SlideShare a Scribd company logo
1 of 29
GTB DLP Suit
                 Content-aware
                 Security Suite
True DLP for Data Protection

        Uzi Yair May 2012
AGENDA


•   Who we are?
•   What is DLP?
•   Why say we are next generation?
•   Enterprise configuration?
•   How to prevent your data loss?
Who we are?

• Founded: 2005
• Ownership: Private and self funded
• Headquarter: Newport Beach, CA
    – Development in Kiev, Ukraine
    – International Office in Tel Aviv, Taipei, Kuala Lumpur, Tokyo, Kiev
• Security Segment: Data Loss Prevention + EDRM (IRM)
• Target verticals: Financial Institutions, Government, High Tech,
  Healthcare
• Channel Partners: UK, Poland, Slovenia, Turkey, Italy, France,
  Russia, Kenya, Taiwan, Philippines, Singapore, Japan, South
  Korea, Malaysia, Mexico, Romania
• Named Accounts:
    –   Apple Computer
    –   American Greetings
    –   E2V Semi Conductor
    –   Citgo Oil Company
Who we are?


“GTB has primarily focused its efforts on
developing a product with strong
detection capabilities, and continues to
improve the overall user experience. It
has also achieved notable client wins in
the past 12 months, thereby increasing
its overall market presence. “
Gartner DLP MQ 2O11
Awards
What is DLP?
                                           Who sent my data, and…
                                           to who?
                                                         HTTP(S)
   Desktops                                              FTP
   Laptops                     Data in Motion            SMTP
   Network Shares                                        IM
   (NTFS, NFS…)                                          RDP
   SharePoint                                            VNC
   Databases (via ODBC)                                  SSL
                                                         Network Printer
Where is my data?
                                   DATA                  Too many to list here



         Data at Rest                                    Data in Use

                            Cut / Copy
                            Paste                     Set access rights for
                            Print                     data usage
                            Print Screen
                            Access Files
                            Removable Media
What is DLP?
      DLP Answers 5 questions:
                            Desktops
                            Laptops
Where is my data?           Network Shares (NTFS, NFS…)
                            SharePoint
                            Databases

                            Trusted users
                            Intruders
Who is sending my data?     Spyware
                            Viruses

                            PII
                            PHI
What data is sent?          Source Code
                            Intel. Property


                            IP address
Who received my data?       Email destination
                            Geographic location

                            Cut / Copy
                            Paste
                            Print
How do I protect my data?   Print Screen
                            Access Files
                            Removable media
Why is GTB next generation DLP?


                   GTB Inspector for Network




                         GTB Central
  GTB Endpoint                                 GTB eDiscovery
                          Console
    Protector                                    to find your
                         control and
for endpoint end                               sensitive Data at
  device control         monitor all                  Rest
                          behavior


                            GTB IRM
                   Full content-aware Rights
                     Management System
Why is GTB Next Generation DLP?
                                         HTTP(S)
                                         FTP
                                         SMTP
                                         IM
                       Data in Motion    Network Printer
                                         SSL
Desktops                                 RDP
Laptops                                  VNC
Network Shares                           SSH
                                         Webmail
(NTFS, NFS…)                             TCP on all ports
SharePoint                 DATA
Databases (via ODBC)

    Data at Rest                              Data in Use

                                        Cut / Copy
                                        Paste
                                        Print
                                        Print Screen
                                        Access Files
                                        Removable Media
Data Protection Architecture
How to prevent your data loss?


      Support multi-language content
                                                    MTA and Smart Host
                filtering
                                                    Integration with any
            Supports all file types
                                                       external proxy

       Scan ports 0 to 65,535on all                Enforces content-based
              TCP channels                             policies based

            Integrates with SEIM               Alerts violators, Managers


      Scalable with Load Balancing                  SSL Content Filtering

       Redacts text from emails in
                                                       Educates users
                real-time

       Seamless integration with             Quarantines email with user
       email Encryption gateways                    remediation

                                                                   Enforcement
                             Quaranti   Severity
      Log          Block
                               ne        Block
                                                       Pass          actions
How to prevent your data loss?
How to specify/fingerprint files ?




