Core Technology of DLP - Protection of the Data (regardless of the device or file)
A Unified Data Centric Security Solution with One Console Equates to Increased Efficiency, Lowest TCO for
Network, Endpoints, Discovery, Classification & Cloud Storage
Based on patent-pending, proprietary technology, GTB Technologies Data Protection solutions prevent the loss of confidential or protected data (including IP or trade secret information) from your organization over a whole range of network protocols, applications, data formats and usage scenarios. An attempted data leak is blocked, even if the protected data was altered from its original form through format conversion, copying, extracting, embedding, re-typing, compression, file extension changes etc.
Technology Foundation - AccuMatchTM Detection Engine
The key to the GTB Security System are its proprietary, patent pending Data AccuMatchTM detection algorithms, which allow GTB's Data Protection solutions to detect and match pre defined data with unprecedented accuracy and speed. GTB's technology is so advanced, that unlike others, the detection engine doesn't "choke" when moving into the Multi-Terra Byte range.
Both text and binary data are protected.
Both structured data (social security numbers, credit card numbers, bank accounts etc.) and unstructured data (reports, memos, designs, source code, agreements, patent applications, etc.) are protected. Within documents, both visible and invisible data are protected.
Our proprietary technology is available for both network and endpoints, either online or offline, even on SSL protected data. A flexible rules engine allows an Administrator to specify a wide range of compliance rules, based on users, computers, protocols and other parameters.
The Unique Features of GTB's Detection Technology - A Unified Data Centric Policy Approach which provides strong auditing, workflow and content protection capabilities
Core Detection & Analysis Algorithms
Methods for describing sensitive content are abundant. They can be divided into two categories: precise methods and imprecise methods.
Precise methods are,by definition, those that involve Content Registration and trigger almost zero false positive incidents.
All other methods are imprecise. They include: keywords, lexicons, regular expressions, extended regular expressions, meta data tags, bayesian analysis, statistical analysis such as Machine Learning, etc.
Combined with the proprietary algorithms, GTB's AccuMatchTM detection algorithms have virtually zero false positives and a very high resilience to data modifications including:
excerpting, inserting, file type conversion, formatting, ASCII ->UNICODE conversion, UNIX–Windows conversion, partial data match, etc.
Real-Time Detection for Outbound or Inbound Transmissions
Real-time detection is an important aspect of all DLP components, i.e., Network, eDiscovery and content-aware Endpoint protection. The GTB detection technology has the rare capability of real time inspection and detection of secure content. The unique advantage of Real-Time inspection is the ability to prevent data loss over the network on any protocol. This is in stark contrast to competing solutions which can prevent data loss/Leak (i.e.block a violating transmission) only on non-Real-time protocols: SMTP via MTA, HTTP/S or FTP via a proxy and/or ICAP server.
The GTB DLP Suite uses a different, proprietary technique for file cracking from its competitors. The process does not require knowledge of the file type, or the location of the beginning of the file or its end in the data stream.
The GTB detection engine is also able to determine the language and encoding, based on the content, in situations where the file format and metadata do not provide this information.
The main advantage of the GTB file cracking technology becomes obvious when a third party technology does not support newly introduced file types as was the case with the introduction of Office 2007. It took competing vendors almost a full year to keep up at that time.
Being both Port & Protocol Independent, unauthorized transmission attempts either active (e-mail, instant messages) or passive (exposing data through a web server or shared folders) covered; including protection against unauthorized printing of documents, containing any secured data.
A sampling are:
All document file types (regardless of size) and most conversions are protected, including: