Next-generation AAM aircraft unveiled by Supernal, S-A2
GTB IRM - Business Use Cases - 2013
1. Business Use Cases
This document describes the ability of GTB’s DLP Suite in extending its Data
Leakage Prevention policies to External parties such as Business Partners,
Vendors & Contractors once confidential or any business critical information
leaves the network perimeter.
GTB Technologies, Inc. - Confidential 2012.
2. GTB DLP Suite – Information Rights Management - Use Case 1
Do you have confidential information which
only a specific employee group, while in
employment, should use?
Research data, business plans, forward- protects information from
looking financial statements and MIS leakage due to malicious intent, errors and
reports are just some examples of omissions, as well as lack of awareness, by
information which are best used only providing a persistent, information-locked
within the walls of the enterprise. method of protection.
Malicious intent, errors and omissions This means that confidential information
and lack of awareness could make this remains confidential post distribution.
information publicly available leading to
potential losses.
GTB Technologies, Inc. - Confidential 2012.
3. GTB DLP Suite – Information Rights Management - Use Case 2
Do you send confidential information to
vendors?
Typically, confidential information sent to enables you to control the
vendors is governed by non disclosure usage of information sent to vendors and
agreements without a mechanism to prevent unauthorized viewing, printing,
enforce or track the agreement. editing and distributing of the information.
Therefore you are dependent on the
vendors' systems and processes for the Information can also be remotely made
confidentiality of your critical unusable in case the relationship ends.
information.
Loss of information from the vendor
could lead to reputation and legal risks
for your enterprise.
GTB Technologies, Inc. - Confidential 2012.
4. GTB DLP Suite – Information Rights Management - Use Case 3
Do you frequently establish
temporary / project-based relationships
with partners and contractors?
Temporary relationships with partners enables you to “retract”
and vendors for a specific project information shared with business partners
typically leads to extensive information after a specified period thus protecting
sharing during the execution. intellectual property and driving revenues.
After the project ends, the information This means that collaboration with partners
and intellectual property shared can now become open and free.
continues to be retained and used by the
partner, sometimes against the
enterprise, leading to financial losses.
GTB Technologies, Inc. - Confidential 2012.
5. GTB DLP Suite – Information Rights Management - Use Case 4
Do you need to monitor the flow and usage
of confidential information for compliance
to ISO, PCI, SOX ?
While GRC technologies and processes provides comprehensive and
effectively monitor and control access detailed audit trails for information usage
rights within applications and folders, including the WHO, WHAT, WHEN and
they do not effectively track the flow WHERE of the usage. This includes
and usage of unstructured information authorized activities and unauthorized
in the form of documents and emails. attempts.
Confidential information traverses Compliance costs can significantly be
department and organization reduced by using these out-of-the-box
boundaries in unstructured forms reports.
without effective controls or monitoring
of its use.
GTB Technologies, Inc. - Confidential 2012.
6. GTB DLP Suite – Information Rights Management - Use Case 5
Do you receive confidential information
(and the associated liability) from
customers ?
Confidential, personally identifiable enables you to control
information received from customers information received from customers to
comes with the liability of revenue and specific people and specific usage, thus
reputation loss in case it gets leaked from increasing accountability of information
within your enterprise. usage and providing comfort to your
customers.
Information breaches could loss legal,
monetary and reputation losses for This means that customer data remains safe
enterprises. when it is with you and even when you
share it with downstream vendors.
GTB Technologies, Inc. - Confidential 2012.
7. GTB DLP Suite – Information Rights Management - Use Case 6
Do you generate revenue by providing
reports & other information?
Information and reports sent to one prevents revenue leakage of
“paid” customer typically lands up with documents and reports by restricting
multiple people and enterprises leading unauthorized viewing, copying and
to many “unpaid” customers. distribution, thus driving revenues and
preventing piracy.
Revenue leaks thus caused directly
affect the bottom line of the company.
THE GTB DLP SUITE
We put the “P” back into “DLP”
GTB Technologies, Inc. - Confidential 2012.