gtb technologies datasheet 2014
TRANSCRIPT
Data Security Solutions With the growing number of breaches, it has become apparent the multitude of difficult & thorny
impacts associated with them - from draconian regulatory fines to brand tarnishment. Cloud pro-
viders today make it very easy for anyone to create powerful bring your own cloud (BYOC) envi-
ronments, Malware phoning home, the cause of many notable breaches and the list goes on and
on. One incident, alone, can ruin an organization.
GTB Technologies offers comprehensive Data Protection / DLP solutions that can help secure
critical data assets by providing visibility into what data is confidential, where it's stored, how it is
transmitted, where is it going, who is receiving it, and who is using it. Our solution will transform
Major Data Breaches:
Yahoo Inc.
Target Corp.
Neiman Marcus
Goldman Sachs Group
Adobe Systems
NSA (WikiLeaks)
Michaels Stores Inc.
Global Payments
Zappos
Living Social
Evernote
GTB DLP focuses on protecting companies
most critical assets which can be identified as
data that can affect revenue, potential income,
reputation, and operational integrity. Our tech-
nology provides some of the world’s largest
organizations the overall control and visibility
needed to manage advanced threats, analyze
data, prevent data loss, enforce compliance
while protecting the brand, intellectual property
and reputation.
Unified Single Policy Framework
With a unified single policy framework for Net-
work DLP, Endpoint DLP, eDiscovery/
Classification (local or over the network dis-
covery), GTB’s Data Security System provides
ease of use and implementation.
Raising the Bar
Unique to GTB is a fully integrated Information
Rights Management (IRM) system, raising the
bar for true next generation DLP solutions.
Total Control
GTB DLP provides the ability to create, man-
age & enforce policies based on content &/
context for when, where, how and by
whom. Thus controlling when data can or
can't be moved, either to or from the network
&/ devices.
Designed to be deployed without any changes
to an existing network topology, the system
supports all SIEM, Email Encryption, Proxies,
LDAP, Databases and Email systems.
How it Works
GTB DLP Suite Solution
Managed by the GTB Central Management Console, the GTB DLP Suite includes four modules
which together provide the visibility and control of critical assets over the network, endpoint, off
premise as well as discovery/classification of sensitive data held within an enterprises’ storage
systems.
GTB Inspector - DLP Gateway that monitors & enforces automated DLP policy based
controls such as block, quarantine, route to encryption gateway, audit & log, pass, alert &
notify, severity block, severity quarantine and redact over the network covering all channels
and the 65,535 ports on all protocols.
GTB Endpoint Protector - An agent that monitors & enforces automated DLP policy
based controls for data-in-motion to all endpoint/removable media. Controls such as block,
encrypt, audit & log, notify & alert on violations towards confidential data and application
data.
GTB eDiscovery - An agent that discovers, classifies and remediates confidential data
stored in enterprise repositories, file shares, and SharePoint. Remediation includes “Copy
to” , “Move to”, “Delete” or “Enforce IRM.”
GTB IRM - An agent that enforces automated DLP policy based controls for data-in-use.
Control who can access a file, where they can access the file, and when or where the file
can be accessed.
“GTB DLP provides unmatched
visibility & control of our data”
-Leslie Seigel, CEO
California Closets
“We had zero visibility into
our data security until we
received an initial report
from the GTB Solution.”
A.C. Worldwide Manufacture of
Electronic Cars & Power Trains
Reduced Cost & Complexity
Traditional DLP systems require the deployment of multiple software, hardware, Operating Sys-
tems and Databases. Such complex deployments lead to costly implementation fees and long
configuration processes rendering the overall solution costly and complex.
In contrast, the GTB DLP system may be downloaded and deployed in a matter of hours. All
components automatically integrate to existing network topologies, SIEM, Email Encryption and
Proxies. The system is comprehensive, intuitive, easy to use, and most of all, customer friendly.
While most vendors require two to three full time engineers to run their system, GTB customers
report less than one part time employee is required to manage the solution.
Unified Management and Reporting
Management and reporting are essential in any security solution. It reflects proper organization,
workflow, and execution. Not only must they provide simple intuitive interfaces but they must
also consolidate many tasks. The GTB Central Management Console provides the necessary
management and reporting capabilities along with policy making for all of Data in Motion, Data
at Rest, Data in Use and Information Rights Management. This results in greater visibility and
control with ease of use, typical of any firewall console. Unified policy making can be deployed
along with customized polices for unique requirements to comply with PCI, HIPAA, GLBA, PII,
SOX, ITAR, HITECH, and more. Policy wizards, pre-built-templates, reporting dashboards, con-
figuration for Endpoint controls and eDiscovery are all in one console, leading to reduced costs
and simplified management.
Data Classification, Discovery & DLP
Overall control and visibility of data is needed to manage advanced threats, prevent data loss,
enforce compliance while protecting the brand and reputation. GTB’s Data Protection provides:
1. Ability to Classify content easily and precisely.
2. Ability to Detect the content accurately in every possible stream format and communication
3. Ability to Enforce security policies in real time.
GTB AccuMatchTM Detection, our proprietary technology, is based on low fingerprint ratios and
the ability to fingerprint specific structured columns or unstructured files. This increases the per-
formance of our 3 detection engines and enables our ability to inspect data in motion traffic, in
Real- time, resulting with virtually 100% accurate detection. These unique capabilities permit
organizations to comfortably be in enforcement mode, thus providing complete protection of
critical assets and confidential data.
