The SSL Proxy: Complete Network Visibility & Control
It has long been known that SSL encrypted traffic has provided a wide range of secure and private transactions, however these channels have also been a sanctuary for malicious traffic. The GTB Inspector with SSL Proxy utilizes the unique capabilities of the GTB Inspector's "Content-Aware" Data Loss Prevention system, to provide pinpoint detection accuracy into encrypted traffic; giving the functionality of logging, alerting, quarantining as well as blocking.
Now companies no longer need an additional proxy appliance to have high levels of network visibility and control into HTTPS traffic.
GTB Inspector Platform - Complete Network / SSL Visibility & Control
is a centralized management platform for multiple GTB Inspectors & data security products. The Console provides a single point for aggregating security policy, hierarchical security management, real-time monitoring, logging, auditing and compliance reporting.
Inspector Hardware appliances provide superior performance, scalability, and resiliency for demanding network environments. Fail-open interfaces offer fast, cost-effective high availability. This high performance architecture allows organizations to support heavy traffic loads while consolidating device management.
Inspector Virtual Appliances provide a flexible, easy to install software solution. Virtual Appliances allow organizations to leverage existing hardware for data center consolidation, maximize server utilization while saving IT dollars.
An extension of GTB's Accurate, Content aware Data Loss Prevention reverse firewall for SSL-encrypted traffic. Providing complete SSL Visibility - thus preventing endpoints infected with malicious software from sending sensitive data or confidential information to unauthorized locations.
SDK for OEMs, MSPs, Service Providers:
Whether it be messaging gateway services, web monitoring, cloud services, mobile devices, email encryption, data eDiscovery for EIS, file backup service, document management services, etc..; OEMs can now use GTB's SDK, without the use or expense of 3rd party file cracking tools, to instantly add to their products the following functionalities:
A few of our differentiators are:
Resulting in malicious or unintentional transmissions of confidential data over the network are identified and blocked. Organizations are fully secured and compliant with government data security regulations as it relates to Sarbanes Oxley, GLBA, HIPAA, PII, CA SB1386, CA AB1950, Payment Card Industry (PCI) Data Security Standard, The Patriot Act, FISMA, FERC/NERC, and others.