Category Archives: Data Protection

What is Software defined perimeter and Zero Trust

What is Software-defined perimeter and Zero Trust?   In the digital age, experts are constantly on the search for the best model of information security.   While most improvements constitute tweaks or upgrades to existing paradigms, some designs have required a complete break with the past.   Two models, in particular, exemplify this. Defining the…
Read more

What is TISAX (Trusted Information Security Assessment Exchange) Compliance?

What is TISAX (Trusted Information Security Assessment Exchange) Compliance? TISAX has become one of the big buzz words in info-sec today.   The challenge of DLP and its importance for data security has triggered the creation of new methods and systems for enterprises to employ.   The folks that put together TISAX were certainly on…
Read more

2020 Redefining Data Loss Prevention and Protection

January 2020 Redefining Data Loss Prevention and Protection   GTB Technologies is the Data Protection solution that can prevent the loss of data from Malware and trusted insiders by blocking sensitive data. “Data Protection” has been the name of the game for GTB Technologies since its inception in 2004. On a mission to help protect…
Read more

The Public Cloud  Is it Secure?

The Public Cloud.  Is it Secure?   In today’s business environment, data is everything. With data volumes increasing exponentially, the cloud has become the go-to for many companies to store their vital information. Offloading data storage and management has worked wonders. Firms no longer have to rely on in-house storage components. Furthermore, the organizational and…
Read more

What is Data Loss Prevention Shelfware

Data Loss Prevention (DLP) Shelfware With the huge volume of sensitive data companies must deal with today, it’s no wonder data loss protection (DLP) still tops the list of administrator concerns.   Despite the attention however, it seems that getting DLP right remains easier said than done.   Even major government agencies, with ample resources…
Read more

Supply Chain Risk and Cybersecurity

Supply Chain Risk: The importance of vetting 3rd party vendors and their data protection tools   Modern organizations are increasingly interconnected, with complex supply chains extending across continents and categories. While this brings a range of business benefits, it also brings risks. Cyber-criminals understand how data is shared between links in the chain, and use…
Read more