Category Archives: CASB – Cloud Access Security Broker

CASB – Cloud Access Security Broker

Why GTB Technologies Are Market Leaders at Data Loss Prevention & Data Discovery

Technology Market Leader GTB Technologies GTB Technologies has become the market leader in  Enterprise Data Protection, Data Loss Prevention, Data Discovery & eDiscovery by developing cutting-edge technological solutions that are reliable, effective and work.  We focus on ensuring that our solutions are simple to use, so organizations can proactively manage their own data security policies and…
Read more

Cloud Architecture: Data Leak Prevention in the Cloud

Cloud Architecture: Data Protection in the Cloud

Cloud Computing and Emerging Technologies, Azure, AWS, Google, CASB Cloud Access Security Broker, Software-as-a Service (SaaS),  SaaS Monitoring Platforms (SMP), Virtualization, Web-Oriented Architecture (WOA), Enterprise Mashup.......

These technologies can mean a profound change in the design of an organizations' infrastructures; permitting large organizations to be nimble while enabling smaller organizations to create advanced, sophisticated infrastructures rivaling their large counterparts; however these technologies bring an innate security risk and compliant nightmare.

By deploying Inspector Cloud, providers can secure their customer's data and gain a competitive advantage over less secured competitive offering.

Problem:    Your Data Leaves &/or Enters the Cloud ... SHOULD IT?

When trusted users, your employees or contractors, use your confidential data from Cloud services such as Salesforce, Amazon (AWS), Dropbox, etc; the chance of leakage (whether by accident or with intention) increases.

Did you know ...  While most of these cloud providers utilize HTTPS to transfer data, some are using SECURE RDP. Such transmissions represent significant risk of data loss since 'content-aware' DLP systems do not have visibility to such breaches. 

Implement consistent policies across the clouds


Solution 1:    GTB's Inspector Cloud - Discover, Protect, Enable

GTB's Inspector Cloud knows the moment your trusted or Non trusted users access this sensitive data, sending alerts or enforcing policies such as block, encrypt or quarantine thus preventing any breach or unintended use. 

Organizations can now have full control of the data that is allowed to move to the cloud and block data that is prohibited.  The Inspector scans all content uploaded to or downloaded from cloud applications such as Salesforce, Box, Google, Dropbox, SAP, AWS and more.  Based on easy, customizable policies, the Inspector will use enforcement actions such as block, quarantine, alert and more along with notifying & educating an end-user or administrator.

GTB's DLP suite provides support for SECURE RDP; enabling full and accurate protection against policy violations targeted to the Cloud.  NO OTHER SOLUTION CAN!

Solution 2:    GTB's DLP as a Service

We've re-invented the Enterprise Data Loss Prevention Marketplace; now our unique technology is available to organizations regardless of the size with our DLP as a Service.   GTB's Next-Generation Data Loss Protection (DLP) solution is an easy-to-deploy, less expensive alternative for resource-constrained security and IT teams.

Cloud Providers, CASB, SaaS Monitor Platforms (SMP), MSSPs, ... can now deploy Data Protection and / or API DLP for their customers by joining GTB's Cloud Alliance Program.

Solutions for Beyond the Network:    

               GTB's Advanced Data Protection at the Endpoint   

               GTB's Content Aware IRM

GTB Technologies Platform Benefits include:

  • Native Cloud Data Classification and Discovery for Dropbox, Box, Azure, Office 365, Google Drive, OneDrive and many more cloud sites (optional).
  • Options for automatic encryption and file level access controls
  • Cross-Cloud coverage
  • User Analytics
  • Remediation
  • Real-time
  • Accurate Detection


Get More Information

Secure Information Wherever It Goes

Extend Information Security Beyond Your Border with Content Aware Enterprise DRM 


The integration of Content-Awareness and Enterprise DRM offers an organization comprehensive access control on sensitive information for both internal and external constituents. Sensitive or confidential data is automatically encrypted based on file content and access to such data is controlled by either the File Owner or designated Administrator. External constituents may also have access rights to such files but only if they have been approved. This way organizations are able to secure files even after such files are circulating beyond the perimeter.

With the ability to remotely manage access policies one can instantly block or modify access to a file as business relationships change or devices are lost. Over 140 different types of files including files created by Microsoft Office, Open Office, Adobe, Photos, AutoCAD, and dozens of Text file types.