SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Data Security Solutions
With the growing number of breaches, it has become apparent the multitude of difficult & thorny
impacts associated with them- from draconian regulatory fines to brand tarnishment. Cloud pro-
viders today make it very easy for anyone to create powerful bring your own cloud (BYOC) envi-
ronments, Malware phoning home, the cause of many notable breaches and the list goes on and
on. One incident, alone, can ruin an organization.
GTB Technologies offers comprehensive Data Protection / DLP solutions that can help secure
critical data assets by providing visibility into what data is confidential, where it's stored, how it is
transmitted, where is it going, who is receiving it, and who is using it. Our solution will transform
Major Data Breaches:
Yahoo Inc.
Facebook
TargetCorp.
Neiman Marcus
Goldman Sachs Group
Adobe Systems
NSA (WikiLeaks)
Michaels Stores Inc.
Linkedin
Global Payments
Zappos
Living Social
Evernote
GTB DLP focuses on protecting companies
most critical assets which can be identified as
data that can affect revenue, potential income,
reputation, and operational integrity. Our tech-
nology provides some of the world’s largest
organizations the overall control and visibility
needed to manage advanced threats, analyze
data, prevent data loss, enforce compliance
while protecting the brand, intellectual property
and reputation.
Unified Single Policy Framework
With a unified single policy framework for Net-
work DLP, Endpoint DLP, eDiscovery/
Classification (local or over the network dis-
covery), GTB’s Data Security System provides
ease of use and implementation.
Raising the Bar
Unique to GTB is a fully integrated Information
Rights Management (IRM) system, raising the
bar for true next generation DLP solutions.
Total Control
GTB DLP provides the ability to create, man-
age & enforce policies based on content &/
context for when, where, how and by
whom. Thus controlling when data can or
can't be moved, either to or from the network
&/ devices.
Designed to be deployed without any changes
to an existing network topology, the system
supports all SIEM, Email Encryption, Proxies,
LDAP, Databases and Email systems.
How it Works
GTB DLP Suite Solution
Managed by the GTB Central Management Console, the GTB DLP Suite includes four modules
which together provide the visibility and control of critical assets over the network, endpoint, off
premise as well as discovery/classification of sensitive data held within an enterprises’ storage
systems.
 GTB Inspector - DLP Gateway that monitors & enforces automated DLP policy based
controls such as block, quarantine, route to encryption gateway, audit & log, pass, alert &
notify, severity block, severity quarantine and redact over the network covering all channels
and the 65,535 ports on all protocols.
 GTB Endpoint Protector - An agent that monitors & enforces automated DLP policy
based controls for data-in-motion to all endpoint/removable media. Controls such as block,
encrypt, audit & log, notify & alert on violations towards confidential data and application
data.
 GTB eDiscovery - An agent that discovers, classifies and remediates confidential data
stored in enterprise repositories, file shares, and SharePoint. Remediation includes “Copy
to” , “Move to”, “Delete” or “Enforce IRM.”
 GTB IRM - An agent that enforces automated DLP policy based controls for data-in-use.
Control who can access a file, where they can access the file, and when or where the file
can be accessed.
“GTB DLP provides unmatched
visibility & control of our data”
-Leslie Seigel, CEO
California Closets
“We had zero visibility into
our data security until we
received an initial report
from the GTB Solution.”
A.C. Worldwide Manufacture of
Electronic Cars & Power Trains
Reduced Cost & Complexity
Traditional DLP systems require the deployment of multiple software, hardware, Operating Sys-
tems and Databases. Such complex deployments lead to costly implementation fees and long
