Industry Compliance & Regulatory Requirements
Complete Data Protection for
Cloud, CASB, Data Silos, Data Warehouses, Edge Computing, IoT, MSSP, PCI DSS, SaaS, Web 2.0, and so on...
Give organizations the ability to be compliant with Federal, State & International Government data security regulations as it relates to Sarbanes Oxley (SOX), Gramm-Leach-Bliley Act ( GLBA ), HIPAA, PII, Fair Credit Reporting Act (FCRA), Family Educational Rights and Privacy ( FERPA ), Federal Information Security Modernization Act, P. L. No. 113-283 (2014), CA SB1386, CA AB1950, CA AB-375 CCPA (California Consumer Privacy Act of 2018), HB18-1128 (Colorado's Protections for Consumers Data Act), NY DFS 23 NYCRR 500, Payment Card Industry (PCI) Data Security Standard (PCI DSS), Children’s Online Privacy Protection Act ( COPPA ), The US Patriot Act, FERC/NERC, CEII, FINRA 17a-4, FISMA, GDPR, GB/T 35273-2017 Information Technology – Personal Information Security Specification (GB/T 35273-2017 信息安全技术 个人信息安全规范) hereinafter “the Standard” in China, PCI, PHIPA, Privacy and Electronic Communications (EC Directive) Regulations, ITAR, DOD Information Assurance, EU Data Protection directive, Data Breach Notification Law, NPP-9, PDPA, PIPEDA, Law 152-FZ "On Personal Data" Code Federal Financial Markets Service, the Joint UK Corporate Governance Code, the Wet bescherming persoonsgegevens, the Data Protection Act (“DPA”) Turkey Law No 6698 titled Protection of Personal Data (Kisisel Verilerin Korunması Kanunu, hereafter: KVKK ), South Africa Protection of Personal Information (POPI) Act ... and many others.
Accurate Detection coupled with Port & Protocol Coverage
New programs requiring the use of unconventional protocols are becoming increasingly more prevalent. Furthermore, despite company policies forbidding the practice, employees frequently utilize peer to peer applications. Microsoft Networks and similar protocols, initially designed for LAN, are perfectly capable of working over the Internet.
Malicious applications (e.g., viruses and worms) can be utilized to transfer data across a broad variety of protocols. So supporting just SMTP, HTTP, FTP and IM is a real limitation for the majority of DLP Solutions is NOT DLP.
GTB's Data Loss Prevention solutions protect data in ALL forms- Data at Rest, Data in Motion and Data in Use. GTB's Data Protection Platform technology provides organizations with a Unified Data Centric Policy Approach. One which offers the overall control and visibility needed to manage advanced threats, analyze data, prevent data loss, enforce compliance while protecting the brand and reputation.
One Platform, One Central Console equates to Increased Efficiency, Lowest TCO
Network DLP / Data in Motion- Data in motion is traffic on the network, it can be either inline or out of line, inbound or outbound
Data in Use- Data in Use is data that is saved onto devices.
Discovery with Data Classification - GTB’s Discovery scans data stores, cloud apps and local PCs / file-shares to accurately identify, classify and inventory sensitive data.
Endpoint DLP / Data at Rest GTB’s Data at Rest Scanner (DARS) identifies sensitive data that is stored in locations.
Inspector Cloud - deliver the most accurate, best-in-class data security for Cloud deployments
Context & Content Aware Enterprise Digital Rights Management - Protection around the data, not the device
Policy Templates can be used with data classification and Data Labeling and Monitoring (DLM) software, including Identity finder, Titus and Bolden James, CASB tools and / or digital rights management services (EDRM) including Seclore and Microsoft RMS. Example templates include:
Deployed on-premises or off premises via the GTB Cloud SaaS; in either a fully managed (MSSP), Hybrid or self managed service which is simple to deploy, easy to use and has a quick ROI.