Risk Assessments at No Cost
With increasing phishing attacks and data leak risks, protecting critical assets, confidential data,
and corporate information from a breach is more important than ever. Use the GTB Data Secu-
rity solution to see if your organization is at risk and answer the following:
Where is your data going?
Who is sending this data?
What data is being sent?
Who is receiving your data?
What protocols/channels are being used?
Where is your data?
Are you compliant with PCI, PII, SOX,
ITAR, GLBA, HIPAA, etc.?
Is Malware/Viruses stealing your data?
GTB Inspector - a Content-Aware-Reverse-Firewall
The Inspector provides true network DLP covering all channels and all 65,000+ ports & protocols. The
Inspector provides content & context awareness, network visibility, and provides employee education on
security and compliance. Benefits include:
Act in the Moment of Truth: Seize opportunities before they vanish and avert security breached
before they occur by responding in real-time, the moment that matters most.
Heighten Your Senses: Gain Awareness to predict, anticipate, and act on a potential data breach.
100% Detection Rate: Have faith to enforce DLP/company policies with The Inspectors’ three
detection engines as your backbone.
Anomalies in End User Activity: Gain visibility to end user activity.
Zero False Positives & Zero False Negatives: Receive valid events from GTBs’ Accu-
MatchTM fingerprint technology.
Flexible Architecture: Only one appliance needed (either hardware or software deployment)
Automated Policy Based Enforcement: options including block, quarantine, automatically en-
crypt, audit/log, severity block, mask/redact, pass, and user notification in real time.
GTB Endpoint Protector –Device controls with encryption and monitoring
The GTB Endpoint Protector extends the visibility and controls on endpoints over what confidential data is and should be stored, who has it, how it’s being
used, where it is being transferred, and what enforcement actions were taken in real- time to prevent data leakage on the endpoints. GTB's Endpoint Protector
is an innovative DLP solution addressing the growing problem of secure data leaving the organization through removable media & mobile devices such as
Tablets, CD/DVD's, or USB Drives. Context & Content-aware device control that recognizes and optionally blocks output of secure content to removable
media. Options to automatically encrypt and/or shadow activity on the endpoints. Actions such as:
Application Control: Control users from using Skype, Dropbox, Box, Chatter, Gtalk, Salesforce, Evernote, QQ, Google Drive and other applications on
their laptop or workstation.
Active Directory Integration: Integration with AD allows for layered policy making based on Domain, User groups, Departments, and specific users.
Automated Enforcement: Including Blocking, Encrypt, Pass, Write, Log I/O, Shadowing, Audit/Log.
Offline Support: Have DLP for remote users or when are outside the network perimeter.
Operational Efficiency: Minimal impact of workstations and laptops for smooth use.
Network Monitoring: Have the option to monitor network traffic.
“Clients report a very positive
overall experience with GTB’s
customer support and that the
vendor is very responsive to
capability and feature
enhancement requests.”
Gartner Magic Quadrant
Dec. 2013
GTB eDiscovery - Data Classification and Discovery
Discover, Identify, Classify, Inventory, Remediate, Control & Protect your data including PII, PHI, IP, any
structured or unstructured data and more. GTB Technologies is changing the Data classification & dis-
covery space by utilizing its proprietary AccuMatchTM technology to classify data and files based on
fingerprints. GTB eDiscovery detects potential violations of data security and compliance before it be-
comes a security incident. This mitigates consequences of laptop loss, intrusions and potential malware
phoning home. Benefits include:
Seeing & Controlling Your Data: In all locations in your network environment
Real-Time Monitoring: Be notified when a user attempts to / saves a file with confidential data
Continuous Compliance: Scan on-demand or scheduled 24/7
Remediation Actions: “Copy” “Move to” “Delete” or “Encrypt” the confidential data you scanned.
Educate Employees on Security & Compliance: Friendly system notifications to the user help
with self-remediation to avoid security events.
Enterprise Reporting: Dynamic reports based on users, departments, channels, geographic loca-
tions, etc.
Pro-active Workflow, Lowering Cost: Be notified and stop a potential breach before it happens.
“Use of advanced data
fingerprinting as the leading
detection mechanism can
provide higher fidelity with
intellectual property use-cases”
Gartner Magic Quadrant
Dec. 2013
Topology
With GTB DLP, organizations receive a comprehensive, scalable data protection solution.
The system is comprehensive and intuitive but more important, easy to use.
For more information and a free risk assessment, visit
us at www.gtbtechnologies.com
Or call 800. 507.9926
© 2014 GTB Technologies, Inc. All rights reserved. GTB Technologies is a registered trademark
of GTB Technologies Inc. in the United States and other international markets. GTB Technolo-
gies has numerous other registered and unregistered trademarks in the United States and inter-
nationally. All other trademarks are the property of their respective owners. 022014
24/7 Support — World-Wide Coverage
“With GTB Technologies,
I can sleep at night, amazing.”
-Pete N. Nationwide Hotelier
US - Newport Beach , CA, New York City, NY
Europe - Poland, Bulgaria, Romania, Ukraine.
Asia Pacific – Taiwan, Malaysia
South America – Mexico , Brazil