Category Archives: Data Loss Prevention

Why is DLP Failing?

Why is DLP Failing?  Capital One, Equifax, Uber, Verizon, Dun and Bradstreet, Scottrade, Anthem, Sony Hacked, data breached.   Home Depot, data breached, Target .... seems like 2020 is moving in the same direction as 2019, 2018, 2017, 2016, 2015, 2014 and 2013. When studying these patterns, it’s important to understand that it’s the degree and severity of…
Read more

Why choose GTB for Data Security or DLP?

 Why choose GTB for Data Security? Our Products Work, it's that Simple PATENTED, ACCURATE, UNPARALLELED  GTB Technologies is the only Data Protection portfolio of solutions (on-premises, off-premises and everywhere in between including the cloud) which can prevent the loss of data from Malware, Frenemies and trusted insiders by blocking sensitive data (structured or unstructured) regardless…
Read more

DLP Finance Award 2015

Financial Banking Awards 2015: DLP  GTB’s Data Loss Prevention has the ability to detect data loss from different channels with the highest degree of accuracy without any false positives   To help CXOs, CIOs, and CEOs find the right banking technology and provider for their enterprises, CIO Reviews selection panel evaluated hundreds of banking technology…
Read more

Support

CUSTOMER & TECHNICAL SUPPORT   With experience that will benefit you in implementing your security and compliance projects, our team of dedicated support engineers and customer service staff are ready to help you. We are known to go above and beyond service levels, helping you bring the greatest value and results to your organization. GTB's Annual…
Read more

Secure Information Wherever It Goes

Extend Information Security Beyond Your Border with Content Aware Enterprise DRM 

GTB TECHNOLOGIES IS THE FIRST TO PROVIDE A FULLY INTEGRATED CONTENT AWARE ENTERPRISE DRM SOLUTION WHICH CAN AUTOMATICALLY APPLY FILE LEVEL ACCESS CONTROLS BASED ON CONTENT

The integration of Content-Awareness and Enterprise DRM offers an organization comprehensive access control on sensitive information for both internal and external constituents. Sensitive or confidential data is automatically encrypted based on file content and access to such data is controlled by either the File Owner or designated Administrator. External constituents may also have access rights to such files but only if they have been approved. This way organizations are able to secure files even after such files are circulating beyond the perimeter.

With the ability to remotely manage access policies one can instantly block or modify access to a file as business relationships change or devices are lost. Over 140 different types of files including files created by Microsoft Office, Open Office, Adobe, Photos, AutoCAD, and dozens of Text file types.