       Controls granularity of detection
                 size in bytes
Customized Policy definitions for
     protecting PII and PHI
Detailed Events Data Forensics
Management Log




        Complete Auditing
How to prevent data loss at the
         Endpoints?


   USB Drives

   iPod, other mp3 players

   CD/DVD

   Firewire

   SD cards

   Floppy drives

   Bluetooth

   Wi-Fi

   Other I/O devices
How to prevent data loss?


                            Endpoint Protector access control


   Active Directory rules                 File rules            Device rules

Entire domain rules             File group rules        Bus type

Group rules                     File type rules         Device type

Computer rules                                          Device drive name

Individual user rules                                   Volume number
How to prevent data loss?


    Endpoint Protector Enforcement actions

BLOCK
LOG
SHADOW
ENCRYPT


            Endpoint Protector reporting
Built in Table reports
Built in Crystal reports
Central Console reports
How to prevent your data loss?



                    Features                                Benefits

  Agent Based solution                      Scans thousands of computers at same
                                            time with no performance degradation

  High performance                          Network friendly
  Protects all file formats (binary/text)   Secures all content including Source
                                            Code, Audio, Video and text files
  Protects database records & fields        Ensures regulatory compliance
  Virtually zero false positive rate        Highest precision
  Insures absence of violations             No false negatives
  Automatic or manual discovery             Non-stop data protection
  Customized data type definition           Discovers data unique to your business
  Unattended operation                      Maintenance free
How to prevent your data loss?]




                                            Different Rights
                             Various            View            Edit          Print     Copy/Paste      Time        Location
                             Users                                                                      Limit

                              USER 1                                                                                Office
                              USER 2                                                                    1-5
                                                                                                        Jan
Usage Rights Matrix
                              USER 3

                              USER 4                                                                                Office
     Examples of protected files                                               Representative form of Usage Rights Matrix


                                                                                                                … & other
                                                                                                                combinations


               View only           View & Edit only
                                                      Seclore Policy Server (PS) only
                                                               View & Distribute          View & Print only
How to prevent data loss?




Unified policies for Network, eDiscovery Endpoint and IRM
GTB Enterprise DLP Suite Solution Matrix
                                                                           GTB         GTB        GTB Rights     GTB      GTB DLP
Feature
                                                                        Inspector   eDiscovery   Management    Endpoint    Suite

Real-time network traffic inspection                                       √                                                √
Sensitive data-at-rest discovery                                                        √            √                      √
Removable devices inspection                                                                         √            √         √
Blocking leakage of the sensitive data                                     √                         √            √         √
Pattern-based inspection                                                   √            √            √            √         √

Structured data inspection (Recursive Transitional Gaps ™ Technology)      √            √            √            √         √

Unstructured data inspection (Recursive Transitional Gaps™
Technology)
                                                                           √            √            √            √         √

SSL/TLS Inspection                                                         √                                                √
Email notification and alerting                                            √            √                         √         √
Active Directory integration                                               √            √            √            √         √
Security data encryption                                                   √            √            √            √         √
Information usage policies support                                                      √            √                      √
Audit of the usage of the information                                                   √            √                      √
Email Encryption                                                           √                                                √
Data classification                                                                     √            √                      √

Antiphishing, Antivirus, spam and malware detection                        √                                                √

Web Filtering                                                              √                                                √
Easy deployment and maintenace                                             √            √                         √         √
Centralized reporting (GTB Central Console)                                √            √                         √         √
The competition?
Others?
Feature / Functionality                                        GTB                                  Websense
Channel coverage -       ability to BLOCK
HTTP Server                                                      √                                        No
HTTP/HTTPS                                                       √                                        √
HTTP Tunnel                                                      √                                        No
FTP                                                              √                                        No
FTP Server                                                       √                                        No
IM                                                               √                                        No
P2P                                                              √                                        No
SMTP Mail                                                        √                                        √
SSL                                                              √                                        No
Unknown Protocols                                                √                                        No
Webmail                                                          √                                        √
SSH                                                              √                                        No
Telenet                                                          √                                        No
SFTP, SSMTP                                                      √                                        No
POP3                                                             √                                        No
Printing                                                         √                                        √
Fingeprinting                                                    √                                        √
Central Policy Console                                           √                                        √
                                            Voltage, Zix, Sophos, Secureworks, Secure
Email Encryption support                    Computing, PostX, Tumbleweed, Symantec, Front Voltage
                                            bridge, Exchange, Positini,Perimeter
Smart Host                                                      √                        unknown
SEIM integration                                                √                                          √
Workflow                                                        √                                          √
ICAP support                                                    √                                          √
                                            TMG, Blue Coat, Ironport, Squid,Webroot,
Proxy support                                                                            TMG, Blue Coat, Squid
                                            Mcafee, others
Endpoint protection                                             √                                          √
eDiscovery                                                      √                                          √
When will you start?