configuration processes rendering the overall solution costly and complex.
In contrast, the GTB DLP system may be downloaded and deployed in a matter of hours. All
components automatically integrate to existing network topologies, SIEM, Email Encryption and
Proxies. The system is comprehensive, intuitive, easy to use, and most of all, customer friendly.
While most vendors require two to three full time engineers to run their system, GTB customers
report less than one part time employee is required to manage the solution.
Unified Management and Reporting
Management and reporting are essential in any security solution. It reflects proper organization,
workflow, and execution. Not only must they provide simple intuitive interfaces but they must
also consolidate many tasks. The GTB Central Management Console provides the necessary
management and reporting capabilities along with policy making for all of Data in Motion, Data
at Rest, Data in Use and Information Rights Management. This results in greater visibility and
control with ease of use, typical of any firewall console. Unified policy making can be deployed
along with customized polices for unique requirements to comply with PCI, HIPAA, GLBA, PII,
SOX, ITAR, HITECH, and more. Policy wizards, pre-built-templates, reporting dashboards, con-
figuration for Endpoint controls and eDiscovery are all in one console, leading to reduced costs
and simplified management.
Data Classification, Discovery & DLP
Overall control and visibility of data is needed to manage advanced threats, prevent data loss,
enforce compliance while protecting the brand and reputation. GTB’s Data Protection provides:
1. Ability to Classify content easily and precisely.
2. Ability to Detect the content accurately in every possible stream format and communication
3. Ability to Enforce security policies in real time.
GTB AccuMatchTM
Detection, our proprietary technology, is based on low fingerprint ratios and
the ability to fingerprint specific structured columns or unstructured files. This increases the per-
formance of our 3 detection engines and enables our ability to inspect data in motion traffic, in
Real- time, resulting with virtually 100% accurate detection. These unique capabilities permit
organizations to comfortably be in enforcement mode, thus providing complete protection of
critical assets and confidential data.
Risk Assessments at No Cost
With increasing phishing attacks and data leak risks, protecting critical assets, confidential data,
and corporate information from a breach is more important than ever. Use the GTB Data Secu-
rity solution to see if your organization is at risk and answer the following:
 Where is your data going?
 Who is sending this data?
 What data is being sent?
 Who is receiving your data?
 What protocols/channels are being used?
 Where is your data?
 Are you compliant with PCI, PII, SOX,
ITAR, GLBA, HIPAA, etc.?
 Is Malware/Viruses stealing your data?
GTB Inspector - a Content-Aware-Reverse-Firewall
The Inspector provides true network DLP covering all channels and all 65,000+ ports & protocols. The
Inspector provides content & context awareness, network visibility, and provides employee education on
security and compliance. Benefits include:
 Act in the Moment of Truth: Seize opportunities before they vanish and avert security breached
before they occur by responding in real-time, the moment that matters most.
 Heighten Your Senses: Gain Awareness to predict, anticipate, and act on a potential data breach.
 100% Detection Rate: Have faith to enforce DLP/company policies with The Inspectors’ three
detection engines as your backbone.
 Anomalies in End User Activity: Gain visibility to end user activity.
 Zero False Positives & Zero False Negatives: Receive valid events from GTBs’ Accu-
MatchTM
fingerprint technology.
 Flexible Architecture: Only one appliance needed (either hardware or software deployment)
 Automated Policy Based Enforcement: options including block, quarantine, automatically en-
