Your search for gdpr returned 64 results:
Read our privacy statement to learn what information we collect, what your rights are as a user, and our commitment to providing an optimal user experience.
Jim Barkdoll, Titus CEO, talks about the challenges enterprise-level companies are facing with being more proactive about data breaches.
“Silver bullet thinking,” machine learning hype, new names will dominate 2019 IT security landscape, says Titus
Company’s 2019 IT security predictions cite encryption, cloud migration, AI and machine learning as hot topics in the year ahead
Blackstone acquires a majority stake in leading data classification provider Titus
Learn more about our partership with Dataguise enables customers worldwide to find sensitive data across structured (RDBMS) and unstructured locations.
HelpSystems Acquires Leading Data Classification Providers to Bolster Security Business. Read the press release for more information.
See how Titus' solutions helps businesses and organizations meet the challenges of data identification and security during COVID-19.
Learn why organizations struggle to create and deploy reliable processes for improving information handling and how Titus’ solutions gets them there.
This frictionless solution combines the Titus Data Detection Engine and pre-configured cloud-based libraries to evaluate data in context and accurately identify sensitive data within emails.
Titus VP of Strategy Mark Cassetta and Ovum Analyst Maxine Holt to explores what enterprises must do to achieve a strong data security stance and robust data privacy.
Marriott International has had two data breaches in less than 18 months. How many more will it take before customers demand better?
The speed of data creation continues to increase, and that means the volume of data at rest is growing exponentially. With more people accessing and storing files in a multitude of network and cloud repositories, your sensitive data could be just about anywhere. Titus Illuminate helps you discover and identify your data at rest so you can apply classifications, including persistent metadata to secure your most valuable data.
Security vendors make data protection claims that make great sense in theory, but fall far short when they are tested in an actual production environment.