SlideShare a Scribd company logo
Enterprise Data Loss Prevention

  Content-Aware Reverse Firewall
Sample Customers
Apple, Inc.                                60,000 users



American Greetings                         18,000 users


Bureau of Indian Affairs (US
                                           7,500 users
Government DOI)


Citgo Oil Company                          4,500 users



ESL Federal Credit Union                   1,200 users



SAFE Credit Union                          750 users


San Mateo Credit Union                     650 users
              GTB DLP Suite-Confidential                  Slide 2
What the analysts say:

                 Frost & Sullivan believes that GTB is on track to becoming
                 the dominant provider of DLP/ILP solutions in the financial
                 market. World dlp research September 2008

                 When using fingerprinted data, the catch rate is 100%. If you
                 have sensitive data on your enterprise you need this
                 device… you will sleep much better knowing your data is
                 protected. SC Magazine 2007




Copyright 2010                      GTB DLP Suite-Confidential                   Slide 3
The GTB DLP Components
                                Cloud Enabled – Any VM

                   GTB Inspector          GTB Endpoint DLP             eDiscovery
                   Reverse Firewall

                 • Scans all             • Discover devices        • Scan Desktops
                   outbound traffic      • Protect devices         • Scans file shares
                 • Highest               • Audit devices           • Reports on
                   accuracy              • Control devices           vulnerable files
                 • Able to block         • Content-Aware           • Automatic batch
                   without a proxy                                 • Monitors shares
                   server                                            and PC’s
                 • File format
                   agnostic

                                       Supports all languages
                              Centralized policy, reporting and workflow

Copyright 2010                        GTB DLP Suite-Confidential                         Slide 4
In the Development Pipeline


   • Protection for sites such as: https://use.cloudshare.com
   • Mobile devices DLP
   • Network traffic analysis/protection
   • Network Recorder
   • Detection of additional encrypted content and protocols
   • IDS/IPS + Virus, SPAM and Malware protection




Copyright 2010               GTB DLP Suite-Confidential         Slide 5
DLP answers three questions:


                 1. Who is sending         2. What data is        3. Who is receiving
                     my data?                being sent?              my data?
                 • Insiders             • PII                     • IP address
                 • Intruders            • PHI                     • Email destination
                 • Spyware/Viruses      • Source Code             • Geographic
                                        • IP                        location




Copyright 2010                       GTB DLP Suite-Confidential                         Slide 6
The 8 use-cases for Network DLP


 1. Control a broken           2. Demonstrate              3. Automate Email       4. Detect or Block
  business process               Compliance                    Encryption          encrypted content
•Who is sending, what      •I have no way of            •How do I automate        •Should I allow
 data and to whom?          enforcing data loss          encrypting emails         encrypted data to
                            compliance regulation        which require it?         leave without
                                                                                   content inspection?


                                                           7. Detect/Block TCP       8. Employees’
 5. Severity Blocking         6. Visibility to SSL
                                                         from non-trusted users        Education
•Some breaches are so      •I have no visibility to     •How do I detect          •My employees are
 severe that I prefer to    SSL in general and           transmissions from        not complying with
 altogether block           HTTPS in particular!         non-trusted users         the Written
 them!                                                   (Malware/Viruses/Troj     Information Security
                                                         ans)                      Policy (WISP)




  Copyright 2010                           GTB DLP Suite-Confidential                          Slide 7
What data must be protected?
                       Personal identifiable information (PII)

                 •   Credit card number
                 •   Social security number
                 •   Customer name
                 •   Address
                 •   Telephone number
                 •   Account number/Member number
                 •   PIN or password
                 •   Username & password
                 •   Drivers license number
                 •   Date of birth
Copyright 2010                   GTB DLP Suite-Confidential      Slide 8
Enterprise class DLP




Copyright 2010        GTB DLP Suite-Confidential   Slide 9
Network DLP configuration - OOL
                               •Log

                 Enforcement   •Encrypt
                 Actions       •Quarantine
                               •Severity Block
                               •Redact

                                                 Mirror port switch




                                                                      The GTB Inspector is an
                                                                      appliance that can be deployed
                                                                      in Bridge / Out of Line through
                                                                      a SPAN/Mirror port and is
                                                                      available as a VM image as well.



