SlideShare une entreprise Scribd logo
1  sur  15
Achieving ITAR Compliance
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],WWW.TITUS-LABS.COM   |  © TITUS LABS. ALL RIGHTS RESERVED  |
Titus Labs Overview WWW.TITUS-LABS.COM   |  © TITUS LABS. ALL RIGHTS RESERVED  | ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ITAR-An Overview ,[object Object],[object Object],[object Object],[object Object]
The ITAR Challenge ,[object Object],[object Object],[object Object]
Titus Labs Classification Software ,[object Object],[object Object],[object Object],- Consistent, accurate labels - Minimal end user training - Lightweight & easy to deploy
Titus Labs Message Classification Classification toolbar Forced Selection Pop-Up
Titus Labs Message Classification Classification toolbar Visual labels Not shown: metadata
Titus Labs Document Classification Classification toolbar Visual Markings Watermark,  Header/Footer Not shown: metadata Forced Selection Pop-Up
Titus Labs Document Classification Classification toolbar Visual Markings Watermark,  Header/Footer Not shown: metadata
ITAR Best Practices/TL Benefits ,[object Object],[object Object],[object Object]
ITAR Best Practices/TL Benefits ,[object Object],[object Object]
ITAR Best Practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Titus Labs helps you meet your ITAR compliance challenges ,[object Object],[object Object],[object Object],[object Object]
What to look for in an ITAR solution Titus Labs Forced classification √ Customizable labels √ Portion marking with abbreviation support √ Customizable metadata for interoperability and policy enforcement √ Message and document classification integration √ Flexible platform support √ Lightweight and easy to deploy √ Low cost √ Leverages and enhances existing IT investments √ Proven COTS solution √

Contenu connexe

Tendances

Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | SecloreSeclore
 
Data Security For Pharmaceutical Industry
Data Security For Pharmaceutical IndustryData Security For Pharmaceutical Industry
Data Security For Pharmaceutical IndustrySeclore
 
Oracle 11g security - 2014
Oracle 11g security - 2014Oracle 11g security - 2014
Oracle 11g security - 2014Connor McDonald
 
Securing IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSecuring IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSeclore
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | SecloreSeclore
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Seclore
 
Securing application data | Seclore
Securing application data | SecloreSecuring application data | Seclore
Securing application data | SecloreSeclore
 
Value Microsoft 365 E5 English
Value Microsoft 365 E5 EnglishValue Microsoft 365 E5 English
Value Microsoft 365 E5 EnglishGuillaume Lagache
 

Tendances (17)

Data Security
Data SecurityData Security
Data Security
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
 
Data Security For Pharmaceutical Industry
Data Security For Pharmaceutical IndustryData Security For Pharmaceutical Industry
Data Security For Pharmaceutical Industry
 
Oracle 11g security - 2014
Oracle 11g security - 2014Oracle 11g security - 2014
Oracle 11g security - 2014
 
Securing IBM ECM with Rights Management
Securing IBM ECM with Rights ManagementSecuring IBM ECM with Rights Management
Securing IBM ECM with Rights Management
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
 
Ijisa
IjisaIjisa
Ijisa
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Ijisa
IjisaIjisa
Ijisa
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
 
Securing application data | Seclore
Securing application data | SecloreSecuring application data | Seclore
Securing application data | Seclore
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Ijisa
IjisaIjisa
Ijisa
 
Value Microsoft 365 E5 English
Value Microsoft 365 E5 EnglishValue Microsoft 365 E5 English
Value Microsoft 365 E5 English
 
Ijisa
IjisaIjisa
Ijisa
 
Circuit security
Circuit securityCircuit security
Circuit security
 

En vedette

TITUS all'evento ICT Sicurezza 2014
TITUS all'evento ICT Sicurezza 2014TITUS all'evento ICT Sicurezza 2014
TITUS all'evento ICT Sicurezza 2014Clever Consulting
 
TITUS @ Security Summit Roma 2011 - Classificazione, Compliance, DLP
TITUS @ Security Summit Roma 2011 -  Classificazione, Compliance, DLPTITUS @ Security Summit Roma 2011 -  Classificazione, Compliance, DLP
TITUS @ Security Summit Roma 2011 - Classificazione, Compliance, DLPClever Consulting
 
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven SecurityTITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven SecurityClever Consulting
 
Data classification
Data classificationData classification
Data classificationSilicon
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification PresentationDerroylo
 
CHAPTER 3: Induction Coil Design
CHAPTER 3: Induction Coil DesignCHAPTER 3: Induction Coil Design
CHAPTER 3: Induction Coil DesignFluxtrol Inc.
 
