4
Data Security Soluons With the growing number of breaches, it has become apparent the multitude of difficult & thorny impacts associated with them - from draconian regulatory fines to brand tarnishment. Cloud pro- viders today make it very easy for anyone to create powerful bring your own cloud (BYOC) envi- ronments, Malware phoning home, the cause of many notable breaches and the list goes on and on. One incident, alone, can ruin an organization. GTB Technologies offers comprehensive Data Protection / DLP solutions that can help secure critical data assets by providing visibility into what data is confidential, where it's stored, how it is transmitted, where is it going, who is receiving it, and who is using it. Our solution will transform Major Data Breaches: Yahoo Inc. Facebook Target Corp. Neiman Marcus Goldman Sachs Group Adobe Systems NSA (WikiLeaks) Michaels Stores Inc. Linkedin Global Payments Zappos Living Social Evernote GTB DLP focuses on protecting companies most critical assets which can be identified as data that can affect revenue, potential income, reputation, and operational integrity. Our tech- nology provides some of the world’s largest organizations the overall control and visibility needed to manage advanced threats, analyze data, prevent data loss, enforce compliance while protecting the brand, intellectual property and reputation. Unified Single Policy Framework With a unified single policy framework for Net- work DLP, Endpoint DLP, eDiscovery/ Classification (local or over the network dis- covery), GTB’s Data Security System provides ease of use and implementation. Raising the Bar Unique to GTB is a fully integrated Information Rights Management (IRM) system, raising the bar for true next generation DLP solutions. Total Control GTB DLP provides the ability to create, man- age & enforce policies based on content &/ context for when, where, how and by whom. Thus controlling when data can or can't be moved, either to or from the network &/ devices. Designed to be deployed without any changes to an existing network topology, the system supports all SIEM, Email Encryption, Proxies, LDAP, Databases and Email systems. How it Works GTB DLP Suite Soluon Managed by the GTB Central Management Console, the GTB DLP Suite includes four modules which together provide the visibility and control of critical assets over the network, endpoint, off premise as well as discovery/classification of sensitive data held within an enterprises’ storage systems. GTB Inspector - DLP Gateway that monitors & enforces automated DLP policy based controls such as block, quarantine, route to encryption gateway, audit & log, pass, alert & notify, severity block, severity quarantine and redact over the network covering all channels and the 65,535 ports on all protocols. GTB Endpoint Protector - An agent that monitors & enforces automated DLP policy based controls for data-in-motion to all endpoint/removable media. Controls such as block, encrypt, audit & log, notify & alert on violations towards confidential data and application data. GTB eDiscovery - An agent that discovers, classifies and remediates confidential data stored in enterprise repositories, file shares, and SharePoint. Remediation includes “Copy to” , “Move to”, “Delete” or “Enforce IRM.” GTB IRM - An agent that enforces automated DLP policy based controls for data-in-use. Control who can access a file, where they can access the file, and when or where the file can be accessed. “GTB DLP provides unmatched visibility & control of our data” -Leslie Seigel, CEO California Closets “We had zero visibility into our data security until we received an initial report from the GTB Solution.” A.C. Worldwide Manufacture of Electronic Cars & Power Trains

GTB Technologies Datasheet 2014

Embed Size (px)

Citation preview

Page 1: GTB Technologies Datasheet 2014

Data Security Solutions With the growing number of breaches, it has become apparent the multitude of difficult & thorny

impacts associated with them - from draconian regulatory fines to brand tarnishment. Cloud pro-

viders today make it very easy for anyone to create powerful bring your own cloud (BYOC) envi-

ronments, Malware phoning home, the cause of many notable breaches and the list goes on and

on. One incident, alone, can ruin an organization.

GTB Technologies offers comprehensive Data Protection / DLP solutions that can help secure

critical data assets by providing visibility into what data is confidential, where it's stored, how it is

transmitted, where is it going, who is receiving it, and who is using it. Our solution will transform

Major Data Breaches:

Yahoo Inc.

Facebook

Target Corp.

Neiman Marcus

Goldman Sachs Group

Adobe Systems

NSA (WikiLeaks)

Michaels Stores Inc.

Linkedin

Global Payments

Zappos

Living Social

Evernote

GTB DLP focuses on protecting companies

most critical assets which can be identified as

data that can affect revenue, potential income,

reputation, and operational integrity. Our tech-

nology provides some of the world’s largest

organizations the overall control and visibility

needed to manage advanced threats, analyze

data, prevent data loss, enforce compliance

while protecting the brand, intellectual property

and reputation.

Unified Single Policy Framework

With a unified single policy framework for Net-

work DLP, Endpoint DLP, eDiscovery/

Classification (local or over the network dis-

covery), GTB’s Data Security System provides

ease of use and implementation.

