Complete Protection: Compliance, Cloud, SaaS, Spyware, Web 2.0, etc
Accurate Detection coupled with Port & Protocol Coverage ...
Give organizations the ability to be compliant with Federal, State & International Government data security regulations as it relates to Sarbanes Oxley (SOX), GLBA, HIPAA, PII, CA SB1386, CA AB1950, Payment Card Industry (PCI) Data Security Standard, The US Patriot Act, FISMA, FERC/NERC, PCI, EU Data Protection directive, Data Breach Notification Law, NPP-9, PIPEDA, ITAR, Law 152-FZ "On Personal Data" Code Federal Financial Markets Service, the Joint UK Corporate Governance Code ...and others.
New programs requiring the use of unconventional protocols are becoming increasingly more prevalent. Furthermore, despite company policies forbidding the practice, employees frequently utilize peer to peer applications. Microsoft Networks and similar protocols, initially designed for LAN, are perfectly capable of working over the Internet.
Malicious applications (e.g., viruses and worms) can be utilized to transfer data across a broad variety of protocols. So supporting just SMTP, HTTP, FTP and IM is a real limitation for the majority of DLP Solutions is NOT DLP.
GTB's Data Loss Prevention solution protects data in ALL forms- Data at Rest, Data in Motion and Data in Use. There are three main components to GTB's integrated DLP solution. The Reverse Content-Aware Firewall TM Inspector utilizes unique patent-pending techniques, which allow organizations to mark sensitive data and set rules prohibiting that data from being shared with unauthorized outsiders. The Endpoint Protector controls and monitors the content which is saved to removable media devices, such as: USB, CD, floppy disc, camera, iPod, etc. The eDiscovery scans the network to find and expose secure data.
Our technology provides organizations with a Unified Data Centric Policy Approach. One which offers the overall control and visibility needed to manage advanced threats, analyze data, prevent data loss, enforce compliance while protecting the brand and reputation.
One Product, One Console equates to Increased Efficiency, Lowest TCO
Data in Motion- Data in motion is traffic on the network, it can be either inline or out of line, GTB’s Reserve Content-Aware Firewall Inspector analyzes this traffic for pieces of source code; all communication channels are scanned, such as: emails, instant messages, web logs, etc. If a violation is attempted, the transmission is blocked and logged on the security report. You can also elect to have the network administrator notified through an alert email.
Data in Use- Data in Use is data that is saved on removable media devices, such as: USB drives, CD’s, iPod’s, etc. GTB’s Endpoint Protector scans data for sensitive content before it is saved and then blocks unauthorized transfers. The benefit of this solution is that removable media devices are not forbidden from usage altogether; instead, only prohibited data is blocked from being saved. The Endpoint Protector can also detect activities such as copy and paste, or use of sensitive data in an unapproved application, such as someone encrypting the data in an attempt to bypass the Endpoint Protector’s block.
eDiscovery GTB’s eDiscovery scans computers and identifies sensitive data that is stored in locations that are not permitted. If the sensitive data is found it is logged on the security report with the option of also sending an alert to the network administrator.
Data at Rest GTB’s Data at Rest Scanner (DARS) scans file shares (SAN / NAS) identifies sensitive data that is stored in locations that are not permitted. If the sensitive data is found, it is logged with the option of sending an alert to the network administrator or appropriate person.
Inspector Cloud - deliver the most accurate, best-in-class data security for Cloud deployments
Context & Content Aware Rights Management - Protection around the data, not the device