SlideShare a Scribd company logo
1 of 19
Download to read offline
Enterprise Data Loss Prevention
Content-Aware Reverse Firewall
Sample Customers
Apple, Inc.                                60,000 users



American Greetings                          8,000 users


Bureau of Indian Affairs (US
                                            7,500 users
Government DOI)


Citgo Oil Company                           4,500 users



ESL Federal Credit Union                   1,200 users



SAFE Credit Union                           750 users



San Mateo Credit Union                      650 users
              GTB DLP Suite-Confidential                  Slide 2
What the analysts say:




Copyright 2010          GTB DLP Suite-Confidential   Slide 3
GTB Patent Pending

    1. DLP and DLD for inspecting all outbound content and
        comparing it to stored data

    2. DLP and DLD for inspecting all outbound content using
        search index of confidential data

    3. DLP and DLD for inspecting all outbound content
        using multiple fingerprints of confidential data




Copyright 2010             GTB DLP Suite-Confidential          Slide 4
The GTB DLP Components
                              Cloud Enabled – Any VM

           GTB Inspector            GTB Endpoint DLP                eDiscovery
           Reverse Firewall             Device Control         Search & Classification

       • Scans all outbound        • Discovers devices         • Scan Desktops
         traffic                   • Protects devices          • Scans file shares
       • Highest accuracy          • Audits devices            • Reports on
       • Able to block             • Controls devices            vulnerable files
         without a proxy           • Content-Aware             • Enforces IRM
         server                                                • Automatic batch
       • File format                                           • Monitors shares
         agnostic                                                and PC’s

                                   Supports all languages
                          Centralized policy, reporting and workflow

Copyright 2010                    GTB DLP Suite-Confidential                             Slide 5
In the Development Pipeline


   • Protection for sites such as: https://use.cloudshare.com
   • Mobile devices DLP
   • Network traffic analysis/protection
   • Network Recorder
   • Detection of additional encrypted content and protocols
   • IPv6 support
   • IDS/IPS + Virus, SPAM and Malware protection



Copyright 2010               GTB DLP Suite-Confidential         Slide 6
DLP answers 4 questions:


     1. Where is my    2. Who is sending          3. What data is   4. Who is receiving
         data?             my data?                 being sent?         my data?
 •   Desktops         • Insiders              •   PII               • IP address
 •   Laptops          • Intruders             •   PHI               • Email destination
 •   File shares      • Spyware/Viruses       •   Source Code       • Geographic
 •   SharePoint                               •   IP                  location




Copyright 2010                   GTB DLP Suite-Confidential                        Slide 7
The 8 use-cases for Network DLP


 1. Control a broken           2. Demonstrate             3. Automate Email       4. Detect or Block
  business process               Compliance                   Encryption          encrypted content
•Who is sending, what      •I have no way of           •How do I automate        •Should I allow
 data and to whom?          enforcing data loss         encrypting emails         encrypted data to
                            compliance regulation       which require it?         leave without
                                                                                  content inspection?


                                                          7. Detect/Block TCP       8. Employees’
 5. Severity Blocking         6. Visibility to SSL
                                                        from non-trusted users        Education
•Some breaches are so      •I have no visibility to    •How do I detect          •My employees are
 severe that I prefer to    SSL in general and          transmissions from        not complying with
 altogether block           HTTPS in particular!        non-trusted users         the Written
 them!                                                  (Malware/Viruses/Troj     Information Security
                                                        ans)                      Policy (WISP)




  Copyright 2010                          GTB DLP Suite-Confidential                          Slide 8
What data must be protected?
                    Personal identifiable information (PII)

             •   Credit card number
             •   Social security number
             •   Customer name
             •   Address
             •   Telephone number
             •   Account number/Member number
             •   PIN or password
             •   Username & password
             •   Drivers license number
             •   Date of birth
Copyright 2010               GTB DLP Suite-Confidential       Slide 9
Enterprise class DLP




Copyright 2010       GTB DLP Suite-Confidential   Slide 10
Network DLP configuration - OOL
                           •Log

             Enforcement   •Encrypt
             Actions       •Quarantine
                           •Severity Block
                           •Redact

                                             Mirror/SPAN port




                                                                The GTB Inspector is an
                                                                appliance that can be deployed
                                                                in Bridge / Out of Line through
                                                                a SPAN/Mirror port and is
                                                                available as a VM image as well.



