Data Security that Works Data Security that Works Data Security that Works Data Security that Works

Bringing visibility to sensitive data

A true GR&C tool, GTB’s Central Console Control Center provides enterprise data analytics and advanced enterprise report options. GTB’s Central Console enables the management of advanced threat and data protection policies and controls across all endpoints, distributed environments including AWS / Azure, data silos, data repositories, cloud apps, services and storage, on-premises network and storage systems; while streamlining administration and providing more consistent policy enforcement.

  • Automated Advanced Access Controls
  • Complete Analytic and Audit-ability including forensic data
  • Complete Visibility with support for regulatory and privacy mandates
  • Policy & Configuration Management for groups and / or individuals
  • Integrated Robust Incident Response & Workflow
  • SIEM Integration with Industry leading tools such as HP ArcSight® and Splunk®
  • LDAP Integration and synchronization
  • Pre-built Policy Templates
  • Data Security Policies managed and controlled across multiple data silos
  • Enterprise Reporting, right out of the box
  • DLP that Works

The Simplest Licensing Package to
Secure Your Data

Compliance Edition

Book a Demo

Features

  • Local PC Discovery
  • USB Device Control
  • Network Inspection
  • Email Inspection
  • Windows/Linux/MacOS
Professional Edition

Book a Demo

Features

  • Local PC Discovery
  • Outlook PST/OST discovery
  • USB Device Control
  • Network Inspection
  • OCR
  • Email Inspection
  • Windows/Linux/MacOS
Advanced Edition

Book a Demo

Features

  • Local PC Discovery
  • Outlook PST/OST discovery
  • USB Device Control
  • Classification and Watermarking
  • Application Control
  • Network Inspection
  • OCR
  • Email Inspection
  • Fileshare Audit
  • Windows/Linux/MacOS

Data Breaches Eliminated!

Content-Aware-Reverse-Firewall

The Inspector that provides true network DLP covering all channels and all 65,000+ ports & protocols. The Inspector provides content & context awareness, network visibility, and provides employee education on security and compliance.

Advanced Device controls with encryption

The GTB Endpoint Protector extends the visibility and controls on endpoints over what confidential data is and should be stored, who has it, how it is being used, where it is being transferred, and what enforcement actions were taken in real-time to prevent data leakage on the endpoints. GTB’s Endpoint Protector is an innovative DLP solution addressing the growing problem of secure data leaving the organization through removable media & mobile devices such as Tablets, CD/DVD’s, USB Drives & POS. Context & Content-aware device control that recognizes and optionally blocks the output of secure content to removable media. Options to automatically encrypt and/or shadow activity on the endpoints.

Discovery and Data Classification

Discover, Identify, Classify, Inventory, Remediate, Control & Protect your data including PII, PHI, IP, any structured or unstructured data, including local hard drives, File Shares, PST/OST MS Outlook files, Exchange, SharePoint and more. GTB Technologies is changing the Data classification & discovery space by utilizing its proprietary AccuMatchTM technology to classify data and files based on fingerprints. GTB Discovery detects potential violations of data security and compliance before it becomes a security incident. This mitigates consequences of device or laptop loss, intrusions and potential malware phoning home.

On-Premise or Off

Overall control and visibility of data are needed to manage advanced threats, prevent data loss, and enforce compliance while protecting the brand and reputation.

GTB AccuMatchTM Detection, our proprietary technology, is based on low fingerprint ratios and the ability to fingerprint specific structured columns or unstructured files. This increases the performance of our 3 detection engines and enables our ability to inspect data in motion traffic, in Real-time, resulting with virtually 100% accurate detection (fingerprinted data), on-premise or off-premise, including major cloud storage and collaboration tools. These unique capabilities permit organizations to comfortably be in enforcement mode, thus providing complete protection of critical assets and confidential data.

An agent that enforces automated DLP policy-based controls. Controls the 4 W’s:

  • WHO– (people, groups, teams …),
  • WHAT– (read, edit, print, distribute …),
  • WHEN– (dates, duration,…) and
  • WHERE– (locations, IP addresses,…) can use the documents:

Granular usage policy definition allows specifying highly specific rights for each document as it flows within and outside of the enterprise.