Intelligent Algorithms

GTB DLP Market Leader

False Promise of Blanket Encryption

The false promise of blanket encryption Why data needs to be inspected before its put under lock and key With cyber-attacks on the rise and compliance with regulatory regimes like HIPAA and GDPR becoming more urgent, businesses have been turning … Read More

Gartner Leader

Business Email Compromise

Business Email Compromise   Among the growing threats within today’s cyber-sphere, the trend of Business Email Compromise, or BEC, is certainly nearing the top of the list.   Broadly defined, BEC is a type of sophisticated scam targeting companies who … Read More

Inaccuracies of Machine Learning

Inaccuracies of Machine Learning   Automation has found its way into every major technical industry.   And it’s no wonder why.   Streamlining operations with machines increases productivity and efficiency, especially for fields where large volumes of information are a … Read More

Applying Smart Algorithms for Intelligent DLP

Applying Smart Algorithms for Intelligent DLP & Data Protection Data loss prevention (DLP) and Data Protection programs play a vital role in an organization’s information security strategy. DLP is essential for tracking a company’s volume of data and organizing it … Read More

GTB’S Vision to the DLP  Data Protection Space


From a philosophical standpoint, the main difference between GTB DLP and the others is policy making.


Good Data Protection / DLP Policy making has many ingredients.


First, is the classification of data. Then, the ability to detect that data followed by policy making. Finally, enforcement of those policies.

The problem for most DLP solutions has to do with the implementation of the DLP methodology or what we call “DLP Vision”.


failure of DLP Solutions

What other solutions focus on 

Detection: Other “leading ” DLP vendors focus on detection of content using imprecise detection methods.  Imprecise detection (regular expressions, keyword matching, tagging, Machine Learning, etc) are a major cause for DLP failures.  These detection techniques cause an unmanageable amount of false positives, thus require “tuning”, the achilles heel for DLP solutions.  Only precise detection (content registration or fingerprinting) will yield virtually zero false positive rates.  Other DLP solutions can’t perform fingerprinting without “choking”.

Policy: Other solutions also focus on policy making for what’s allowed, what’s not allowed, what are the sources and variables of data, etc.  There are just so many policy options and inputs these DLP systems with the described vision can handle,  especially with large organizations encompassing thousands of end users.   To visualize this, take the following example, most DLP solutions will need to develop a policy for EACH specific user, in order to send certain amounts or types of data to a specific destination.

Enforcement:  This requires thousands of polices! One can get lost within the jungle of polices. Because this approach requires customers to create polices for EACH user, there are repercussions for a large enterprise such as false-positives, expensive “tuning“, and network degradation. All are costly and unproductive creating more problems than solving.



GTB Technologies DLP that WorksTM platform is geared to revolutionize this poor vision for the DLP space.

The Data Loss Prevention vision of GTB is focused on deploying policies, utilizing precise detection methods, with our patented, proprietary content-aware-reverse-firewall with AccuMatch technology. Just like a firewall, GTB policy making is focused on the exceptions to the rules rather than what is allowed or disallowed for each specific user. GTB created this technology along with its detection engines to insure that each DLP event is a valid and noteworthy event for efficient workflow.

GTB customers do not need to insert thousand of policies, for a specific user or user groups. Instead, they can gain network visibility throughout their entire environment via a firewall process creating objects and administering rules on the objects. This deductive methodology allows for simple policy making and enforcement all in a firewall format.



Data Protection outside the network

Furthermore adding to its’ data extrusion protection methods, GTB DLP offers organizations the ability to place policies on specific files and / or data  that are outside their environment.

The above capabilities are some of the many reasons why GTB prides itself in providing true data protection to its’ customers, a data protection solution that works.


Free Healthcare Data Risk & Audit Preparedness Assessment

Can you meet all those compliance & regulatory requirements? Do understand your HIPAA Risk?

Risk Analysis is the first step in an organization’s Security Rule compliance effort.  Risk Management is a requirement. GTB’s Healthcare Data Risk Assessment allows an organization to conduct an accurate and thorough risk analysis of the potential risks and vulnerabilities of a covered entity’s ePHI.

Utilizing the GTB Data Protection that Works platform, organization’s will be able to start the required security risk analysis and audit preparedness as mandated by the HIPAA Security Rules and the HIPAA Privacy and Breach Notification Rules … at a substantial savings!

Free HIPAA Risk Assessment

·         Identify & Classify Regulated ePHI Data to be controlled

·         Identify potential places where this information might leak – all outbound channels & ports need to be inspected, not just HTTP, Email and the usual Web protocols

·         Scan data stores & Endpoints (laptops, USB, local drives, etc.)  for regulated ePHI, PII, PCI information

·         Apply Policies & Controls – automatically, in real-time

·         Enterprise Reporting – accurate and detailed for Auditors & Administrators

·         No Cost Implementation, Training, Support and Report Review

And a lot more

Try it out

Contact GTB’s Compliance Assurance Services for more information and to receive our latest Case Study:

GTB DLP that WorksTM Platform Secures Enterprise Healthcare Insurer

    Want Easy Access to
    Data Security that Works?

    Secure your Sensitive Data, including from  Remote Users

    Try it for Free

    Take the Next Step to Stop Data Breaches