SlideShare a Scribd company logo
Enterprise Data Loss Prevention
Content-Aware Reverse Firewall
Sample Customers
Apple, Inc.                                60,000 users



American Greetings                          8,000 users


Bureau of Indian Affairs (US
                                            7,500 users
Government DOI)


Citgo Oil Company                           4,500 users



ESL Federal Credit Union                   1,200 users



SAFE Credit Union                           750 users



San Mateo Credit Union                      650 users
              GTB DLP Suite-Confidential                  Slide 2
What the analysts say:




Copyright 2010          GTB DLP Suite-Confidential   Slide 3
GTB Patent Pending

    1. DLP and DLD for inspecting all outbound content and
        comparing it to stored data

    2. DLP and DLD for inspecting all outbound content using
        search index of confidential data

    3. DLP and DLD for inspecting all outbound content
        using multiple fingerprints of confidential data




Copyright 2010             GTB DLP Suite-Confidential          Slide 4
The GTB DLP Components
                              Cloud Enabled – Any VM

           GTB Inspector            GTB Endpoint DLP                eDiscovery
           Reverse Firewall             Device Control         Search & Classification

       • Scans all outbound        • Discovers devices         • Scan Desktops
         traffic                   • Protects devices          • Scans file shares
       • Highest accuracy          • Audits devices            • Reports on
       • Able to block             • Controls devices            vulnerable files
         without a proxy           • Content-Aware             • Enforces IRM
         server                                                • Automatic batch
       • File format                                           • Monitors shares
         agnostic                                                and PC’s

                                   Supports all languages
                          Centralized policy, reporting and workflow

Copyright 2010                    GTB DLP Suite-Confidential                             Slide 5
In the Development Pipeline


   • Protection for sites such as: https://use.cloudshare.com
   • Mobile devices DLP
   • Network traffic analysis/protection
   • Network Recorder
   • Detection of additional encrypted content and protocols
   • IPv6 support
   • IDS/IPS + Virus, SPAM and Malware protection



Copyright 2010               GTB DLP Suite-Confidential         Slide 6
DLP answers 4 questions:


     1. Where is my    2. Who is sending          3. What data is   4. Who is receiving
         data?             my data?                 being sent?         my data?
 •   Desktops         • Insiders              •   PII               • IP address
 •   Laptops          • Intruders             •   PHI               • Email destination
 •   File shares      • Spyware/Viruses       •   Source Code       • Geographic
 •   SharePoint                               •   IP                  location




Copyright 2010                   GTB DLP Suite-Confidential                        Slide 7
The 8 use-cases for Network DLP


 1. Control a broken           2. Demonstrate             3. Automate Email       4. Detect or Block
  business process               Compliance                   Encryption          encrypted content
•Who is sending, what      •I have no way of           •How do I automate        •Should I allow
 data and to whom?          enforcing data loss         encrypting emails         encrypted data to
                            compliance regulation       which require it?         leave without
                                                                                  content inspection?


                                                          7. Detect/Block TCP       8. Employees’
 5. Severity Blocking         6. Visibility to SSL
                                                        from non-trusted users        Education
•Some breaches are so      •I have no visibility to    •How do I detect          •My employees are
 severe that I prefer to    SSL in general and          transmissions from        not complying with
 altogether block           HTTPS in particular!        non-trusted users         the Written
 them!                                                  (Malware/Viruses/Troj     Information Security
                                                        ans)                      Policy (WISP)




  Copyright 2010                          GTB DLP Suite-Confidential                          Slide 8
What data must be protected?
                    Personal identifiable information (PII)

             •   Credit card number
             •   Social security number
             •   Customer name
             •   Address
             •   Telephone number
             •   Account number/Member number
             •   PIN or password
             •   Username & password
             •   Drivers license number
             •   Date of birth
Copyright 2010               GTB DLP Suite-Confidential       Slide 9
Enterprise class DLP




Copyright 2010       GTB DLP Suite-Confidential   Slide 10
Network DLP configuration - OOL
                           •Log

             Enforcement   •Encrypt
             Actions       •Quarantine
                           •Severity Block
                           •Redact

                                             Mirror/SPAN port




                                                                The GTB Inspector is an
                                                                appliance that can be deployed
                                                                in Bridge / Out of Line through
                                                                a SPAN/Mirror port and is
                                                                available as a VM image as well.



           Scans all TCP channels on all 65,535 ports
Copyright 2010             GTB DLP Suite-Confidential                                         Slide 11
Secure mail integration




Copyright 2010         GTB DLP Suite-Confidential   Slide 12
HTTPS visibility
                                 Multiple Choices

  Choices:
  1. Connect 443 port through
      any ICAP Client
  2. Connect Directly to the
      GTB SSL Proxy




Copyright 2010                  GTB DLP Suite-Confidential   Slide 13
GTB advanced fingerprinting technology – Structured data




 Copyright 2010      GTB DLP Suite-Confidential    Slide 14
Fingerprint Detection Engine –Structured Data
                 The most accurate detection engine in the DLP space


                        Feature                                                 Benefit

Can fingerprint any database                            Highest flexibility

Multi-field detection                                   No false positives

Automatic fingerprints refresh                          Easy maintenance and operation

                                                        Automatically deletes fingerprints that are no longer
Options for time-based sensitive content
                                                        sensitive

Supports user-defined fields                            Protects your direct business data

Fingerprints 1 million fields in 10 minutes             Very high performance




   Copyright 2010                             GTB DLP Suite-Confidential                               Slide 15
GTB advanced fingerprinting technology - Files
Fingerprint Detection Engine – Unstructured Data
                 The most accurate detection engine in the DLP space


                     Feature                                                  Benefit
Multiple data stream fingerprints using
                                                     Allows for partial file match
proprietary algorithm

Options for binary or text detection                 Detects images inside files

Options for excluded content                         Detects sensitive data only

                                                     Automatically deletes fingerprints that are no longer
Options for time-based sensitive content
                                                     sensitive

User defined sensitivity (in bytes)                  Highest possible control on what is detected

Virtual zero false positive rate                     Highest accuracy

Multi-language support                               Files in any language can be protected




   Copyright 2010                          GTB DLP Suite-Confidential                               Slide 17
Data Patterns Detection


        • Extended REGEX templates out of the box

        • Patterns defined through REGEX in PHP
        • Lexicons support
        • User defined severity level per pattern rule
        • Multi field weights and occurrences
        • Support for all languages




Copyright 2010               GTB DLP Suite-Confidential   Slide 18
Deployment requirements

                 Inspector             Endpoint                 eDiscovery

             • 40 GB HD           • Windows Server           • Runs on any
             • VMware Server      • Runs on any                windows OS
             • 4GB RAM              windows OS


                 The GTB Inspector is also available as an appliance


                               www.gttb.com


Copyright 2010                  GTB DLP Suite-Confidential                   Slide 19

More Related Content

What's hot

Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Network Intelligence India
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
Liwei Ren任力偉
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
Ariel Evans
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
Forcepoint LLC
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk OverviewSplunk
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
Kim Jensen
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
Hussein Al-Sanabani
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
Analytics Driven SIEM Workshop
Analytics Driven SIEM WorkshopAnalytics Driven SIEM Workshop
Analytics Driven SIEM Workshop
Splunk
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
April Mardock CISSP
 
DLP
DLPDLP
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 
Secure your network - Segmentation and segregation
Secure your network - Segmentation and segregationSecure your network - Segmentation and segregation
Secure your network - Segmentation and segregation
Magnus Jansson
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 
SplunkLive 2011 Advanced Session
SplunkLive 2011 Advanced SessionSplunkLive 2011 Advanced Session
SplunkLive 2011 Advanced Session
Splunk
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
Dhananjay Aloorkar
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf
ChunLei(peter) Che
 
Zero Trust_government_Openfind.pdf
Zero Trust_government_Openfind.pdfZero Trust_government_Openfind.pdf
Zero Trust_government_Openfind.pdf
openfind
 

What's hot (20)

Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Analytics Driven SIEM Workshop
Analytics Driven SIEM WorkshopAnalytics Driven SIEM Workshop
Analytics Driven SIEM Workshop
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
 
DLP
DLPDLP
DLP
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Secure your network - Segmentation and segregation
Secure your network - Segmentation and segregationSecure your network - Segmentation and segregation
Secure your network - Segmentation and segregation
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
SplunkLive 2011 Advanced Session
SplunkLive 2011 Advanced SessionSplunkLive 2011 Advanced Session
SplunkLive 2011 Advanced Session
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf
 
Zero Trust_government_Openfind.pdf
Zero Trust_government_Openfind.pdfZero Trust_government_Openfind.pdf
Zero Trust_government_Openfind.pdf
 