High accuracy of detection and a full range of defense capabilities

              Flexible data manipulation detection

The largest set of protocol support and file format independence

  High efficiency and without interrupting the network status

                 Encryption is no longer an issue

      Comprehensive policy framework for data protection
We are ready when you are!
Live Product Demo
GTB DLP - Content Aware Security Suite

More Related Content

What's hot

Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
Gtb Dlp & Irm Solution Product And Deployment Overview
Gtb Dlp & Irm Solution   Product And Deployment OverviewGtb Dlp & Irm Solution   Product And Deployment Overview
Gtb Dlp & Irm Solution Product And Deployment Overviewgtbsalesindia
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive OverviewKim Jensen
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Security Awareness in ambito scolastico
Security Awareness in ambito scolasticoSecurity Awareness in ambito scolastico
Security Awareness in ambito scolasticoGiampaolo Franco
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansDavid J Rosenthal
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsLiwei Ren任力偉
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
#MSCollabMTL 2019: Mettre en place une gouvernance pour la power platform. #P...
#MSCollabMTL 2019: Mettre en place une gouvernance pour la power platform. #P...#MSCollabMTL 2019: Mettre en place une gouvernance pour la power platform. #P...
#MSCollabMTL 2019: Mettre en place une gouvernance pour la power platform. #P...Nicolas Georgeault
 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses TodayVelocity Network Solutions
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 

What's hot (20)

Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Gtb Dlp & Irm Solution Product And Deployment Overview
Gtb Dlp & Irm Solution   Product And Deployment OverviewGtb Dlp & Irm Solution   Product And Deployment Overview
Gtb Dlp & Irm Solution Product And Deployment Overview
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Azure information protection
Azure information protectionAzure information protection
Azure information protection
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Security Awareness in ambito scolastico
Security Awareness in ambito scolasticoSecurity Awareness in ambito scolastico
Security Awareness in ambito scolastico
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and Algorithms
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
#MSCollabMTL 2019: Mettre en place une gouvernance pour la power platform. #P...
#MSCollabMTL 2019: Mettre en place une gouvernance pour la power platform. #P...#MSCollabMTL 2019: Mettre en place une gouvernance pour la power platform. #P...
#MSCollabMTL 2019: Mettre en place une gouvernance pour la power platform. #P...
 
Data Loss Prevention in Office 365
Data Loss Prevention in Office 365Data Loss Prevention in Office 365
Data Loss Prevention in Office 365
 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 

Similar to GTB DLP - Content Aware Security Suite

Gtb Product Technical Present
Gtb Product Technical PresentGtb Product Technical Present
Gtb Product Technical Presentgtbsalesindia
 
Solving the Really Big Tech Problems with IoT
 Solving the Really Big Tech Problems with IoT Solving the Really Big Tech Problems with IoT
Solving the Really Big Tech Problems with IoTEric Kavanagh
 
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review   Can Your Dlp Provider Protect You From The CloudGtb Technology Review   Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloudgtbsalesindia
 
Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Crew
 
Insights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionInsights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionAbhinav Biswas
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Crew
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxalex hincapie
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Crew
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginNovell
 
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016David Glover
 
Utilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentUtilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentMicrosoft Technet France
 
How a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of VisibilityHow a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of Visibilityeladgotfrid
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesAbhinav Biswas
 
AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014Leonard Cibelli
 

Similar to GTB DLP - Content Aware Security Suite (20)

Gtb Product Technical Present
Gtb Product Technical PresentGtb Product Technical Present
Gtb Product Technical Present
 
