GTB Technologies Inspector
0.00

Problems that solves

Shortage of inhouse software developers

Shortage of inhouse IT resources

Shortage of inhouse IT engineers

High costs of IT personnel

Values

Enhance Staff Productivity

Reduce Costs

GTB Technologies Inspector

Data in Motion security and protection

Product presentation

Description

GTB Technologies provides true data protection with the ability to create, manage & enforce DLP security policies based on content &/ context for when, where, how and by whom data can or can't be moved to or from the network &/ devices. Based on patented, and patent pending, proprietary technology; GTB's Inspector , a "Content-Aware Reverse Firewall"TM inspects, classifies and analyzes ALL outbound &/ inbound data transmissions from your network in real time. We're talking about ALL Channels and ALL types of data, structured and /or unstructured. Once a unique threshold of protected data is detected, the GTB Inspector enforces the appropriate action such as
  • Log
  • Encrypt
  • Quarantine
  • Block
  • Severity Block
  • Pass
Employee / End User Education and Security Awareness: With the belief that education is the most important aspect of security, the GTB Inspector will stop embarrassing or costly mistakes users make on a daily basis. With the GTB Inspector organization have the ability to notify employees of a potential security breach / or policy infraction with providing the ability to remediate. Furthermore, despite company policies forbidding the practice, employees frequently utilize peer to peer applications. Microsoft Networks and similar protocols, initially designed for LAN, are perfectly capable of working over the InternetThe Security Administrator will be notified and take appropriate action. The GTB Inspector can be in transparent mode to gain visibility to user behavior. Apply Data Security for Global Governance, Risk & Compliance (GRC) Organizations become secured and compliant with government data security regulations as it relates to Sarbanes Oxley, GLBA, HIPAA, PII, CA SB1386, CA AB1950, Payment Card Industry (PCI) Data Security Standard, The Patriot Act, FISMA, FERC/NERC, GDPR and many others. We provide comprehensive and detailed reporting for your auditors to prove you are doing what it takes to be compliant and abide by the mandatory mandates. Insider Threats & User Errors New programs requiring the use of unconventional protocols are becoming increasingly more prevalent. Content Inspection is mandatory to know what users are doing and on what channel. Recent studies show the more popular protocols users utilize are email, webmail, FTP, and IM. Having content inspection on these protocols will allow the ability to have a healthy business process and still stop the malicious anomaly of a disgruntled insider. Have Malware? Now What? Malicious applications (e.g., viruses and worms) can be utilized to transfer data across a broad variety of protocols. So supporting just SMTP, HTTP, FTP and IM is a real limitation for the majority of DLP Solutions and is not real DLP. We know malware and other bot-nets use unknown ports and protocols to send out the sensitive PII/PHI data so organizations must have coverage of all 65,000+ ports and protocols, or ways of communicating. Resulting in malicious or unintentional transmissions of confidential data over the network are identified and blocked. Immediately & easily integrate actions to protect against threats (external and multi vector such as malware, trusted users or employee error) by:
  • Automatically setup data ex-filtration blocking controls to prevent the compromising of sensitive data
  • ID infected machines and bring into action containment controls
  • Speed up forensic investigations
The GTB Inspector, the Data Loss Prevention (DLP) device placed at the network edge (more than one device can be installed if necessary.) The Content-Aware Reverse Firewall offers mass communication features and is compatible with multiple devices and multiple protocols. Send alerts to different applications including a SIEM, inbox, syslogs and the like Integrate accurate, expansive data security events and analytics into your SIEM or favorite application for better data protection. Find out Which Threats are within your organization
  • 1GB speed outbound bandwidth
  • Support for ALL protocols
  • Intellectual Property Protection
  • Multi-language support
  • Detection of Encrypted Content
  • Scalability to outbound network bandwidth
  • Enterprise Workflow
  • Multi-location Central Management Console
  • SIEM integration
  • Designed for unattended, maintenance free operation