Raising the Bar

Unique to GTB is a fully integrated Information

Rights Management (IRM) system, raising the

bar for true next generation DLP solutions.

Total Control

GTB DLP provides the ability to create, man-

age & enforce policies based on content &/

context for when, where, how and by

whom. Thus controlling when data can or

can't be moved, either to or from the network

&/ devices.

Designed to be deployed without any changes

to an existing network topology, the system

supports all SIEM, Email Encryption, Proxies,

LDAP, Databases and Email systems.

How it Works

GTB DLP Suite Solution

Managed by the GTB Central Management Console, the GTB DLP Suite includes four modules

which together provide the visibility and control of critical assets over the network, endpoint, off

premise as well as discovery/classification of sensitive data held within an enterprises’ storage

systems.

GTB Inspector - DLP Gateway that monitors & enforces automated DLP policy based

controls such as block, quarantine, route to encryption gateway, audit & log, pass, alert &

notify, severity block, severity quarantine and redact over the network covering all channels

and the 65,535 ports on all protocols.

GTB Endpoint Protector - An agent that monitors & enforces automated DLP policy

based controls for data-in-motion to all endpoint/removable media. Controls such as block,

encrypt, audit & log, notify & alert on violations towards confidential data and application

data.

GTB eDiscovery - An agent that discovers, classifies and remediates confidential data

stored in enterprise repositories, file shares, and SharePoint. Remediation includes “Copy

to” , “Move to”, “Delete” or “Enforce IRM.”

GTB IRM - An agent that enforces automated DLP policy based controls for data-in-use.

Control who can access a file, where they can access the file, and when or where the file

can be accessed.

“GTB DLP provides unmatched

visibility & control of our data”

-Leslie Seigel, CEO

California Closets

“We had zero visibility into

our data security until we

received an initial report

from the GTB Solution.”

A.C. Worldwide Manufacture of

Electronic Cars & Power Trains

Page 2: GTB Technologies Datasheet 2014

Reduced Cost & Complexity

Traditional DLP systems require the deployment of multiple software, hardware, Operating Sys-

tems and Databases. Such complex deployments lead to costly implementation fees and long

configuration processes rendering the overall solution costly and complex.

In contrast, the GTB DLP system may be downloaded and deployed in a matter of hours. All

components automatically integrate to existing network topologies, SIEM, Email Encryption and

Proxies. The system is comprehensive, intuitive, easy to use, and most of all, customer friendly.

While most vendors require two to three full time engineers to run their system, GTB customers

report less than one part time employee is required to manage the solution.

Unified Management and Reporting

Management and reporting are essential in any security solution. It reflects proper organization,

workflow, and execution. Not only must they provide simple intuitive interfaces but they must

also consolidate many tasks. The GTB Central Management Console provides the necessary

management and reporting capabilities along with policy making for all of Data in Motion, Data

at Rest, Data in Use and Information Rights Management. This results in greater visibility and

control with ease of use, typical of any firewall console. Unified policy making can be deployed

along with customized polices for unique requirements to comply with PCI, HIPAA, GLBA, PII,

SOX, ITAR, HITECH, and more. Policy wizards, pre-built-templates, reporting dashboards, con-

figuration for Endpoint controls and eDiscovery are all in one console, leading to reduced costs

and simplified management.

Data Classification, Discovery & DLP

Overall control and visibility of data is needed to manage advanced threats, prevent data loss,

enforce compliance while protecting the brand and reputation. GTB’s Data Protection provides:

1. Ability to Classify content easily and precisely.

2. Ability to Detect the content accurately in every possible stream format and communication

3. Ability to Enforce security policies in real time.

GTB AccuMatchTM Detection, our proprietary technology, is based on low fingerprint ratios and

the ability to fingerprint specific structured columns or unstructured files. This increases the per-

formance of our 3 detection engines and enables our ability to inspect data in motion traffic, in

Real- time, resulting with virtually 100% accurate detection. These unique capabilities permit

organizations to comfortably be in enforcement mode, thus providing complete protection of

critical assets and confidential data.

Risk Assessments at No Cost

With increasing phishing attacks and data leak risks, protecting critical assets, confidential data,

and corporate information from a breach is more important than ever. Use the GTB Data Secu-

rity solution to see if your organization is at risk and answer the following:

Where is your data going?

Who is sending this data?

What data is being sent?

Who is receiving your data?

What protocols/channels are being used?

Where is your data?

Are you compliant with PCI, PII, SOX,

ITAR, GLBA, HIPAA, etc.?

Is Malware/Viruses stealing your data?

