Back to Home Back to Home

Company Overview

TITUS solutions enable organizations to discover, classify, protect and confidently share information, and meet regulatory compliance requirements by identifying and securing unstructured data. TITUS products enhance data loss prevention by classifying and protecting sensitive information in emails, documents and other file types – on the desktop, on mobile devices, and in the Cloud.


Product Overview - TITUS Classification Suite

TITUS Classification Suite prevents data loss by increasing user security awareness and by enforcing policies that protect sensitive information in emails, documents, and other file types – from desktop to mobile to cloud.

TITUS Message Classification
Classify email on Windows and Mac
  • Insert sensitivity markings
  • Guard against accidental data leaks
  • Enforce security policy
  • Provide interactive policy tips
TITUS Illuminate for Data Discovery
Discover, identify, classify, and protect data in the cloud and on network file shares
  • Apply persistent metadata
  • Analyze results to see what your data is, where it is, and who has access to it
TITUS Classification for Microsoft Office
Classify Microsoft Office documents
  • Apply dynamic headers, footers, and watermarks
  • Alert users to sensitive information
  • Enforce security policy
  • Provide interactive policy tips
TITUS Classification for Mobile
Classify email and documents
  • Control document sharing
  • Secure access and collaboration via SharePoint and cloud storage
  • Extend support for Microsoft AD and Azure Right Management to mobile devices
TITUS Classification for Desktop
Classify any file type, including PDFs, videos, images, ZIP files, and design documents
  • Automatically classify files on download, and as files are being saved, moved, or modified
  • Identify file sensitivity with customizable icons which provide quick visual recognition
TITUS Message Classification for Microsoft Outlook Web App
Classify OWA email and calendar items
  • Insert sensitivity markings
  • Enforce security policy
  • Prevent access to sensitive information from unsecured or public computers

back to top