Category Archives: Gartner

Continuous Risk and Trust Assessment Approach

Continuous Risk and Trust Assessment Approach The industry standards in information security have been undergoing dramatic changes over the past several years.  So what is the Continuous Risk and Trust Assessment Approach? The paradigm of network security monitoring has firmly shifted from a rigid, concretized approach, to one the focuses on adaptability and dynamism. Nowhere…
Read more

GTB Technologies Positioned Furthest for Completeness of Vision in the Visionary Quadrant of Gartner’s Magic Quadrant for Enterprise Data Loss Prevention

5 time Visionary , GTB Technologies positioned furthest for Completeness of Vision, strengths noted as: " ■   GTB's combination of data fingerprinting, OCR and native SSL decryption provides powerful interception capabilities, particularly for intellectual property protection use cases ■   Customers speak highly of GTB Discovery, which allows for large amounts of data to…
Read more

Happenings at the Gartner IAM Identity and Access Management Summit

Happenings at the Gartner IAM Identity and Access Management Summit

With the increase of cloud adoption at an exponential rate, businesses are asking themselves what data security precautions and prevention tools need to be adopted and put in place.

Additionally, recent independent research and analyst reports on Cloud Access Security Broker (CASB)  / CSGs indicated that traditional DLP solutions are unable to provide coverage for sensitive data moving to the cloud[1],  ..... well this is partially correct.  Traditional DLP can’t provide coverage however the Next Generation DLP that Works platform can.

Join GTB Technologies during the Gartner IAM Identity and Access Management Summit this year, to see how we’ve transformed the Data Protection market.

You can find us at Booth #110 demonstrating, in just 30 seconds, the industry’s first fully integrated Enterprise Data Protection that actually works.

Or schedule a one-on-one meeting with one of our data security experts to learn how we can help with your cybersecurity needs.

 

[1] Cloud Security Gateways, Q4 2016