Vormetric - Gherkin Event
Vormetric - Gherkin EventVormetric - Gherkin Event
Vormetric - Gherkin Event
 
Introduction
IntroductionIntroduction
Introduction
 
Solving the Really Big Tech Problems with IoT
 Solving the Really Big Tech Problems with IoT Solving the Really Big Tech Problems with IoT
Solving the Really Big Tech Problems with IoT
 
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review   Can Your Dlp Provider Protect You From The CloudGtb Technology Review   Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
 
Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to Fit
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Insights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionInsights Into Modern Day Threat Protection
Insights Into Modern Day Threat Protection
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron?
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLogin
 
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
 
Cloud desktop for byod
Cloud desktop for byodCloud desktop for byod
Cloud desktop for byod
 
Utilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentUtilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligent
 
How a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of VisibilityHow a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of Visibility
 
Modern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for EnterprisesModern Cyber Threat Protection techniques for Enterprises
Modern Cyber Threat Protection techniques for Enterprises
 
AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014AD_FTKX_BRO_ENG_19Nov2014
AD_FTKX_BRO_ENG_19Nov2014
 

Recently uploaded

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 

Recently uploaded (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

GTB DLP - Content Aware Security Suite

  • 1. GTB DLP Suit Content-aware Security Suite True DLP for Data Protection Uzi Yair May 2012
  • 2. AGENDA • Who we are? • What is DLP? • Why say we are next generation? • Enterprise configuration? • How to prevent your data loss?
  • 3. Who we are? • Founded: 2005 • Ownership: Private and self funded • Headquarter: Newport Beach, CA – Development in Kiev, Ukraine – International Office in Tel Aviv, Taipei, Kuala Lumpur, Tokyo, Kiev • Security Segment: Data Loss Prevention + EDRM (IRM) • Target verticals: Financial Institutions, Government, High Tech, Healthcare • Channel Partners: UK, Poland, Slovenia, Turkey, Italy, France, Russia, Kenya, Taiwan, Philippines, Singapore, Japan, South Korea, Malaysia, Mexico, Romania • Named Accounts: – Apple Computer – American Greetings – E2V Semi Conductor – Citgo Oil Company
  • 4. Who we are? “GTB has primarily focused its efforts on developing a product with strong detection capabilities, and continues to improve the overall user experience. It has also achieved notable client wins in the past 12 months, thereby increasing its overall market presence. “ Gartner DLP MQ 2O11
  • 6. What is DLP? Who sent my data, and… to who? HTTP(S) Desktops FTP Laptops Data in Motion SMTP Network Shares IM (NTFS, NFS…) RDP SharePoint VNC Databases (via ODBC) SSL Network Printer Where is my data? DATA Too many to list here Data at Rest Data in Use Cut / Copy Paste Set access rights for Print data usage Print Screen Access Files Removable Media
  • 7. What is DLP? DLP Answers 5 questions: Desktops Laptops Where is my data? Network Shares (NTFS, NFS…) SharePoint Databases Trusted users Intruders Who is sending my data? Spyware Viruses PII PHI What data is sent? Source Code Intel. Property IP address Who received my data? Email destination Geographic location Cut / Copy Paste Print How do I protect my data? Print Screen Access Files Removable media
  • 8. Why is GTB next generation DLP? GTB Inspector for Network GTB Central GTB Endpoint GTB eDiscovery Console Protector to find your control and for endpoint end sensitive Data at device control monitor all Rest behavior GTB IRM Full content-aware Rights Management System
  • 9. Why is GTB Next Generation DLP? HTTP(S) FTP SMTP IM Data in Motion Network Printer SSL Desktops RDP Laptops VNC Network Shares SSH Webmail (NTFS, NFS…) TCP on all ports SharePoint DATA Databases (via ODBC) Data at Rest Data in Use Cut / Copy Paste Print Print Screen Access Files Removable Media