           Scans all TCP channels on all 65,535 ports
Copyright 2010             GTB DLP Suite-Confidential                                         Slide 11
Secure mail integration




Copyright 2010         GTB DLP Suite-Confidential   Slide 12
HTTPS visibility
                                 Multiple Choices

  Choices:
  1. Connect 443 port through
      any ICAP Client
  2. Connect Directly to the
      GTB SSL Proxy




Copyright 2010                  GTB DLP Suite-Confidential   Slide 13
GTB advanced fingerprinting technology – Structured data




 Copyright 2010      GTB DLP Suite-Confidential    Slide 14
Fingerprint Detection Engine –Structured Data
                 The most accurate detection engine in the DLP space


                        Feature                                                 Benefit

Can fingerprint any database                            Highest flexibility

Multi-field detection                                   No false positives

Automatic fingerprints refresh                          Easy maintenance and operation

                                                        Automatically deletes fingerprints that are no longer
Options for time-based sensitive content
                                                        sensitive

Supports user-defined fields                            Protects your direct business data

Fingerprints 1 million fields in 10 minutes             Very high performance




   Copyright 2010                             GTB DLP Suite-Confidential                               Slide 15
GTB advanced fingerprinting technology - Files
Fingerprint Detection Engine – Unstructured Data
                 The most accurate detection engine in the DLP space


                     Feature                                                  Benefit
Multiple data stream fingerprints using
                                                     Allows for partial file match
proprietary algorithm

Options for binary or text detection                 Detects images inside files

Options for excluded content                         Detects sensitive data only

                                                     Automatically deletes fingerprints that are no longer
Options for time-based sensitive content
                                                     sensitive

User defined sensitivity (in bytes)                  Highest possible control on what is detected

Virtual zero false positive rate                     Highest accuracy

Multi-language support                               Files in any language can be protected




   Copyright 2010                          GTB DLP Suite-Confidential                               Slide 17
Data Patterns Detection


        • Extended REGEX templates out of the box

        • Patterns defined through REGEX in PHP
        • Lexicons support
        • User defined severity level per pattern rule
        • Multi field weights and occurrences
        • Support for all languages




Copyright 2010               GTB DLP Suite-Confidential   Slide 18
Deployment requirements

                 Inspector             Endpoint                 eDiscovery

             • 40 GB HD           • Windows Server           • Runs on any
             • VMware Server      • Runs on any                windows OS
             • 4GB RAM              windows OS


                 The GTB Inspector is also available as an appliance


                               www.gttb.com


Copyright 2010                  GTB DLP Suite-Confidential                   Slide 19

More Related Content

What's hot

Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Iftikhar Ali Iqbal
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021Chaitanya chandra sekhar
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification PresentationDerroylo
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Dock 365
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations♟Sergej Epp
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 

What's hot (20)

Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification Presentation
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 

Similar to Gtb Dlp Suite Presentation

GTB DLP Suite Presentation
GTB DLP Suite PresentationGTB DLP Suite Presentation
GTB DLP Suite Presentationgtbsalesindia
 
Gtb Dlp & Irm Solution Product And Deployment Overview
Gtb Dlp & Irm Solution   Product And Deployment OverviewGtb Dlp & Irm Solution   Product And Deployment Overview
Gtb Dlp & Irm Solution Product And Deployment Overviewgtbsalesindia
 
GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Preventionrefaeli
 
GTB - Protecting PII in the EU
GTB - Protecting PII in the EUGTB - Protecting PII in the EU
GTB - Protecting PII in the EUVCW Security Ltd
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteVCW Security Ltd
 
Gtb Product Technical Present
Gtb Product Technical PresentGtb Product Technical Present
Gtb Product Technical Presentgtbsalesindia
 
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review   Can Your Dlp Provider Protect You From The CloudGtb Technology Review   Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloudgtbsalesindia
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014Ravindran Vasu
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Blueinfy Solutions
 
GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014Ravindran Vasu
 
AGC - San Francisco - 2013
AGC - San Francisco - 2013AGC - San Francisco - 2013
AGC - San Francisco - 2013Seculert
 
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & LoggingDSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & LoggingAndris Soroka
 
PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015Mike Spaulding
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginNovell
 
Cloud Connect
Cloud ConnectCloud Connect
Cloud Connectctrlsblog
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2
 
CIS 2015 Extreme SAML - Hans Zandbelt
CIS 2015 Extreme SAML - Hans ZandbeltCIS 2015 Extreme SAML - Hans Zandbelt
CIS 2015 Extreme SAML - Hans ZandbeltCloudIDSummit
 
iOS application (in)security
iOS application (in)securityiOS application (in)security
iOS application (in)securityiphonepentest
 
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...Priyanka Aash
 

Similar to Gtb Dlp Suite Presentation (20)

GTB DLP Suite Presentation
GTB DLP Suite PresentationGTB DLP Suite Presentation
GTB DLP Suite Presentation
 
Gtb Dlp & Irm Solution Product And Deployment Overview
Gtb Dlp & Irm Solution   Product And Deployment OverviewGtb Dlp & Irm Solution   Product And Deployment Overview
Gtb Dlp & Irm Solution Product And Deployment Overview
 
GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Prevention
 
GTB - Protecting PII in the EU
GTB - Protecting PII in the EUGTB - Protecting PII in the EU
GTB - Protecting PII in the EU
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
 
Gtb Product Technical Present
Gtb Product Technical PresentGtb Product Technical Present
Gtb Product Technical Present
 
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review   Can Your Dlp Provider Protect You From The CloudGtb Technology Review   Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014GTB Technologies Datasheet 2014
GTB Technologies Datasheet 2014
 
AGC - San Francisco - 2013
AGC - San Francisco - 2013AGC - San Francisco - 2013
AGC - San Francisco - 2013
 
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & LoggingDSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
 
PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLogin
 
Cloud Connect
Cloud ConnectCloud Connect
Cloud Connect
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
CIS 2015 Extreme SAML - Hans Zandbelt
CIS 2015 Extreme SAML - Hans ZandbeltCIS 2015 Extreme SAML - Hans Zandbelt
CIS 2015 Extreme SAML - Hans Zandbelt
 
iOS application (in)security
iOS application (in)securityiOS application (in)security
iOS application (in)security
 
