to activate features for the TA Outlook agent and control how it behaves.

The Global Options are used to activate features for the TA Outlook agent and control how it behaves.

From the user's perspective TA presents a shallow learning curve. When we next loaded Outlook on our clients we found a new set of icons in the Ribbon with the first providing quick access to TA's content checker.

Users can classify messages from the Outlook Ribbon and if they infringe a policy plenty of remediation assistance is provide

Users can classify messages from the Outlook Ribbon and if they infringe a policy plenty of remediation assistance is provided.

Selecting this applies the active policy and the user will be advised if the message fails. A pop-up window warns the user of a policy failure and shows the reasons for this. They can then opt to correct the message and TA provides a wizard showing them what needs to be done. Parts of the message can be automatically redacted so they can't be read. If the user chooses to send the message without verifying it first, it will still be subject to the same policy checks.

TA's justification feature can be used to give some users more leeway with their message content. If this is enabled in the policy settings, the user may ignore validation failures and sent the message anyway. If they do, TA loads a dialogue box asking them to provide a reason which will be logged.

Featured Resources

2021 Thales cloud security study

The challenges of cloud data protection and access management in a hybrid and multi cloud world

Free download

IDC agility assessment

The competitive advantage in adaptability

Free Download

Digital transformation insights from CIOs for CIOs

Transformation pilotes, co-pilots, and engineers

Free download

What ITDMs did next - and what they should be doing now

Enable continued collaboration and communication for hybrid workers

Recommended

Pizza chain exposed 100,000 employees' Social Security numbers
data breaches

Pizza chain exposed 100,000 employees' Social Security numbers

19 Nov 2021
83% of critical infrastructure companies have experienced breaches in the last three years
cyber security

83% of critical infrastructure companies have experienced breaches in the last three years

11 Nov 2021
Proofpoint impersonator steal Microsoft, Google logins in phishing campaign
cyber security

Proofpoint impersonator steal Microsoft, Google logins in phishing campaign

8 Nov 2021
Identity Automation launches credential breach monitoring service
phishing

Identity Automation launches credential breach monitoring service

5 Oct 2021

Most Popular

Microsoft 365 prices to soar by 20% for pay monthly subscribers
Managed service provider (MSP)

Microsoft 365 prices to soar by 20% for pay monthly subscribers

7 Dec 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

30 Nov 2021
What is single sign-on (SSO)?
single sign-on (SSO)

What is single sign-on (SSO)?

2 Dec 2021