Page 3: GTB Technologies Datasheet 2014

GTB Inspector - a Content-Aware-Reverse-Firewall

The Inspector provides true network DLP covering all channels and all 65,000+ ports & protocols. The

Inspector provides content & context awareness, network visibility, and provides employee education on

security and compliance. Benefits include:

Act in the Moment of Truth: Seize opportunities before they vanish and avert security breached

before they occur by responding in real-time, the moment that matters most.

Heighten Your Senses: Gain Awareness to predict, anticipate, and act on a potential data breach.

100% Detection Rate: Have faith to enforce DLP/company policies with The Inspectors’ three

detection engines as your backbone.

Anomalies in End User Activity: Gain visibility to end user activity.

Zero False Positives & Zero False Negatives: Receive valid events from GTBs’ Accu-

MatchTM fingerprint technology.

Flexible Architecture: Only one appliance needed (either hardware or software deployment)

Automated Policy Based Enforcement: options including block, quarantine, automatically en-

crypt, audit/log, severity block, mask/redact, pass, and user notification in real time.

GTB Endpoint Protector –Device controls with encryption and monitoring

The GTB Endpoint Protector extends the visibility and controls on endpoints over what confidential data is and should be stored, who has it, how it’s being

used, where it is being transferred, and what enforcement actions were taken in real- time to prevent data leakage on the endpoints. GTB's Endpoint Protector

is an innovative DLP solution addressing the growing problem of secure data leaving the organization through removable media & mobile devices such as

Tablets, CD/DVD's, or USB Drives. Context & Content-aware device control that recognizes and optionally blocks output of secure content to removable

media. Options to automatically encrypt and/or shadow activity on the endpoints. Actions such as:

Application Control: Control users from using Skype, Dropbox, Box, Chatter, Gtalk, Salesforce, Evernote, QQ, Google Drive and other applications on

their laptop or workstation.

Active Directory Integration: Integration with AD allows for layered policy making based on Domain, User groups, Departments, and specific users.

Automated Enforcement: Including Blocking, Encrypt, Pass, Write, Log I/O, Shadowing, Audit/Log.

Offline Support: Have DLP for remote users or when are outside the network perimeter.

Operational Efficiency: Minimal impact of workstations and laptops for smooth use.

Network Monitoring: Have the option to monitor network traffic.

“Clients report a very positive

overall experience with GTB’s

customer support and that the

vendor is very responsive to

capability and feature

enhancement requests.”

Gartner Magic Quadrant

Dec. 2013

GTB eDiscovery - Data Classification and Discovery

Discover, Identify, Classify, Inventory, Remediate, Control & Protect your data including PII, PHI, IP, any

structured or unstructured data and more. GTB Technologies is changing the Data classification & dis-

covery space by utilizing its proprietary AccuMatchTM technology to classify data and files based on

fingerprints. GTB eDiscovery detects potential violations of data security and compliance before it be-

comes a security incident. This mitigates consequences of laptop loss, intrusions and potential malware

phoning home. Benefits include:

Seeing & Controlling Your Data: In all locations in your network environment

Real-Time Monitoring: Be notified when a user attempts to / saves a file with confidential data

Continuous Compliance: Scan on-demand or scheduled 24/7

Remediation Actions: “Copy” “Move to” “Delete” or “Encrypt” the confidential data you scanned.

Educate Employees on Security & Compliance: Friendly system notifications to the user help

with self-remediation to avoid security events.

Enterprise Reporting: Dynamic reports based on users, departments, channels, geographic loca-

tions, etc.

Pro-active Workflow, Lowering Cost: Be notified and stop a potential breach before it happens.

“Use of advanced data

fingerprinting as the leading

detection mechanism can

provide higher fidelity with

intellectual property use-cases”

Gartner Magic Quadrant

Dec. 2013

Page 4: GTB Technologies Datasheet 2014

Topology

With GTB DLP, organizations receive a comprehensive, scalable data protection solution.

The system is comprehensive and intuitive but more important, easy to use.

For more information and a free risk assessment, visit

us at www.gtbtechnologies.com

Or call 800. 507.9926

© 2014 GTB Technologies, Inc. All rights reserved. GTB Technologies is a registered trademark

of GTB Technologies Inc. in the United States and other international markets. GTB Technolo-

gies has numerous other registered and unregistered trademarks in the United States and inter-

nationally. All other trademarks are the property of their respective owners. 022014

24/7 Support — World-Wide Coverage

“With GTB Technologies,

I can sleep at night, amazing.”

-Pete N. Nationwide Hotelier

US - Newport Beach , CA, New York City, NY

Europe - Poland, Bulgaria, Romania, Ukraine.

Asia Pacific – Taiwan, Malaysia

South America – Mexico , Brazil