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
 

Gtb Dlp Suite Presentation

  • 1. Enterprise Data Loss Prevention Content-Aware Reverse Firewall
  • 2. Sample Customers Apple, Inc. 60,000 users American Greetings 8,000 users Bureau of Indian Affairs (US 7,500 users Government DOI) Citgo Oil Company 4,500 users ESL Federal Credit Union 1,200 users SAFE Credit Union 750 users San Mateo Credit Union 650 users GTB DLP Suite-Confidential Slide 2
  • 3. What the analysts say: Copyright 2010 GTB DLP Suite-Confidential Slide 3
  • 4. GTB Patent Pending 1. DLP and DLD for inspecting all outbound content and comparing it to stored data 2. DLP and DLD for inspecting all outbound content using search index of confidential data 3. DLP and DLD for inspecting all outbound content using multiple fingerprints of confidential data Copyright 2010 GTB DLP Suite-Confidential Slide 4
  • 5. The GTB DLP Components Cloud Enabled – Any VM GTB Inspector GTB Endpoint DLP eDiscovery Reverse Firewall Device Control Search & Classification • Scans all outbound • Discovers devices • Scan Desktops traffic • Protects devices • Scans file shares • Highest accuracy • Audits devices • Reports on • Able to block • Controls devices vulnerable files without a proxy • Content-Aware • Enforces IRM server • Automatic batch • File format • Monitors shares agnostic and PC’s Supports all languages Centralized policy, reporting and workflow Copyright 2010 GTB DLP Suite-Confidential Slide 5
  • 6. In the Development Pipeline • Protection for sites such as: https://use.cloudshare.com • Mobile devices DLP • Network traffic analysis/protection • Network Recorder • Detection of additional encrypted content and protocols • IPv6 support • IDS/IPS + Virus, SPAM and Malware protection Copyright 2010 GTB DLP Suite-Confidential Slide 6
  • 7. DLP answers 4 questions: 1. Where is my 2. Who is sending 3. What data is 4. Who is receiving data? my data? being sent? my data? • Desktops • Insiders • PII • IP address • Laptops • Intruders • PHI • Email destination • File shares • Spyware/Viruses • Source Code • Geographic • SharePoint • IP location Copyright 2010 GTB DLP Suite-Confidential Slide 7
  • 8. The 8 use-cases for Network DLP 1. Control a broken 2. Demonstrate 3. Automate Email 4. Detect or Block business process Compliance Encryption encrypted content •Who is sending, what •I have no way of •How do I automate •Should I allow data and to whom? enforcing data loss encrypting emails encrypted data to compliance regulation which require it? leave without content inspection? 7. Detect/Block TCP 8. Employees’ 5. Severity Blocking 6. Visibility to SSL from non-trusted users Education •Some breaches are so •I have no visibility to •How do I detect •My employees are severe that I prefer to SSL in general and transmissions from not complying with altogether block HTTPS in particular! non-trusted users the Written them! (Malware/Viruses/Troj Information Security ans) Policy (WISP) Copyright 2010 GTB DLP Suite-Confidential Slide 8
  • 9. What data must be protected? Personal identifiable information (PII) • Credit card number • Social security number • Customer name • Address • Telephone number • Account number/Member number • PIN or password • Username & password • Drivers license number • Date of birth Copyright 2010 GTB DLP Suite-Confidential Slide 9
  • 10. Enterprise class DLP Copyright 2010 GTB DLP Suite-Confidential Slide 10
  • 11. Network DLP configuration - OOL •Log Enforcement •Encrypt Actions •Quarantine •Severity Block •Redact Mirror/SPAN port The GTB Inspector is an appliance that can be deployed in Bridge / Out of Line through a SPAN/Mirror port and is available as a VM image as well. Scans all TCP channels on all 65,535 ports Copyright 2010 GTB DLP Suite-Confidential Slide 11
  • 12. Secure mail integration Copyright 2010 GTB DLP Suite-Confidential Slide 12
  • 13. HTTPS visibility Multiple Choices Choices: 1. Connect 443 port through any ICAP Client 2. Connect Directly to the GTB SSL Proxy Copyright 2010 GTB DLP Suite-Confidential Slide 13
  • 14. GTB advanced fingerprinting technology – Structured data Copyright 2010 GTB DLP Suite-Confidential Slide 14
  • 15. Fingerprint Detection Engine –Structured Data The most accurate detection engine in the DLP space Feature Benefit Can fingerprint any database Highest flexibility Multi-field detection No false positives Automatic fingerprints refresh Easy maintenance and operation Automatically deletes fingerprints that are no longer Options for time-based sensitive content sensitive Supports user-defined fields Protects your direct business data Fingerprints 1 million fields in 10 minutes Very high performance Copyright 2010 GTB DLP Suite-Confidential Slide 15
  • 16. GTB advanced fingerprinting technology - Files
  • 17. Fingerprint Detection Engine – Unstructured Data The most accurate detection engine in the DLP space Feature Benefit Multiple data stream fingerprints using Allows for partial file match proprietary algorithm Options for binary or text detection Detects images inside files Options for excluded content Detects sensitive data only Automatically deletes fingerprints that are no longer Options for time-based sensitive content sensitive User defined sensitivity (in bytes) Highest possible control on what is detected Virtual zero false positive rate Highest accuracy Multi-language support Files in any language can be protected Copyright 2010 GTB DLP Suite-Confidential Slide 17
  • 18. Data Patterns Detection • Extended REGEX templates out of the box • Patterns defined through REGEX in PHP • Lexicons support • User defined severity level per pattern rule • Multi field weights and occurrences • Support for all languages Copyright 2010 GTB DLP Suite-Confidential Slide 18
  • 19. Deployment requirements Inspector Endpoint eDiscovery • 40 GB HD • Windows Server • Runs on any • VMware Server • Runs on any windows OS • 4GB RAM windows OS The GTB Inspector is also available as an appliance www.gttb.com Copyright 2010 GTB DLP Suite-Confidential Slide 19