Chapter 6: Fluxtrol Materials on Induction Coils
Chapter 6: Fluxtrol Materials on Induction CoilsChapter 6: Fluxtrol Materials on Induction Coils
Chapter 6: Fluxtrol Materials on Induction CoilsFluxtrol Inc.
 

En vedette (11)

TITUS all'evento ICT Sicurezza 2014
TITUS all'evento ICT Sicurezza 2014TITUS all'evento ICT Sicurezza 2014
TITUS all'evento ICT Sicurezza 2014
 
TITUS @ Security Summit Roma 2011 - Classificazione, Compliance, DLP
TITUS @ Security Summit Roma 2011 -  Classificazione, Compliance, DLPTITUS @ Security Summit Roma 2011 -  Classificazione, Compliance, DLP
TITUS @ Security Summit Roma 2011 - Classificazione, Compliance, DLP
 
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven SecurityTITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
TITUS @ Security Summit Verona 2011 - Classificazione & User Driven Security
 
Nmlc ef3 module 2
Nmlc ef3 module 2Nmlc ef3 module 2
Nmlc ef3 module 2
 
5 why analysis
5 why analysis5 why analysis
5 why analysis
 
Data classification
Data classificationData classification
Data classification
 
ITAR Compliance
ITAR ComplianceITAR Compliance
ITAR Compliance
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification Presentation
 
CHAPTER 3: Induction Coil Design
CHAPTER 3: Induction Coil DesignCHAPTER 3: Induction Coil Design
CHAPTER 3: Induction Coil Design
 
Classification & tabulation of data
Classification & tabulation of dataClassification & tabulation of data
Classification & tabulation of data
 
Chapter 6: Fluxtrol Materials on Induction Coils
Chapter 6: Fluxtrol Materials on Induction CoilsChapter 6: Fluxtrol Materials on Induction Coils
Chapter 6: Fluxtrol Materials on Induction Coils
 

Similaire à Itar Preso

Datasheet top reasons
Datasheet top reasonsDatasheet top reasons
Datasheet top reasonsJos Reterink
 
Why Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdfWhy Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdfaotmp2600
 
Message Classification for Microsoft Outlook & Web Access
Message Classification for Microsoft Outlook & Web AccessMessage Classification for Microsoft Outlook & Web Access
Message Classification for Microsoft Outlook & Web Accessjoseph978
 
Endpoint Protection Platform Invent Youself/tutorialoutletdotcom
Endpoint Protection Platform Invent Youself/tutorialoutletdotcomEndpoint Protection Platform Invent Youself/tutorialoutletdotcom
Endpoint Protection Platform Invent Youself/tutorialoutletdotcomapjk220
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web securityxKinAnx
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklistbackdoor
 
ULTRA Cooley Presentation
ULTRA Cooley PresentationULTRA Cooley Presentation
ULTRA Cooley PresentationAl Ewers
 
TagCommander-Factsheet-PMS-EN-WEB
TagCommander-Factsheet-PMS-EN-WEBTagCommander-Factsheet-PMS-EN-WEB
TagCommander-Factsheet-PMS-EN-WEBMarco Frassinetti
 
Lowlands Unite NL 2017 - ATA to Z
Lowlands Unite NL 2017 - ATA to ZLowlands Unite NL 2017 - ATA to Z
Lowlands Unite NL 2017 - ATA to ZTim De Keukelaere
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classificationDavid De Vos
 
One name unify them all
One name unify them allOne name unify them all
One name unify them allBizTalk360
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
How to Comply with NIST 800-171
How to Comply with NIST 800-171How to Comply with NIST 800-171
How to Comply with NIST 800-171Corserva
 

