Comprehensive software reviews to make better IT decisions
Titus’ Timely Release of Illuminate 2020 Pushes Privacy Angle
In early March, Titus released Titus Illuminate 2020, which was the company’s answer to the question of analyzing data at rest. This latest version of Illuminate leverages machine learning and AI in an effort to manage data that contains potentially sensitive or high-risk personal information.
A key feature of Titus Illuminate is its ability to integrate with Titus’ Privacy Accelerator. This product was released in the fall of 2019 with the objective of helping organizations reduce risk exposure with respect to personal data, an area of heavy focus with the introduction of stringent privacy laws (GDPR, CCPA).
Enhanced data privacy functions of Illuminate’s most recent release include guidance on whether cloud or on-premises storage is a viable option for certain personal data types. The company’s introduction of Smart RegEx serves to streamline the identification of sensitive personal data’s location within the organization.
Though aimed at assisting organizations with compliance with incumbent privacy regulations and compliance efforts, Illuminate 2020 may serve a secondary function in light of the current global pandemic. Data privacy efforts in the wake of COVID-19 have been taking a backseat as organizations scramble to protect the health and safety of employees and turn focus away from the privacy of their personal data. Organizations may be unaware of a new subset of personal data that has been collected and stored and as such may increasingly need to lean on pre-existing software solutions, such as data classification suites, in order to assist with privacy management.
While business priorities have shifted in the short term, organizations should aim to achieve longevity and maintain a certain standard when it comes to the privacy of their employees’ or clients’ personal data. The solution? Leverage the increased functionality of pre-existing software solutions, in any and all ways possible.
Want to Know More?
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
From employee management through leadership and communication, increased cyber threats, logistics and operations to post-pandemic planning and risk mitigation, the threat landscape has experienced enormous change. These noticeable shifts force us to consider rethinking and retooling how we address risk.
In an interview with Allison Furneaux, VP Marketing at CyberSaint Inc., developers of CyberStrong Integrated Risk Management platform in June 2020, Allison indicated that its focus has been on cybersecurity from the beginning.
LogicGate is a governance, risk and compliance automation platform offered by LogicGate Inc., headquartered in Chicago, that helps organizations to automate their risk processes.
I recently had the opportunity to speak with Jason Rohlf, VP Solutions, Mark Scheinkoenig, VP Commercial Sales, and Emily Figg, VP Marketing about their GRC solution at Onspring to discuss the product audience and upcoming features.
The Department of Justice is looking to acquire a GRC tool for the Office of the CIO within the FBI’s Enterprise Information Security Section.
The International Association of Privacy Professionals (IAPP) has released its 2020 Privacy Tech Vendor report, reviewing key software solution vendors within the space. This year’s report highlighted the recent addition of Data Subject Request (DSR) to the feature categories.
PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor. Thus, allowing such data to be used for multiple use cases without compromising privacy.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.