Core Technology of Enterprise DLP -  Unsurpassed & Accurate

Protection of the Data - regardless of the device or file

 

Based on patent-pending, proprietary technology with trade secret artificial intelligent algorithms that yield false positive rates and false negative rates of ZERO, GTB Technologies Data Protection platforms and solutions prevent the loss of confidential or protected data (including IP or trade secret information) from your organization over a whole range of network protocols, applications, data formats and usage scenarios, including the enforcement of sensitive data both to and from the cloud.

An attempted data leak is blocked, even if the protected data was altered from its original form through format conversion, copying, extracting, embedding, re-typing,  compression, file extension changes etc.

 
Technology Foundation -  AccuMatchTM Detection Engines with Intelligent Smart Search

One of the key differentiators to the GTB Data Protection System are its proprietary, patent pending Data AccuMatchTM detection and Intelligent Smart Search algorithms, which allow GTB's Data Protection solutions to detect and match pre-defined data with proven unprecedented, unrivaled accuracy and speed.

Unmatched Intelligence
AccuMatchTM Detection Engines are so advanced with the unique proven ability to accurately detect partial file matches on greater than 10 terabytes of unstructured fingerprinted data without network degradation!

GTB's proprietary technology is so innovative and intelligent, that unlike others, the detection engine doesn't "choke" when moving into the Multi-Terabyte range.

 

Binary & Text Data Inspection

Both text and binary data are protected.  All Channels, All Protocols have binary and text data inspected and acted upon.  Multiple span ports with greater than 1 Gig/sec bandwidth.  Both structured data (social security numbers, credit card numbers, bank accounts etc.) and unstructured data (reports, memos, designs, source code, agreements, patent applications, MRI files, etc.) are protected.  Within documents, both visible and invisible data are protected. OCR inspection for both Data in Motion and Data at Rest covers scanned images, screen shots, and the like.

 
Core Detection & Analysis Algorithms

Methods for describing sensitive content are abundant.  They can be divided into two categories: precise methods and imprecise methods.

Precise methods are, by definition, those that involve Content Registration and trigger almost zero false positive incidents.

All other methods are imprecise.  They include:  keywords, lexicons, regular expressions, extended regular expressions, meta data tags, Bayesian analysis, statistical analysis such as Machine Learning, etc.

Combined with the proprietary algorithms, GTB's AccuMatchTM detection algorithms have virtually zero false positives and a very high resilience to data modifications including:

Excerpting, inserting, file type conversion, formatting,    ASCII ->UNICODE conversion,     UNIX–Windows conversion,   partial data match, and so on.

Real-Time Detection for BOTH Outbound or Inbound Transmissions

Real-time detection is an important aspect of all DLP components, i.e., Network, e-Discovery and content-aware Endpoint protection.   The GTB detection technology has the rare capability of real time inspection and detection of secure content.  The unique advantage of Real-Time inspection is the ability to prevent data loss over the network on any protocol.

This is in stark contrast to competing solutions which can prevent data loss/Leak (i.e.block a violating transmission) only on non-Real-time protocols: SMTP via MTA, HTTP/S or FTP via a proxy and/or ICAP server.

Proxy not needed on Inbound or Outbound Traffic Inspection

GTB Inspector also has its own SSL Internet Content Adaptation Protocol (ICAP)  so there is no need for another web proxy. Already have a web proxy – no worries, GTB’s Network Enterprise DLP has ICAP functions which are compatible with Blue Coat, Cisco, Forcepoint , Intel Security and like proxy products.

GTB's Endpoint Protection offers complete data-in-use content inspection DLP capabilities

Mail Transfer Agent (MTA)

GTB’s DLP that Works Inspector has an on-board Mail Transfer Agent (MTA) that permits the Inspector to   become a smart host for MS Exchange, Lotus Notes, and the like.

File Cracking

The GTB Detection Engines use numerous proprietary techniques for file cracking from its competitors. The process does not require knowledge of the file type, nor the location of the beginning of the file nor its end in the data stream.

GTB is Next Generation Data Protection

You Can't Protect the Data of Tomorrow on the Stale Solutions of Yesterday... 

GTB Technologies Next Generation Data Protection Platforms' enable Collaboration & Innovation while your Data remains Secure and Compliant

FREE Download