crypt, audit/log, severity block, mask/redact, pass, and user notification in real time.
GTB Endpoint Protector –Device controls with encryption and monitoring
The GTB Endpoint Protector extends the visibility and controls on endpoints over what confidential data is and should be stored, who has it, how it’s being
used, where it is being transferred, and what enforcement actions were taken in real-time to prevent data leakage on the endpoints. GTB's Endpoint Protector
is an innovative DLP solution addressing the growing problem of secure data leaving the organization through removable media & mobile devices such as
Tablets, CD/DVD's, or USB Drives. Context & Content-aware device control that recognizes and optionally blocks output of secure content to removable
media. Options to automatically encrypt and/or shadow activity on the endpoints. Actions such as:
 Application Control: Control users from using Skype, Dropbox, Box, Chatter, Gtalk, Salesforce, Evernote, QQ, Google Drive and other applications on
their laptop or workstation.
 Active Directory Integration: Integration with AD allows for layered policy making based on Domain, User groups, Departments, and specific users.
 Automated Enforcement: Including Blocking, Encrypt, Pass, Write, Log I/O, Shadowing, Audit/Log.
 Offline Support: Have DLP for remote users or when are outside the network perimeter.
 Operational Efficiency: Minimal impact of workstations and laptops for smooth use.
 Network Monitoring: Have the option to monitor network traffic.
“Clients report a very positive
overall experience with GTB’s
customer supportand that the
vendor is very responsive to
capability and feature
enhancement requests.”
Gartner Magic Quadrant
Dec. 2013
GTB eDiscovery - Data Classification and Discovery
Discover, Identify, Classify, Inventory, Remediate, Control & Protect your data including PII, PHI, IP, any
structured or unstructured data and more. GTB Technologies is changing the Data classification & dis-
covery space by utilizing its proprietary AccuMatchTM
technology to classify data and files based on
fingerprints. GTB eDiscovery detects potential violations of data security and compliance before it be-
comes a security incident. This mitigates consequences of laptop loss, intrusions and potential malware
phoning home. Benefits include:
 Seeing & Controlling Your Data: In all locations in your network environment
 Real-Time Monitoring: Be notified when a user attempts to / saves a file with confidential data
 Continuous Compliance: Scan on-demand or scheduled 24/7
 Remediation Actions: “Copy” “Move to” “Delete” or “Encrypt” the confidential data you scanned.
 Educate Employees on Security & Compliance: Friendly system notifications to the user help
with self-remediation to avoid security events.
 Enterprise Reporting: Dynamic reports based on users, departments, channels, geographic loca-
tions, etc.
 Pro-active Workflow, Lowering Cost: Be notified and stop a potential breach before it happens.
“Use of advanced data
fingerprintingas the leading
detection mechanism can
provide higher fidelity with
intellectual property use-cases”
Gartner Magic Quadrant
Dec. 2013
Topology
With GTB DLP, organizations receive a comprehensive, scalable data protection solution.
The system is comprehensive and intuitive but more important, easy to use.
For more information and a free risk assessment, visit
us at www.gtbtechnologies.com
Or call 800. 507.9926
© 2014 GTB Technologies, Inc. All rights reserved. GTB Technologies is a registered trademark
of GTB Technologies Inc. in the United States and other international markets. GTB Technolo-
gies has numerous other registered and unregistered trademarks in the United States and inter-
nationally. All other trademarks are the property of their respective owners. 022014
24/7 Support — World-Wide Coverage
“With GTBTechnologies,
I can sleepat night, amazing.”
-Pete N. Nationwide Hotelier
US - Newport Beach , CA, New York City, NY
Europe - Poland, Bulgaria, Romania, Ukraine.
Asia Pacific – Taiwan, Malaysia
South America – Mexico , Brazil

