WCM Rendering with Meta tags
ActionsVera - Data security that follows your files, everywhere
Enterprise Office Software
Download Brochure
Download Datasheet
Powerful Data Protection For A World With No Perimeter
Your need to protect confidential data extends past the borders of your business. Vera’s data security platform secures any kind of data – from Office files to videos and more – giving you the ability to track, audit, and manage access in real-time, no matter how far it travels. We make it effortless to securely collaborate with anyone, no matter which tools they use, including email, Box, Dropbox, or local file shares.
See exactly where your critical data has traveled
Follow documents and data anywhere they go. For regulated content, get detailed audit reports, and establish who is trying to access information.
- Configure detailed file-usage stats and unauthorized access attempts
- Find out who’s viewing your information, with real-time alerts
- Generate an audit trail, for assistance with tracking and regulatory compliance
Instantly update access rights to sensitive data
Maintain control of a sensitive file, even if it’s forwarded, copied, or posted to a public file share. Dynamically update recipient rights to your information, even after it’s left your domain.
- Change permissions and lock down data instantly, preventing data loss
- Enable one-time viewing, custom watermarks, and auto-expiring files
- Permissions stick with your files wherever they travel, even offline and in the cloud
Revoke access to any file, anywhere
Instantly revoke access to any document, and take back control even if it’s been copied, forwarded, downloaded or shared online.
- Revoke access to files from anywhere, any time
- Deprovision user access to confidential data in one click
- Lock down files, folders, and users if a breach has occurred or threat is suspected
Titus for Data Classification
Use Data Classification To Enhance Your Data Security
The family of Titus Classification products provides the essential classification tools to clearly inform both your people and your policies on what information should be secured and how to handle it.
Manage and protect your data with the industry’s most flexible and customizable classification metadata schema. Give your data context so people and systems understand how to handle the information.
Titus Classification products embed metadata attributes into email, documents and files at every stage of the content lifecycle and can automatically add visual markings to help organizations meet compliance and legal requirements.
Powerful Data Identification Capabilities
The Titus family of classification products is supported by the robust Titus Data Detection engine that combines pattern matching, machine learning, categorization, and automated PII detection to add context to data that protects beyond mere labelling.
Support For Multiple Data Types And Clouds
For a data protection solution to be effective, it needs to cover all the bases. Titus classification products work where you work, how you work, and in the flow of work. Titus starts by supporting the data you use every day with classification support that goes beyond emails and office documents to include PDFs, JPGs, and more. The Titus solution works with the tools your teams use every day, whether that is in a Windows or Mac environment. Lastly, whether on-premise or in the cloud, Titus supports the protection of data at rest in a wide range of file shares businesses rely on to operate 24/7.
Add Accuracy To The Data Protection Tools You Already Use
Files classified with Titus gain persistent, granular, rich metadata that better informs downstream defense systems like DLP, CASB, and DRM to reduce false positives and unlock the business value of data while integrations with leading encryption vendors take the guesswork out of rights management.
Open, Enterprise-Grade Policy Engine
While some solutions lock customers into policy that is limited to common use cases and regulations, Titus classification capabilities are backed by the industry’s most flexible policy engine and includes additional capabilities to support custom conditions and actions that allow customers to create data protection policies that are right-sized for any organization.
Titus Classification capabilities are included in a suite of tools that includes the following:
Titus Message Classification
Email continues to be the primary method for sharing information among employees, customers, and partners; presenting a challenge for organizations that must protect information assets while promoting information sharing. Titus Message Classification is a security and governance solution that ensures that email messages are classified before they are sent. Flexible classification options enable user-driven, system-suggested, or automatic application of the classification based on the recipient, sender, and content.
Titus Classification for Desktop
The disclosure of sensitive information and intellectual property in PDFs, videos, images, and design documents presents genuine challenges. With only a few clicks, users can copy sensitive files from their desktop to email, USB drives, instant messages, and other data leakage points. Titus Classification for Desktop provides the first step in protecting sensitive files from data leakage. By enabling users to assign classifications to any file, Titus Classification for Desktop identifies the value and sensitivity of information so organizations can manage, secure, and share that information.
Titus Classification for Productivity Suites
Available for Microsoft Office Titus classification allows organizations to identify the value of their data and manage it accordingly. Titus Classification ensures documents are classified before they can be saved, printed, or sent via email. Flexible classification options enable user driven, system-suggested, or automatic application of the classification based on the content, author, and other document attributes.