            Scans all TCP channels on all 65,535 ports
Copyright 2010                 GTB DLP Suite-Confidential                                 Slide 10
Secure mail integration




Copyright 2010         GTB DLP Suite-Confidential   Slide 11
HTTPS visibility
                                  Multiple Choices

  1.   Connect 443 port through
       any ICAP Client
  2.   Connect Directly to the
       GTB SSL Proxy


                                                 ICAP Client




                                                               ICAP Server




Copyright 2010                    GTB DLP Suite-Confidential                 Slide 12
GTB advanced fingerprinting technology – Structured data




 Copyright 2010      GTB DLP Suite-Confidential    Slide 13
Fingerprint Detection Engine –Structured Data
                The most accurate detection engine in the DLP space


                        Feature                                                 Benefit

Can fingerprint any database                            Highest flexibility

Multi-field detection                                   No false positives

Automatic fingerprints refresh                          Easy maintenance and operation

                                                        Automatically deletes fingerprints that are no longer
Options for time-based sensitive content
                                                        sensitive

Supports user-defined fields                            Protects your direct business data

Fingerprints 1 million fields in 10 minutes             Very high performance




   Copyright 2010                             GTB DLP Suite-Confidential                                Slide 14
GTB advanced fingerprinting technology - Files
Fingerprint Detection Engine – Unstructured Data
                The most accurate detection engine in the DLP space


                     Feature                                                  Benefit
Multiple data stream fingerprints using
                                                     Allows for partial file match
proprietary algorithm

Options for binary or text detection                 Detects images inside files

Options for excluded content                         Detects sensitive data only

                                                     Automatically deletes fingerprints that are no longer
Options for time-based sensitive content
                                                     sensitive

User defined sensitivity (in bytes)                  Highest possible control on what is detected

Virtual zero false positive rate                     Highest accuracy

Multi-language support                               Files in any language can be protected




   Copyright 2010                          GTB DLP Suite-Confidential                                Slide 16
Data Patterns Detection


         • Extended REGEX templates out of the box

         • Patterns defined through REGEX in PHP
         • Lexicons support
         • User defined severity level per pattern rule
         • Multi field weights and occurrences
         • Support for all languages




Copyright 2010                GTB DLP Suite-Confidential   Slide 17
Deployment requirements

                     Inspector              Endpoint                 eDiscovery

                 • 40 GB HD           • Windows Server            • Runs on any
                 • VMware Server      • Runs on any                 windows OS
                 • 4GB RAM              windows OS


                     The GTB Inspector is also available as an appliance


                                   www.gttb.com


Copyright 2010                       GTB DLP Suite-Confidential                   Slide 18

More Related Content

What's hot

Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
E mail forensics
E mail forensicsE mail forensics
E mail forensics
saddamhusain hadimani
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
Quick Heal Technologies Ltd.
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Cryptography
CryptographyCryptography
Cryptography
AnandKaGe
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
Yash
 
Information Management Life Cycle
Information Management Life CycleInformation Management Life Cycle
Information Management Life Cycle
Collabor8now Ltd
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
Surajgroupsvideo
 
.LNK Tears of the Kingdom
.LNK Tears of the Kingdom.LNK Tears of the Kingdom
.LNK Tears of the Kingdom
MITRE ATT&CK
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
Filip Maertens
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
Prime Infoserv
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - NotesKranthi
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
Vaughan Olufemi ACIB, AICEN, ANIM
 
Data Security
Data SecurityData Security
Data Security
AkNirojan
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
Yansi Keim
 
Web Browser Artifacts
Web Browser ArtifactsWeb Browser Artifacts
Web Browser Artifacts
primeteacher32
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification PresentationDerroylo
 

What's hot (20)

Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
E mail forensics
E mail forensicsE mail forensics
E mail forensics
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Cryptography
CryptographyCryptography
Cryptography
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Information Management Life Cycle
Information Management Life CycleInformation Management Life Cycle
Information Management Life Cycle
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
.LNK Tears of the Kingdom
.LNK Tears of the Kingdom.LNK Tears of the Kingdom
.LNK Tears of the Kingdom
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
5.4 it security audit (mauritius)
5.4  it security audit (mauritius)5.4  it security audit (mauritius)
5.4 it security audit (mauritius)
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Data Security
Data SecurityData Security
Data Security
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Web Browser Artifacts
Web Browser ArtifactsWeb Browser Artifacts
Web Browser Artifacts
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification Presentation
 

Similar to GTB DLP Suite Presentation

GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Prevention
refaeli
 
GTB - Protecting PII in the EU
GTB - Protecting PII in the EUGTB - Protecting PII in the EU
GTB - Protecting PII in the EUVCW Security Ltd
 
