The BYOC Problem ... GTB Technologies Raises the Data Loss Prevention bar, again...
Today, Cloud providers allow individuals (maybe your employees) to create powerful computing environments, in the cloud, by creating their own virtual, private machines. Can your DLP solution detect this?
"Organizations must be attentive to the risks associated with the availability of these private cloud services, whether they choose to move to the cloud or not"
Cloud providers allow individuals (maybe your employees) to create powerful computing environments, in the cloud, by creating their own virtual, private machines. Users may choose from a wide variety of Operating Systems such as, any flavor of Windows, Unix or other Virtual Machines (VM). It takes only minutes for these individual, private computers to be created in a virtual environment.
When such machines are available, individuals may copy data from their own home or work machine to their virtual "cloud" machine by Copy & Paste or Drag & Drop. Such actions are mostly done utilizing the HTTPS protocol but often we see Cloud providers using Secure RDP.
The Problem - "Bring Your Own Cloud" (BYOC)
These private virtual environments create a vast problem for organizations as there is no visibility to such protocols. Employees can now just copy/backup their entire C drive to these private, virtual cloud repositories within a few minutes.
"Cloud computing has many benefits to the enterprise; nevertheless, organizations must be attentive to the risks associated with the availability of these cloud computing services, whether they choose to move to the cloud or not." says Wendy Cohen, GTB Technologies Vice President.
How is an organization able to monitor such activities and BLOCK secured Data (Intellectual Property, such as Source Code) from being copied?
GTB Technologies award winning Data Protection Suite; addresses these cloud computing issues. Among the main features are support for additional protocols that will help Enterprises protect data from being copied to the Cloud:
· Secure RDP & VNC filters for full cloud protection
· WBXML (MS Exchange active-synch) support for detecting emails from Exchange to smart devices
· IMAP protocol filter
· NNTP protocol filter
· SNMP support
· Full support for fingerprinting and protecting Salesforce data
· CEF implementation for full ArcSight SIEM integration
· Support for additional pre-defined International Privacy Policies
GTB Technologies state-of-the-art, content-aware Data Loss Prevention/Extrusion Prevention platform, highlights the detection & protection of intellectual property such as source code, classified information, design documents or any sensitive data. GTB's Data Leak Platform provides an enterprise the ability to prevent unauthorized data extrusion from the organization; the most difficult data to detect & protect and is usually the target of unknown APT attacks.
Enterprises with Data Loss Prevention initiatives whom have an interest in evaluating the GTB DLP / Extrusion Prevention Suite can use the DLP 30 day Evaluation Download at http://www.gtbtechnologies.com/en/downloads The Evaluation comes with free DLP education, training plus GTB's unprecedented support, analysis & reporting!
Contact us to learn more about Next Generation data exfiltration / data loss prevention solutions and how to "Take the 'P' into the Stratosphere"TM
The "Goof Proof Guide to Data Loss Prevention", "Putting the ' P' back into DLP", "Reverse Content-Aware Firewall", "AccuMatch", and "Inspector Cloud", "Taking the 'P' into the Stratosphere" are trademarks of GTB Technologies Inc. All other products, company names, brand names, trademarks and logos are the property of their respective owners and no affiliation with or endorsement, sponsorship or support is implied.