Category Archives: Data Discovery

Discover, Identify, Classify, Inventory, Remediate, Control & Protect your sensitive, mission-critical data including: PII, IP, PCI, PHI, Unstructured Data, Structured Data

2020 Redefining Data Loss Prevention and Protection

January 2020 Redefining Data Loss Prevention and Protection   GTB Technologies is the Data Protection solution that can prevent the loss of data from Malware and trusted insiders by blocking sensitive data. “Data Protection” has been the name of the game for GTB Technologies since its inception in 2004. On a mission to help protect…
Read more

The Public Cloud  Is it Secure?

The Public Cloud.  Is it Secure?   In today’s business environment, data is everything. With data volumes increasing exponentially, the cloud has become the go-to for many companies to store their vital information. Offloading data storage and management has worked wonders. Firms no longer have to rely on in-house storage components. Furthermore, the organizational and…
Read more

False Promise of Blanket Encryption

The false promise of blanket encryption Why data needs to be inspected before its put under lock and key With cyber-attacks on the rise and compliance with regulatory regimes like HIPAA and GDPR becoming more urgent, businesses have been turning to encryption as a catch-all tactic to ensure IP and personal data are protected. Make…
Read more

Discover Dark Data

Information overload.   One of the key phenomena that has come to define the digital age.   The consequences of this information glut cover a wide spectrum.  From the analytical perspective, finding answers to important questions and identifying what constitutes relevant information, has become increasingly difficult for businesses seeking to navigate the sea of available…
Read more

Insider & Outsider Threats in Today’s Digital Age

Insider & Outsider Threats in Today's Digital Age     What is the value of trust? How much do you trust the security of your business in today's’ digital age?   Would you know if an attacker breached your infrastructure and sent out sensitive data? Would you know if a trusted insider sent out sensitive…
Read more