Products | GTB Technologies |Data Leak prevention for Data in Motion, Data at Rest and Data in use
Enterprise Class Data Loss Prevention - Is your Data Secure?
“GTB protects our customers sensitive data including protecting the most important asset, the customers advertising campaigns”
Román Saavedra, IT Director. JWT México
“PREVENTING YOUR NEXT DATA LEAK IS OUR BUSINESS”
GTB Technologies is a next generation Data Loss Prevention (DLP) solution combining the accuracy and speed required to prevent unauthorized, embarrassing leaks of sensitive data from occurring over the corporate network or at endpoint devices.
Independent evaluations confirm that GTB’s Data Leakproof™detection algorithms are the most accurate and fastest detection algorithms on the market.
GTB's Data Loss Prevention solution protects data in ALL forms- Data at Rest, Data in Motion and Data in Use. There are three main components to GTB's integrated DLP solution. The Inspector utilizes a unique fingerprinting technique, which allows organizations to mark sensitive data and set rules prohibiting that data from being shared with unauthorized outsiders. The Endpoint Protector controls and monitors the content which is saved to removable media devices, such as: USB, CD, floppy disc, camera, iPod, etc. The Data-at-Rest Manager scans the network to find and expose secure data.
Data in Motion- Data in motion is traffic on the network, it can be either inline or out of line, GTB’s Inspector analyzes this traffic for pieces of source code; all communication channels are scanned, such as: emails, instant messages, web logs, etc. If a violation is attempted, the transmission is blocked and logged on the security report. You can also elect to have the network administrator notified through an alert email.
Data in Use- Data in Use is data that is saved on removable media devices, such as: USB drives, CD’s, iPod’s, etc. GTB’s Endpoint Protector scans data for sensitive content before it is saved and then blocks unauthorized transfers. The benefit of this solution is that removable media devices are not forbidden from usage altogether; instead, only prohibited data is blocked from being saved. The Endpoint Protector can also detect activities such as copy and paste, or use of sensitive data in an unapproved application, such as someone encrypting the data in an attempt to bypass the Endpoint Protector’s block.
Data at Rest- Data at rest is data sitting on the network and shared drives. GTB’s Data at Rest Manager scans the server (does it scan only one server or multiple servers?) and identifies sensitive data that is stored in locations that are not permitted. If the sensitive data is found it is logged on the security report with the option of also sending an alert to the network administrator.
Click here to download the product profile
Click here to download the DLP White Paper