Titus Illuminate
With more people accessing and storing files in a multitude of network and cloud repositories, sensitive data could be just about anywhere. Titus Illuminate scans file storage, including on-premise file shares, Box, Dropbox, OneDrive, and Microsoft SharePoint and SharePoint Online. It examines and automatically classifies the files it discovers, ensuring appropriate data protection is applied. And, as it scans files, Illuminate gathers extensive information about each file, building a data inventory for you to run analytics to identify risk areas.
Features
Secure any file, on any device
- Secure any type of file, including Office documents, PDFs, creative content and medical images
- Vera’s security policies travel with your data, anywhere it goes
- Storage agnostic solution: security policies remain with your files anywhere they’re stored, including Box, Dropbox, Google Drive, Microsoft, on-premise storage, and more
Seamless user experience
- Vera fits into your company’s workflow without impacting the end-user experience
- Allow your end-users to work with their favorite productivity apps while maintaining security and control over your content
- Avoid risky end-user workarounds
Granular visibility and control
- Revoke file access instantly from any user, device or cloud storage, even after the fact
- Enable one-time view, disable offline access and self-destruct files anytime
- 360° data visibility: know who and how your content is accessed, and proactively investigate unauthorized access attempts
- Maintain control of your data through the “last mile”, when it’s downloaded from email, forwarded to unknown users or moved to an unmanaged device
Military-grade file encryption
- Military-grade AES 256 encryption at the data level
- Maintain data privacy: Vera never stores your data or content
- No need to move your files to a secure storage system: Vera’s encryption travels with your content everywhere
Real-time policy enforcement
- Change file permissions instantly, at any time
- Apply watermarks and screenshot defenses
- Lock or kill files, even after they’ve been sent to recipients
- Automatically create policies for authorized users or groups using AD/SSO
Centralized control and analytics
- Full audit trail for help with regulatory compliance
- Granular, “Verafied” file activity and access location reports
- Instant mapping of file location, access points and attempted hacks
Industries
Vera for Financial Services
Financial services firms are more likely to be targeted in a cyberattack than other organizations. Changes in business models and shifts in how companies and their customers interact through technology create the ongoing risk of information leaks. It’s a universal challenge: the more collaborative your company becomes, the harder it is to control valuable information. But, it’s no less important to do so.
Vera for Legal
Legal firms operate where sharing client information through email, data rooms, and shared network drives is the norm. In this environment, sensitive information could inevitably bypass corporate firewalls.
Vera is designed to wrap every piece of client data in an encrypted, secure shell that travels with the data wherever it goes. Regardless of how or where your clients’ files travel, only those with the right credentials can access them. Vera can help you protect both confidentiality and your firm’s reputation.
Vera for Education
Securing student information has always been a priority, but today it’s an even greater challenge. The evolution of collaboration creates new challenges for schools managing compliance and monitoring sensitive communications across geographies. Even locally, information might require different types of access. Doing this seamlessly shouldn’t be an impossible task. There’s a better, more secure way.
Vera for Manufacturing
Your product designs, manufacturing specifications, and supplier contracts are all critical to maintaining your organization’s competitive edge. But, to ship successful products, you have to collaborate with vendors throughout the global supply chain, meaning you don’t have complete control over the entire process. Maintaining visibility and control over how suppliers use your data is critical, but you simply can’t let it impact your ability to work with your partners.
Vera for Healthcare
The array of regulations that govern healthcare can seem overwhelming, but the industry is investing to adapt to the new normal. Electronic Healthcare Records (EHRs) are a great start, but every system, interface, and vendor application within your network needs assessment. With all this change, how is your company protecting its data while complying with regulations? A strategy that can help protect your most important information, no matter how rapidly the systems that use it are changing is key.
Product Videos
Vera Data Security - Meet Vera
Vera is a data centric enterprise security platform with a strong yet simple approach: Control access to critical information without sacrificing convenience or productivity.
Customer Testimonials
Tri-Counties Regional Center Testimonial
Having to scan over 80 thousand documents each month, Tri-Counties Regional Center needed better tools to archive, classify, and access their case records and files. With the help of the Therefore, IRIS, and Vera platforms from Canon Solutions America, they can monitor and organize all of their files digitally and securely throughout all of their business processes.