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review   Can Your Dlp Provider Protect You From The CloudGtb Technology Review   Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloudgtbsalesindia
 
Gtb Product Technical Present
Gtb Product Technical PresentGtb Product Technical Present
Gtb Product Technical Presentgtbsalesindia
 
PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015Mike Spaulding
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014Ravindran Vasu
 
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & LoggingDSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
Andris Soroka
 
AGC - San Francisco - 2013
AGC - San Francisco - 2013AGC - San Francisco - 2013
AGC - San Francisco - 2013
Seculert
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
Skoda Minotti
 
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...
Databricks
 
Cloud Connect
Cloud ConnectCloud Connect
Cloud Connectctrlsblog
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLogin
Novell
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
Blueinfy Solutions
 
CIS 2015 Extreme SAML - Hans Zandbelt
CIS 2015 Extreme SAML - Hans ZandbeltCIS 2015 Extreme SAML - Hans Zandbelt
CIS 2015 Extreme SAML - Hans Zandbelt
CloudIDSummit
 
apidays LIVE London 2021 - Securing PII at runtime by Rob Dickinson, Resurfac...
apidays LIVE London 2021 - Securing PII at runtime by Rob Dickinson, Resurfac...apidays LIVE London 2021 - Securing PII at runtime by Rob Dickinson, Resurfac...
apidays LIVE London 2021 - Securing PII at runtime by Rob Dickinson, Resurfac...
apidays
 
iOS application (in)security
iOS application (in)securityiOS application (in)security
iOS application (in)security
iphonepentest
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
Paul Morse
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab Slides
Pistoia Alliance
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
 

Similar to GTB DLP Suite Presentation (20)

GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Prevention
 
GTB - Protecting PII in the EU
GTB - Protecting PII in the EUGTB - Protecting PII in the EU
GTB - Protecting PII in the EU
 
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review   Can Your Dlp Provider Protect You From The CloudGtb Technology Review   Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
 
Gtb Product Technical Present
Gtb Product Technical PresentGtb Product Technical Present
Gtb Product Technical Present
 
PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014
 
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & LoggingDSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
DSS ITSEC 2012 Balabit_Security_Shell_Control_Box & Logging
 
AGC - San Francisco - 2013
AGC - San Francisco - 2013AGC - San Francisco - 2013
AGC - San Francisco - 2013
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
 
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...
 
Cloud Connect
Cloud ConnectCloud Connect
Cloud Connect
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLogin
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
CIS 2015 Extreme SAML - Hans Zandbelt
CIS 2015 Extreme SAML - Hans ZandbeltCIS 2015 Extreme SAML - Hans Zandbelt
CIS 2015 Extreme SAML - Hans Zandbelt
 
apidays LIVE London 2021 - Securing PII at runtime by Rob Dickinson, Resurfac...
apidays LIVE London 2021 - Securing PII at runtime by Rob Dickinson, Resurfac...apidays LIVE London 2021 - Securing PII at runtime by Rob Dickinson, Resurfac...
apidays LIVE London 2021 - Securing PII at runtime by Rob Dickinson, Resurfac...
 
iOS application (in)security
iOS application (in)securityiOS application (in)security
iOS application (in)security
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab Slides
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 