Contenu connexe

Tendances

Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
 
VoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenVoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenFatih Ozavci
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Investigação de Crimes Digitais - Carreira em Computação Forense
Investigação de Crimes Digitais - Carreira em Computação ForenseInvestigação de Crimes Digitais - Carreira em Computação Forense
Investigação de Crimes Digitais - Carreira em Computação ForenseVaine Luiz Barreira, MBA
 
BSidesDFW2022-PurpleTeam_Cloud_Identity.pptx
BSidesDFW2022-PurpleTeam_Cloud_Identity.pptxBSidesDFW2022-PurpleTeam_Cloud_Identity.pptx
BSidesDFW2022-PurpleTeam_Cloud_Identity.pptxJasonOstrom1
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope OverviewNetskope
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithmSunita Kharayat
 
Data explosion
Data explosionData explosion
Data explosionG Prachi
 
The devil is in the details
The devil is in the detailsThe devil is in the details
The devil is in the detailsCarola Frediani
 
Windows 10 CredentialGuard vs Mimikatz - SEC599
Windows 10 CredentialGuard vs Mimikatz - SEC599Windows 10 CredentialGuard vs Mimikatz - SEC599
Windows 10 CredentialGuard vs Mimikatz - SEC599Erik Van Buggenhout
 
Privacy-enhancing technologies and Blockchain
Privacy-enhancing technologies and BlockchainPrivacy-enhancing technologies and Blockchain
Privacy-enhancing technologies and BlockchainDejan Radic
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingAmine SAIGHI
 
Cyber Ranges: The (R)evolution in Cybersecurity Training
Cyber Ranges: The (R)evolution in Cybersecurity TrainingCyber Ranges: The (R)evolution in Cybersecurity Training
Cyber Ranges: The (R)evolution in Cybersecurity TrainingMinsait
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 

Tendances (20)

Webinar # 21 – Análise Forense de Redes
 Webinar # 21 – Análise Forense de Redes Webinar # 21 – Análise Forense de Redes
Webinar # 21 – Análise Forense de Redes
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
VoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenVoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers Awaken
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Steganography
SteganographySteganography
Steganography
 
Investigação de Crimes Digitais - Carreira em Computação Forense
Investigação de Crimes Digitais - Carreira em Computação ForenseInvestigação de Crimes Digitais - Carreira em Computação Forense
Investigação de Crimes Digitais - Carreira em Computação Forense
 
BSidesDFW2022-PurpleTeam_Cloud_Identity.pptx
BSidesDFW2022-PurpleTeam_Cloud_Identity.pptxBSidesDFW2022-PurpleTeam_Cloud_Identity.pptx
BSidesDFW2022-PurpleTeam_Cloud_Identity.pptx
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope Overview
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Data explosion
Data explosionData explosion
Data explosion
 
The devil is in the details
The devil is in the detailsThe devil is in the details
The devil is in the details
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Windows 10 CredentialGuard vs Mimikatz - SEC599
Windows 10 CredentialGuard vs Mimikatz - SEC599Windows 10 CredentialGuard vs Mimikatz - SEC599
Windows 10 CredentialGuard vs Mimikatz - SEC599
 
Privacy-enhancing technologies and Blockchain
Privacy-enhancing technologies and BlockchainPrivacy-enhancing technologies and Blockchain
Privacy-enhancing technologies and Blockchain
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Cyber Ranges: The (R)evolution in Cybersecurity Training
Cyber Ranges: The (R)evolution in Cybersecurity TrainingCyber Ranges: The (R)evolution in Cybersecurity Training
Cyber Ranges: The (R)evolution in Cybersecurity Training
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 

Similaire à GTB Technologies Datasheet 2014

DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014Ravindran Vasu
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareKonverge Technologies Pvt. Ltd.
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceKim Cook
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDMGreg Cranley
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodologytbeckwith
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityTapan Biswas
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express finalDataExpress
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express finalDataExpress
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksEmmanuel Oshogwe Akpeokhai
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
Executive Summary_2016
Executive Summary_2016Executive Summary_2016
Executive Summary_2016Annie Cute
 

Similaire à GTB Technologies Datasheet 2014 (20)

DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDM
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodology
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
Executive Summary_2016
Executive Summary_2016Executive Summary_2016
Executive Summary_2016
 

Plus de Ravindran Vasu

elevatorpitchstartupawards-140409072128-phpapp02
elevatorpitchstartupawards-140409072128-phpapp02elevatorpitchstartupawards-140409072128-phpapp02
elevatorpitchstartupawards-140409072128-phpapp02Ravindran Vasu
 
Watchful-Corporate-Overview-Q1-16
Watchful-Corporate-Overview-Q1-16Watchful-Corporate-Overview-Q1-16
Watchful-Corporate-Overview-Q1-16Ravindran Vasu
 
GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013Ravindran Vasu
 
GTB IRM - How it Works - 2013
GTB IRM - How it Works - 2013GTB IRM - How it Works - 2013
GTB IRM - How it Works - 2013Ravindran Vasu
 
GTB IRM - Usage Rights Matrix
GTB IRM - Usage Rights MatrixGTB IRM - Usage Rights Matrix
GTB IRM - Usage Rights MatrixRavindran Vasu
 

Plus de Ravindran Vasu (6)

elevatorpitchstartupawards-140409072128-phpapp02
elevatorpitchstartupawards-140409072128-phpapp02elevatorpitchstartupawards-140409072128-phpapp02
elevatorpitchstartupawards-140409072128-phpapp02
 
Watchful-Corporate-Overview-Q1-16
Watchful-Corporate-Overview-Q1-16Watchful-Corporate-Overview-Q1-16
Watchful-Corporate-Overview-Q1-16
 
GTB DLP Brochure
GTB DLP BrochureGTB DLP Brochure
GTB DLP Brochure
 
GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013
 
GTB IRM - How it Works - 2013
GTB IRM - How it Works - 2013GTB IRM - How it Works - 2013
GTB IRM - How it Works - 2013
 
GTB IRM - Usage Rights Matrix
GTB IRM - Usage Rights MatrixGTB IRM - Usage Rights Matrix
GTB IRM - Usage Rights Matrix
 

Dernier

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Dernier (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