  • 11. How to prevent your data loss? Support multi-language content MTA and Smart Host filtering Integration with any Supports all file types external proxy Scan ports 0 to 65,535on all Enforces content-based TCP channels policies based Integrates with SEIM Alerts violators, Managers Scalable with Load Balancing SSL Content Filtering Redacts text from emails in Educates users real-time Seamless integration with Quarantines email with user email Encryption gateways remediation Enforcement Quaranti Severity Log Block ne Block Pass actions
  • 12. How to prevent your data loss?
  • 13. How to specify/fingerprint files ? Controls granularity of detection size in bytes
  • 14. Customized Policy definitions for protecting PII and PHI
  • 15. Detailed Events Data Forensics
  • 16. Management Log Complete Auditing
  • 17. How to prevent data loss at the Endpoints? USB Drives iPod, other mp3 players CD/DVD Firewire SD cards Floppy drives Bluetooth Wi-Fi Other I/O devices
  • 18. How to prevent data loss? Endpoint Protector access control Active Directory rules File rules Device rules Entire domain rules File group rules Bus type Group rules File type rules Device type Computer rules Device drive name Individual user rules Volume number
  • 19. How to prevent data loss? Endpoint Protector Enforcement actions BLOCK LOG SHADOW ENCRYPT Endpoint Protector reporting Built in Table reports Built in Crystal reports Central Console reports
  • 20. How to prevent your data loss? Features Benefits Agent Based solution Scans thousands of computers at same time with no performance degradation High performance Network friendly Protects all file formats (binary/text) Secures all content including Source Code, Audio, Video and text files Protects database records & fields Ensures regulatory compliance Virtually zero false positive rate Highest precision Insures absence of violations No false negatives Automatic or manual discovery Non-stop data protection Customized data type definition Discovers data unique to your business Unattended operation Maintenance free
  • 21. How to prevent your data loss?] Different Rights Various View Edit Print Copy/Paste Time Location Users Limit USER 1 Office USER 2 1-5 Jan Usage Rights Matrix USER 3 USER 4 Office Examples of protected files Representative form of Usage Rights Matrix … & other combinations View only View & Edit only Seclore Policy Server (PS) only View & Distribute View & Print only
  • 22. How to prevent data loss? Unified policies for Network, eDiscovery Endpoint and IRM
  • 23. GTB Enterprise DLP Suite Solution Matrix GTB GTB GTB Rights GTB GTB DLP Feature Inspector eDiscovery Management Endpoint Suite Real-time network traffic inspection √ √ Sensitive data-at-rest discovery √ √ √ Removable devices inspection √ √ √ Blocking leakage of the sensitive data √ √ √ √ Pattern-based inspection √ √ √ √ √ Structured data inspection (Recursive Transitional Gaps ™ Technology) √ √ √ √ √ Unstructured data inspection (Recursive Transitional Gaps™ Technology) √ √ √ √ √ SSL/TLS Inspection √ √ Email notification and alerting √ √ √ √ Active Directory integration √ √ √ √ √ Security data encryption √ √ √ √ √ Information usage policies support √ √ √ Audit of the usage of the information √ √ √ Email Encryption √ √ Data classification √ √ √ Antiphishing, Antivirus, spam and malware detection √ √ Web Filtering √ √ Easy deployment and maintenace √ √ √ √ Centralized reporting (GTB Central Console) √ √ √ √
  • 25. Others? Feature / Functionality GTB Websense Channel coverage - ability to BLOCK HTTP Server √ No HTTP/HTTPS √ √ HTTP Tunnel √ No FTP √ No FTP Server √ No IM √ No P2P √ No SMTP Mail √ √ SSL √ No Unknown Protocols √ No Webmail √ √ SSH √ No Telenet √ No SFTP, SSMTP √ No POP3 √ No Printing √ √ Fingeprinting √ √ Central Policy Console √ √ Voltage, Zix, Sophos, Secureworks, Secure Email Encryption support Computing, PostX, Tumbleweed, Symantec, Front Voltage bridge, Exchange, Positini,Perimeter Smart Host √ unknown SEIM integration √ √ Workflow √ √ ICAP support √ √ TMG, Blue Coat, Ironport, Squid,Webroot, Proxy support TMG, Blue Coat, Squid Mcafee, others Endpoint protection √ √ eDiscovery √ √
  • 26. When will you start? High accuracy of detection and a full range of defense capabilities Flexible data manipulation detection The largest set of protocol support and file format independence High efficiency and without interrupting the network status Encryption is no longer an issue Comprehensive policy framework for data protection
  • 27. We are ready when you are!