Similar to Gtb Dlp Suite Presentation

GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Prevention
refaeli
 
GTB - Protecting PII in the EU
GTB - Protecting PII in the EUGTB - Protecting PII in the EU
GTB - Protecting PII in the EUVCW Security Ltd
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
VCW Security Ltd
 
Gtb Product Technical Present
Gtb Product Technical PresentGtb Product Technical Present
Gtb Product Technical Presentgtbsalesindia
 
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review   Can Your Dlp Provider Protect You From The CloudGtb Technology Review   Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloudgtbsalesindia
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
Blueinfy Solutions
 
AGC - San Francisco - 2013
AGC - San Francisco - 2013AGC - San Francisco - 2013
AGC - San Francisco - 2013
Seculert
 
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & LoggingDSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
Andris Soroka
 
PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015Mike Spaulding
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLogin
Novell
 
Cloud Connect
Cloud ConnectCloud Connect
Cloud Connectctrlsblog
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2
 
CIS 2015 Extreme SAML - Hans Zandbelt
CIS 2015 Extreme SAML - Hans ZandbeltCIS 2015 Extreme SAML - Hans Zandbelt
CIS 2015 Extreme SAML - Hans Zandbelt
CloudIDSummit
 
iOS application (in)security
iOS application (in)securityiOS application (in)security
iOS application (in)security
iphonepentest
 
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
Priyanka Aash
 
How to secure your emails for sensitive docs
How to secure your emails for sensitive docsHow to secure your emails for sensitive docs
How to secure your emails for sensitive docs
David Strom
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
Paul Morse
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
Maxim Salnikov
 
iOS Application Security Testing
iOS Application Security TestingiOS Application Security Testing
iOS Application Security Testing
Blueinfy Solutions
 

Similar to Gtb Dlp Suite Presentation (20)

GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Prevention
 
GTB - Protecting PII in the EU
GTB - Protecting PII in the EUGTB - Protecting PII in the EU
GTB - Protecting PII in the EU
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
 
Gtb Product Technical Present
Gtb Product Technical PresentGtb Product Technical Present
Gtb Product Technical Present
 
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review   Can Your Dlp Provider Protect You From The CloudGtb Technology Review   Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
AGC - San Francisco - 2013
AGC - San Francisco - 2013AGC - San Francisco - 2013
AGC - San Francisco - 2013
 
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & LoggingDSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
 
PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLogin
 
Cloud Connect
Cloud ConnectCloud Connect
Cloud Connect
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
CIS 2015 Extreme SAML - Hans Zandbelt
CIS 2015 Extreme SAML - Hans ZandbeltCIS 2015 Extreme SAML - Hans Zandbelt
CIS 2015 Extreme SAML - Hans Zandbelt
 
iOS application (in)security
iOS application (in)securityiOS application (in)security
iOS application (in)security
 
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
 
How to secure your emails for sensitive docs
How to secure your emails for sensitive docsHow to secure your emails for sensitive docs
How to secure your emails for sensitive docs
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
iOS Application Security Testing
iOS Application Security TestingiOS Application Security Testing
iOS Application Security Testing
 