GTB Technologies Datasheet 2014

  • 1. Data Security Solutions With the growing number of breaches, it has become apparent the multitude of difficult & thorny impacts associated with them- from draconian regulatory fines to brand tarnishment. Cloud pro- viders today make it very easy for anyone to create powerful bring your own cloud (BYOC) envi- ronments, Malware phoning home, the cause of many notable breaches and the list goes on and on. One incident, alone, can ruin an organization. GTB Technologies offers comprehensive Data Protection / DLP solutions that can help secure critical data assets by providing visibility into what data is confidential, where it's stored, how it is transmitted, where is it going, who is receiving it, and who is using it. Our solution will transform Major Data Breaches: Yahoo Inc. Facebook TargetCorp. Neiman Marcus Goldman Sachs Group Adobe Systems NSA (WikiLeaks) Michaels Stores Inc. Linkedin Global Payments Zappos Living Social Evernote GTB DLP focuses on protecting companies most critical assets which can be identified as data that can affect revenue, potential income, reputation, and operational integrity. Our tech- nology provides some of the world’s largest organizations the overall control and visibility needed to manage advanced threats, analyze data, prevent data loss, enforce compliance while protecting the brand, intellectual property and reputation. Unified Single Policy Framework With a unified single policy framework for Net- work DLP, Endpoint DLP, eDiscovery/ Classification (local or over the network dis- covery), GTB’s Data Security System provides ease of use and implementation. Raising the Bar Unique to GTB is a fully integrated Information Rights Management (IRM) system, raising the bar for true next generation DLP solutions. Total Control GTB DLP provides the ability to create, man- age & enforce policies based on content &/ context for when, where, how and by whom. Thus controlling when data can or can't be moved, either to or from the network &/ devices. Designed to be deployed without any changes to an existing network topology, the system supports all SIEM, Email Encryption, Proxies, LDAP, Databases and Email systems. How it Works GTB DLP Suite Solution Managed by the GTB Central Management Console, the GTB DLP Suite includes four modules which together provide the visibility and control of critical assets over the network, endpoint, off premise as well as discovery/classification of sensitive data held within an enterprises’ storage systems.  GTB Inspector - DLP Gateway that monitors & enforces automated DLP policy based controls such as block, quarantine, route to encryption gateway, audit & log, pass, alert & notify, severity block, severity quarantine and redact over the network covering all channels and the 65,535 ports on all protocols.  GTB Endpoint Protector - An agent that monitors & enforces automated DLP policy based controls for data-in-motion to all endpoint/removable media. Controls such as block, encrypt, audit & log, notify & alert on violations towards confidential data and application data.  GTB eDiscovery - An agent that discovers, classifies and remediates confidential data stored in enterprise repositories, file shares, and SharePoint. Remediation includes “Copy to” , “Move to”, “Delete” or “Enforce IRM.”  GTB IRM - An agent that enforces automated DLP policy based controls for data-in-use. Control who can access a file, where they can access the file, and when or where the file can be accessed. “GTB DLP provides unmatched visibility & control of our data” -Leslie Seigel, CEO California Closets “We had zero visibility into our data security until we received an initial report from the GTB Solution.” A.C. Worldwide Manufacture of Electronic Cars & Power Trains
  • 2. Reduced Cost & Complexity Traditional DLP systems require the deployment of multiple software, hardware, Operating Sys- tems and Databases. Such complex deployments lead to costly implementation fees and long configuration processes rendering the overall solution costly and complex. In contrast, the GTB DLP system may be downloaded and deployed in a matter of hours. All components automatically integrate to existing network topologies, SIEM, Email Encryption and Proxies. The system is comprehensive, intuitive, easy to use, and most of all, customer friendly. While most vendors require two to three full time engineers to run their system, GTB customers report less than one part time employee is required to manage the solution. Unified Management and Reporting Management and reporting are essential in any security solution. It reflects proper organization, workflow, and execution. Not only must they provide simple intuitive interfaces but they must also consolidate many tasks. The GTB Central Management Console provides the necessary management and reporting capabilities along with policy making for all of Data in Motion, Data at Rest, Data in Use and Information Rights Management. This results in greater visibility and control with ease of use, typical of any firewall console. Unified policy making can be deployed along with customized polices for unique requirements to comply with PCI, HIPAA, GLBA, PII, SOX, ITAR, HITECH, and more. Policy wizards, pre-built-templates, reporting dashboards, con- figuration for Endpoint controls and eDiscovery are all in one console, leading to reduced costs and simplified management. Data Classification, Discovery & DLP Overall control and visibility of data is needed to manage advanced threats, prevent data loss, enforce compliance while protecting the brand and reputation. GTB’s Data Protection provides: 1. Ability to Classify content easily and precisely. 2. Ability to Detect the content accurately in every possible stream format and communication 3. Ability to Enforce security policies in real time. GTB AccuMatchTM Detection, our proprietary technology, is based on low fingerprint ratios and the ability to fingerprint specific structured columns or unstructured files. This increases the per- formance of our 3 detection engines and enables our ability to inspect data in motion traffic, in Real- time, resulting with virtually 100% accurate detection. These unique capabilities permit organizations to comfortably be in enforcement mode, thus providing complete protection of critical assets and confidential data. Risk Assessments at No Cost With increasing phishing attacks and data leak risks, protecting critical assets, confidential data, and corporate information from a breach is more important than ever. Use the GTB Data Secu- rity solution to see if your organization is at risk and answer the following:  Where is your data going?  Who is sending this data?  What data is being sent?  Who is receiving your data?  What protocols/channels are being used?  Where is your data?  Are you compliant with PCI, PII, SOX, ITAR, GLBA, HIPAA, etc.?  Is Malware/Viruses stealing your data?