GTB DLP Suite Presentation

  • 1. Enterprise Data Loss Prevention Content-Aware Reverse Firewall
  • 2. Sample Customers Apple, Inc. 60,000 users American Greetings 18,000 users Bureau of Indian Affairs (US 7,500 users Government DOI) Citgo Oil Company 4,500 users ESL Federal Credit Union 1,200 users SAFE Credit Union 750 users San Mateo Credit Union 650 users GTB DLP Suite-Confidential Slide 2
  • 3. What the analysts say: Frost & Sullivan believes that GTB is on track to becoming the dominant provider of DLP/ILP solutions in the financial market. World dlp research September 2008 When using fingerprinted data, the catch rate is 100%. If you have sensitive data on your enterprise you need this device… you will sleep much better knowing your data is protected. SC Magazine 2007 Copyright 2010 GTB DLP Suite-Confidential Slide 3
  • 4. The GTB DLP Components Cloud Enabled – Any VM GTB Inspector GTB Endpoint DLP eDiscovery Reverse Firewall • Scans all • Discover devices • Scan Desktops outbound traffic • Protect devices • Scans file shares • Highest • Audit devices • Reports on accuracy • Control devices vulnerable files • Able to block • Content-Aware • Automatic batch without a proxy • Monitors shares server and PC’s • File format agnostic Supports all languages Centralized policy, reporting and workflow Copyright 2010 GTB DLP Suite-Confidential Slide 4
  • 5. In the Development Pipeline • Protection for sites such as: https://use.cloudshare.com • Mobile devices DLP • Network traffic analysis/protection • Network Recorder • Detection of additional encrypted content and protocols • IDS/IPS + Virus, SPAM and Malware protection Copyright 2010 GTB DLP Suite-Confidential Slide 5
  • 6. DLP answers three questions: 1. Who is sending 2. What data is 3. Who is receiving my data? being sent? my data? • Insiders • PII • IP address • Intruders • PHI • Email destination • Spyware/Viruses • Source Code • Geographic • IP location Copyright 2010 GTB DLP Suite-Confidential Slide 6
  • 7. The 8 use-cases for Network DLP 1. Control a broken 2. Demonstrate 3. Automate Email 4. Detect or Block business process Compliance Encryption encrypted content •Who is sending, what •I have no way of •How do I automate •Should I allow data and to whom? enforcing data loss encrypting emails encrypted data to compliance regulation which require it? leave without content inspection? 7. Detect/Block TCP 8. Employees’ 5. Severity Blocking 6. Visibility to SSL from non-trusted users Education •Some breaches are so •I have no visibility to •How do I detect •My employees are severe that I prefer to SSL in general and transmissions from not complying with altogether block HTTPS in particular! non-trusted users the Written them! (Malware/Viruses/Troj Information Security ans) Policy (WISP) Copyright 2010 GTB DLP Suite-Confidential Slide 7
  • 8. What data must be protected? Personal identifiable information (PII) • Credit card number • Social security number • Customer name • Address • Telephone number • Account number/Member number • PIN or password • Username & password • Drivers license number • Date of birth Copyright 2010 GTB DLP Suite-Confidential Slide 8
  • 9. Enterprise class DLP Copyright 2010 GTB DLP Suite-Confidential Slide 9
  • 10. Network DLP configuration - OOL •Log Enforcement •Encrypt Actions •Quarantine •Severity Block •Redact Mirror port switch The GTB Inspector is an appliance that can be deployed in Bridge / Out of Line through a SPAN/Mirror port and is available as a VM image as well. Scans all TCP channels on all 65,535 ports Copyright 2010 GTB DLP Suite-Confidential Slide 10
  • 11. Secure mail integration Copyright 2010 GTB DLP Suite-Confidential Slide 11
  • 12. HTTPS visibility Multiple Choices 1. Connect 443 port through any ICAP Client 2. Connect Directly to the GTB SSL Proxy ICAP Client ICAP Server Copyright 2010 GTB DLP Suite-Confidential Slide 12
  • 13. GTB advanced fingerprinting technology – Structured data Copyright 2010 GTB DLP Suite-Confidential Slide 13
  • 14. Fingerprint Detection Engine –Structured Data The most accurate detection engine in the DLP space Feature Benefit Can fingerprint any database Highest flexibility Multi-field detection No false positives Automatic fingerprints refresh Easy maintenance and operation Automatically deletes fingerprints that are no longer Options for time-based sensitive content sensitive Supports user-defined fields Protects your direct business data Fingerprints 1 million fields in 10 minutes Very high performance Copyright 2010 GTB DLP Suite-Confidential Slide 14
  • 15. GTB advanced fingerprinting technology - Files
  • 16. Fingerprint Detection Engine – Unstructured Data The most accurate detection engine in the DLP space Feature Benefit Multiple data stream fingerprints using Allows for partial file match proprietary algorithm Options for binary or text detection Detects images inside files Options for excluded content Detects sensitive data only Automatically deletes fingerprints that are no longer Options for time-based sensitive content sensitive User defined sensitivity (in bytes) Highest possible control on what is detected Virtual zero false positive rate Highest accuracy Multi-language support Files in any language can be protected Copyright 2010 GTB DLP Suite-Confidential Slide 16
  • 17. Data Patterns Detection • Extended REGEX templates out of the box • Patterns defined through REGEX in PHP • Lexicons support • User defined severity level per pattern rule • Multi field weights and occurrences • Support for all languages Copyright 2010 GTB DLP Suite-Confidential Slide 17
  • 18. Deployment requirements Inspector Endpoint eDiscovery • 40 GB HD • Windows Server • Runs on any • VMware Server • Runs on any windows OS • 4GB RAM windows OS The GTB Inspector is also available as an appliance www.gttb.com Copyright 2010 GTB DLP Suite-Confidential Slide 18