Data Loss Prevention is what we do

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure … Is your report ready?

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure … Is your report ready? May 11, 2017 Section 1 c (ii) of the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, … Read More

GTB’S Vision for the DLP  Data Protection Space

From a philosophical standpoint, the main difference between GTB DLP and the others is policymaking.

 

Good Data Protection / DLP Policy making has many ingredients.

 

First, is the classification of data. Then, the ability to detect that data followed by policy making. Finally, enforcement of those policies.

The problem for most DLP solutions has to do with the implementation of the DLP methodology or what we call “DLP Vision”.

 

failure of DLP Solutions

What other solutions focus on 

Detection: Other “leading ” DLP vendors focus on detection of content using imprecise detection methods.  Imprecise detection (regular expressions, keyword matching, tagging, Machine Learning, etc) are a major cause for DLP failures.  These detection techniques cause an unmanageable amount of false positives, thus require “tuning”, the achilles heel for DLP solutions.  Only precise detection (content registration or fingerprinting) will yield virtually zero false positive rates.  Other DLP solutions can’t perform fingerprinting without “choking”.

Policy: Other solutions also focus on policy making for what’s allowed, what’s not allowed, what are the sources and variables of data, etc.  There are just so many policy options and inputs these DLP systems with the described vision can handle,  especially with large organizations encompassing thousands of end users.   To visualize this, take the following example, most DLP solutions will need to develop a policy for EACH specific user, in order to send certain amounts or types of data to a specific destination.

Enforcement:  This requires thousands of polices! One can get lost within the jungle of polices. Because this approach requires customers to create polices for EACH user, there are repercussions for a large enterprise such as false-positives, expensive “tuning“, and network degradation. All are costly and unproductive creating more problems than solving.

[spacer]

MSSP

GTB Technologies DLP that WorksTM platform is geared to revolutionize this poor vision for the DLP space.

The Data Loss Prevention vision of GTB is focused on deploying policies, utilizing precise detection methods, with our patented, proprietary content-aware-reverse-firewall with AccuMatch technology. Just like a firewall, GTB policy making is focused on the exceptions to the rules rather than what is allowed or disallowed for each specific user. GTB created this technology along with its detection engines to insure that each DLP event is a valid and noteworthy event for efficient workflow.

GTB customers do not need to insert thousand of policies, for a specific user or user groups. Instead, they can gain network visibility throughout their entire environment via a firewall process creating objects and administering rules on the objects. This deductive methodology allows for simple policy making and enforcement all in a firewall format.

gtb-dlp-that-works-cloud-app-endpoint

Data Protection outside the network

Furthermore adding to its’ data extrusion protection methods, GTB DLP offers organizations the ability to place policies on specific files and / or data  that are outside their environment.

The above capabilities are some of the many reasons why GTB prides itself in providing true data protection to its’ customers, a data protection solution that works.

 

GDPR Data Protection Suite from GTB Technologies

What are the Data Protection Officer’s Tasks as Defined under EU GDPR?

What are the Data Protection Officer’s Tasks defined under EU GDPR? Article 39 Tasks of the Data Protection Officer (DPO) The data protection officer shall have at least the following tasks: (a) to inform and advise the controller or the … Read More

ICO publishes International Strategy to help protect UK public’s personal information in a global environment

04 July 2017    Latest news from the  UK’s Information Commissioner’s Office (ICO) website

The ICO has published its first ever International Strategy to help it meet overseas data protection challenges including increased globalism, changing technology, GDPR and Brexit.

The strategy aims to enhance privacy protection for the UK public, no matter where in the world potential threats and risks emanate from. It also commits the ICO to learning about new ideas and developments emerging from other countries.

Elizabeth Denham, Information Commissioner, said:

“There is little doubt that there are challenging times ahead but we are well placed to tackle them. We have a powerful voice and it is heard around the world, but we are excellent listeners too. That is our strength.

“This blueprint for how we’ll deliver on our international objectives was informed by experts from all over the world who challenged our perceived priorities and advised on what our next steps should be.”

The strategy sets out what the ICO sees as its main international concerns over the next four years:

  • To operate as an effective and influential data protection authority at European level while the UK remains a member of the EU and when the UK has left the EU, or during any transitional period.
  • Maximising the ICO’s relevance and delivery against its objectives in an increasingly globalised world with rapid growth of online technologies.
  • Ensuring that UK data protection law and practice is a benchmark for high global standards.
  • Addressing the uncertainty of the legal protections for international data flows to and from the EU, and beyond, including adequacy.

To continue this article, go to https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2017/07/ico-publishes-international-strategy/

 

Senate, House Versions of Cyber Hygiene Bill Introduced

NIST, FTC, DHS would work together

Jun 30, 2017 05:21 AM ET

Rep. Anna Eshoo (D-Calif.) has introduced a “cyber hygiene” bill, H.R. 3010, which would require the National Institute of Standards and Technology to come up with cyber security best practices.

The goal is to better protect from attacks that Eshoo says cost the economy almost a half-trillion dollars a year. “The scary truth is that data security experts have suggested 90 percent of successful cyberattacks are due to system administrators overlooking two integral pillars of network security: cyber hygiene and security management,” she said.

To continue this article, go to http://www.broadcastingcable.com/news/washington/senate-house-versions-cyber-hygiene-bill-introduced/166912

 

GTB The Leader

Europe hit by massive cyberattack

Europe hit by massive cyberattack By Associated Press June 27, 2017 | 11:20am | Updated “PARIS — A new and highly virulent outbreak of malicious data-scrambling software appears to be causing mass disruption across Europe, hitting Ukraine especially hard. Company and … Read More

Want to see something cool?

Want Easy Access to
Data Security that Works?

Secure your Sensitive Data, including from  Remote Users



Try it for Free