  • 3. GTB Inspector - a Content-Aware-Reverse-Firewall The Inspector provides true network DLP covering all channels and all 65,000+ ports & protocols. The Inspector provides content & context awareness, network visibility, and provides employee education on security and compliance. Benefits include:  Act in the Moment of Truth: Seize opportunities before they vanish and avert security breached before they occur by responding in real-time, the moment that matters most.  Heighten Your Senses: Gain Awareness to predict, anticipate, and act on a potential data breach.  100% Detection Rate: Have faith to enforce DLP/company policies with The Inspectors’ three detection engines as your backbone.  Anomalies in End User Activity: Gain visibility to end user activity.  Zero False Positives & Zero False Negatives: Receive valid events from GTBs’ Accu- MatchTM fingerprint technology.  Flexible Architecture: Only one appliance needed (either hardware or software deployment)  Automated Policy Based Enforcement: options including block, quarantine, automatically en- crypt, audit/log, severity block, mask/redact, pass, and user notification in real time. GTB Endpoint Protector –Device controls with encryption and monitoring The GTB Endpoint Protector extends the visibility and controls on endpoints over what confidential data is and should be stored, who has it, how it’s being used, where it is being transferred, and what enforcement actions were taken in real-time to prevent data leakage on the endpoints. GTB's Endpoint Protector is an innovative DLP solution addressing the growing problem of secure data leaving the organization through removable media & mobile devices such as Tablets, CD/DVD's, or USB Drives. Context & Content-aware device control that recognizes and optionally blocks output of secure content to removable media. Options to automatically encrypt and/or shadow activity on the endpoints. Actions such as:  Application Control: Control users from using Skype, Dropbox, Box, Chatter, Gtalk, Salesforce, Evernote, QQ, Google Drive and other applications on their laptop or workstation.  Active Directory Integration: Integration with AD allows for layered policy making based on Domain, User groups, Departments, and specific users.  Automated Enforcement: Including Blocking, Encrypt, Pass, Write, Log I/O, Shadowing, Audit/Log.  Offline Support: Have DLP for remote users or when are outside the network perimeter.  Operational Efficiency: Minimal impact of workstations and laptops for smooth use.  Network Monitoring: Have the option to monitor network traffic. “Clients report a very positive overall experience with GTB’s customer supportand that the vendor is very responsive to capability and feature enhancement requests.” Gartner Magic Quadrant Dec. 2013 GTB eDiscovery - Data Classification and Discovery Discover, Identify, Classify, Inventory, Remediate, Control & Protect your data including PII, PHI, IP, any structured or unstructured data and more. GTB Technologies is changing the Data classification & dis- covery space by utilizing its proprietary AccuMatchTM technology to classify data and files based on fingerprints. GTB eDiscovery detects potential violations of data security and compliance before it be- comes a security incident. This mitigates consequences of laptop loss, intrusions and potential malware phoning home. Benefits include:  Seeing & Controlling Your Data: In all locations in your network environment  Real-Time Monitoring: Be notified when a user attempts to / saves a file with confidential data  Continuous Compliance: Scan on-demand or scheduled 24/7  Remediation Actions: “Copy” “Move to” “Delete” or “Encrypt” the confidential data you scanned.  Educate Employees on Security & Compliance: Friendly system notifications to the user help with self-remediation to avoid security events.  Enterprise Reporting: Dynamic reports based on users, departments, channels, geographic loca- tions, etc.  Pro-active Workflow, Lowering Cost: Be notified and stop a potential breach before it happens. “Use of advanced data fingerprintingas the leading detection mechanism can provide higher fidelity with intellectual property use-cases” Gartner Magic Quadrant Dec. 2013
  • 4. Topology With GTB DLP, organizations receive a comprehensive, scalable data protection solution. The system is comprehensive and intuitive but more important, easy to use. For more information and a free risk assessment, visit us at www.gtbtechnologies.com Or call 800. 507.9926 © 2014 GTB Technologies, Inc. All rights reserved. GTB Technologies is a registered trademark of GTB Technologies Inc. in the United States and other international markets. GTB Technolo- gies has numerous other registered and unregistered trademarks in the United States and inter- nationally. All other trademarks are the property of their respective owners. 022014 24/7 Support — World-Wide Coverage “With GTBTechnologies, I can sleepat night, amazing.” -Pete N. Nationwide Hotelier US - Newport Beach , CA, New York City, NY Europe - Poland, Bulgaria, Romania, Ukraine. Asia Pacific – Taiwan, Malaysia South America – Mexico , Brazil