Similaire à Itar Preso (20)

Datasheet top reasons
Datasheet top reasonsDatasheet top reasons
Datasheet top reasons
 
Why Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdfWhy Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdf
 
Message Classification for Microsoft Outlook & Web Access
Message Classification for Microsoft Outlook & Web AccessMessage Classification for Microsoft Outlook & Web Access
Message Classification for Microsoft Outlook & Web Access
 
Endpoint Protection Platform Invent Youself/tutorialoutletdotcom
Endpoint Protection Platform Invent Youself/tutorialoutletdotcomEndpoint Protection Platform Invent Youself/tutorialoutletdotcom
Endpoint Protection Platform Invent Youself/tutorialoutletdotcom
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web security
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
ULTRA Cooley Presentation
ULTRA Cooley PresentationULTRA Cooley Presentation
ULTRA Cooley Presentation
 
Alberta's Approach To An Itm Control Framework
Alberta's Approach To An Itm Control FrameworkAlberta's Approach To An Itm Control Framework
Alberta's Approach To An Itm Control Framework
 
Core Concepts.pptx
Core Concepts.pptxCore Concepts.pptx
Core Concepts.pptx
 
TagCommander-Factsheet-PMS-EN-WEB
TagCommander-Factsheet-PMS-EN-WEBTagCommander-Factsheet-PMS-EN-WEB
TagCommander-Factsheet-PMS-EN-WEB
 
CompTIA PenTest+ BETA EXAM CODE PT1-001
CompTIA PenTest+BETA EXAM CODE PT1-001CompTIA PenTest+BETA EXAM CODE PT1-001
CompTIA PenTest+ BETA EXAM CODE PT1-001
 
Presentation_SOC.pptx
Presentation_SOC.pptxPresentation_SOC.pptx
Presentation_SOC.pptx
 
Lowlands Unite NL 2017 - ATA to Z
Lowlands Unite NL 2017 - ATA to ZLowlands Unite NL 2017 - ATA to Z
Lowlands Unite NL 2017 - ATA to Z
 
Firco Trust
Firco TrustFirco Trust
Firco Trust
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classification
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
ISO 27017_2015 Cloud Security.pdf
ISO 27017_2015 Cloud Security.pdfISO 27017_2015 Cloud Security.pdf
ISO 27017_2015 Cloud Security.pdf
 
How to Comply with NIST 800-171
How to Comply with NIST 800-171How to Comply with NIST 800-171
How to Comply with NIST 800-171
 

Itar Preso

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Titus Labs Message Classification Classification toolbar Forced Selection Pop-Up
  • 8. Titus Labs Message Classification Classification toolbar Visual labels Not shown: metadata
  • 9. Titus Labs Document Classification Classification toolbar Visual Markings Watermark, Header/Footer Not shown: metadata Forced Selection Pop-Up
  • 10. Titus Labs Document Classification Classification toolbar Visual Markings Watermark, Header/Footer Not shown: metadata
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. What to look for in an ITAR solution Titus Labs Forced classification √ Customizable labels √ Portion marking with abbreviation support √ Customizable metadata for interoperability and policy enforcement √ Message and document classification integration √ Flexible platform support √ Lightweight and easy to deploy √ Low cost √ Leverages and enhances existing IT investments √ Proven COTS solution √

Notes de l'éditeur

  1. Titus Labs classification solutions for ITAR allow organizations to classify and label their email and documents as part of an ITAR compliance program. Defense related information such as email and documents detailing product plans, product specifications, financial information, manufacturing plans, instructions and product documentation can be protected with email and document classification labels. By utilizing Titus Labs solutions, companies can: prompt users to select pre-programmed ITAR markings from a drop down list in Microsoft Office and Outlook before they can send, save or print information, apply visual markings to increase awareness of sensitive information, ensure ITAR emails and documents are only sent to ITAR-approved individuals.
  2. Simplify for end user: don’t need training on PKI, can guarantee that Controlled Enhanced emails are encrypted
  3. COTS benefit: The quality and support of a commercial product