As the volume of unstructured information grows, the risk of data leakage grows with it. With only a few clicks, users can copy sensitive files from their desktop to email, USB drives, instant messages, and other data leakage points. This increases the risk of serious data leaks, such as the disclosure of sensitive information and intellectual property contained in PDFs, videos, images, and design documents.
TITUS Classification for Desktop provides the first step in protecting sensitive files from data leakage. By enabling users to assign classifications to any file, TITUS Classification for Desktop identifies the value and sensitivity of information, so organizations can manage, secure, and share that information. The user’s classification selection is stored with the file as persistent metadata, which organizations can use to increase the accuracy and effectiveness of DLP, archiving, and perimeter security solutions.
Classify Any File: Enables users to classify and protect sensitive information and intellectual property contained in any file, including PDFs, videos, images, ZIP files, and design documents.
Provides a simple right-click classification menu that guides users when classifying single or multiple files in Windows.
Visually identifies file sensitivity in Windows Explorer via a classification menu and customisable classification icons.
Stores the classification selection with the file as persistent metadata that is maintained even when transferring the file through email or to portable media such as USB drives. Classification metadata is also used to increase the accuracy and effectiveness of DLP, archiving, and perimeter security solutions.
Add an extra layer of security by automatically applying Microsoft Rights Management Services® based on the classification.
Ease of Administration:
Provides a centralized, web-based Administration Console for classification configuration and policy management across the entire TITUS Classification Suite of products. TITUS generates user activity logs that can be monitored and analyzed to measure the effectiveness of the security policies and detect anomalous usage.