Gtb Dlp Suite Presentation

  • 1. Enterprise Data Loss Prevention Content-Aware Reverse Firewall
  • 2. Sample Customers Apple, Inc. 60,000 users American Greetings 8,000 users Bureau of Indian Affairs (US 7,500 users Government DOI) Citgo Oil Company 4,500 users ESL Federal Credit Union 1,200 users SAFE Credit Union 750 users San Mateo Credit Union 650 users GTB DLP Suite-Confidential Slide 2
  • 3. What the analysts say: Copyright 2010 GTB DLP Suite-Confidential Slide 3
  • 4. GTB Patent Pending 1. DLP and DLD for inspecting all outbound content and comparing it to stored data 2. DLP and DLD for inspecting all outbound content using search index of confidential data 3. DLP and DLD for inspecting all outbound content using multiple fingerprints of confidential data Copyright 2010 GTB DLP Suite-Confidential Slide 4
  • 5. The GTB DLP Components Cloud Enabled – Any VM GTB Inspector GTB Endpoint DLP eDiscovery Reverse Firewall Device Control Search & Classification • Scans all outbound • Discovers devices • Scan Desktops traffic • Protects devices • Scans file shares • Highest accuracy • Audits devices • Reports on • Able to block • Controls devices vulnerable files without a proxy • Content-Aware • Enforces IRM server • Automatic batch • File format • Monitors shares agnostic and PC’s Supports all languages Centralized policy, reporting and workflow Copyright 2010 GTB DLP Suite-Confidential Slide 5
  • 6. In the Development Pipeline • Protection for sites such as: https://use.cloudshare.com • Mobile devices DLP • Network traffic analysis/protection • Network Recorder • Detection of additional encrypted content and protocols • IPv6 support • IDS/IPS + Virus, SPAM and Malware protection Copyright 2010 GTB DLP Suite-Confidential Slide 6
  • 7. DLP answers 4 questions: 1. Where is my 2. Who is sending 3. What data is 4. Who is receiving data? my data? being sent? my data? • Desktops • Insiders • PII • IP address • Laptops • Intruders • PHI • Email destination • File shares • Spyware/Viruses • Source Code • Geographic • SharePoint • IP location Copyright 2010 GTB DLP Suite-Confidential Slide 7
  • 8. The 8 use-cases for Network DLP 1. Control a broken 2. Demonstrate 3. Automate Email 4. Detect or Block business process Compliance Encryption encrypted content •Who is sending, what •I have no way of •How do I automate •Should I allow data and to whom? enforcing data loss encrypting emails encrypted data to compliance regulation which require it? leave without content inspection? 7. Detect/Block TCP 8. Employees’ 5. Severity Blocking 6. Visibility to SSL from non-trusted users Education •Some breaches are so •I have no visibility to •How do I detect •My employees are severe that I prefer to SSL in general and transmissions from not complying with altogether block HTTPS in particular! non-trusted users the Written them! (Malware/Viruses/Troj Information Security ans) Policy (WISP) Copyright 2010 GTB DLP Suite-Confidential Slide 8
  • 9. What data must be protected? Personal identifiable information (PII) • Credit card number • Social security number • Customer name • Address • Telephone number • Account number/Member number • PIN or password • Username & password • Drivers license number • Date of birth Copyright 2010 GTB DLP Suite-Confidential Slide 9
  • 10. Enterprise class DLP Copyright 2010 GTB DLP Suite-Confidential Slide 10
  • 11. Network DLP configuration - OOL •Log Enforcement •Encrypt Actions •Quarantine •Severity Block •Redact Mirror/SPAN port The GTB Inspector is an appliance that can be deployed in Bridge / Out of Line through a SPAN/Mirror port and is available as a VM image as well. Scans all TCP channels on all 65,535 ports Copyright 2010 GTB DLP Suite-Confidential Slide 11
  • 12. Secure mail integration Copyright 2010 GTB DLP Suite-Confidential Slide 12
  • 13. HTTPS visibility Multiple Choices Choices: 1. Connect 443 port through any ICAP Client 2. Connect Directly to the GTB SSL Proxy Copyright 2010 GTB DLP Suite-Confidential Slide 13
  • 14. GTB advanced fingerprinting technology – Structured data Copyright 2010 GTB DLP Suite-Confidential Slide 14
  • 15. Fingerprint Detection Engine –Structured Data The most accurate detection engine in the DLP space Feature Benefit Can fingerprint any database Highest flexibility Multi-field detection No false positives Automatic fingerprints refresh Easy maintenance and operation Automatically deletes fingerprints that are no longer Options for time-based sensitive content sensitive Supports user-defined fields Protects your direct business data Fingerprints 1 million fields in 10 minutes Very high performance Copyright 2010 GTB DLP Suite-Confidential Slide 15
  • 16. GTB advanced fingerprinting technology - Files
  • 17. Fingerprint Detection Engine – Unstructured Data The most accurate detection engine in the DLP space Feature Benefit Multiple data stream fingerprints using Allows for partial file match proprietary algorithm Options for binary or text detection Detects images inside files Options for excluded content Detects sensitive data only Automatically deletes fingerprints that are no longer Options for time-based sensitive content sensitive User defined sensitivity (in bytes) Highest possible control on what is detected Virtual zero false positive rate Highest accuracy Multi-language support Files in any language can be protected Copyright 2010 GTB DLP Suite-Confidential Slide 17
  • 18. Data Patterns Detection • Extended REGEX templates out of the box • Patterns defined through REGEX in PHP • Lexicons support • User defined severity level per pattern rule • Multi field weights and occurrences • Support for all languages Copyright 2010 GTB DLP Suite-Confidential Slide 18
  • 19. Deployment requirements Inspector Endpoint eDiscovery • 40 GB HD • Windows Server • Runs on any • VMware Server • Runs on any windows OS • 4GB RAM windows OS The GTB Inspector is also available as an appliance www.gttb.com Copyright 2010 GTB DLP Suite-Confidential Slide 19