GTB Endpoint Protector - Enterprise DLP
Protect Data accurately with unrivaled detection against data theft while on premises, off and anywhere in-between WITHOUT THE NEED TO PHONE HOME!
Enterprise Endpoint DLP
provides unrivaled protection against accidental disclosure and theft of sensitive data and critical assets from trusted and untrusted (malware, APT) users.
Rather than restricting devices that connect to the network and passively audit data transfers, the GTB Advanced Endpoint Protector offers organizations the ability to control what content can be transferred between the network, applications & removable media devices - both on and off premises, including cloud applications.
Secure intellectual property, sensitive data and meet regulatory compliance quickly with out-of-the-box and custom policies, applying unique market leading DLP detection capabilities to control data theft on Mac, Windows and soon to be released Linux.
is data that is saved on removable media devices. GTB's Endpoint Protector scans data for sensitive content before it is saved and then can block unauthorized transfers. The Endpoint Protector can also detect activities such as copy and paste, or use of sensitive data in an unapproved application, such as someone encrypting the data in an attempt to bypass the Endpoint Protector's block.
Secure traffic over applications & devices with one, unified policy.
Provide context & content-aware device & data control that recognize and optionally blocks the output or removal of secure data / content.
Automatically encrypts and shadows.
eDiscovery with data classification
Supports online and offline policies (on-premise or off-premise) fingerprinted data, controls encrypted data.
Prevent APT incidents from sending out sensitive data while "phoning home", without even knowing you have malware.
Enterprise Application Control with Blacklisting and Whitelisting
GTB's Endpoint Enterprise DLP main functions:
The GTB Endpoint Enterprise DLP client monitors I/O activity, enforcing access policies created in the management console. All data sent to removable media is intercepted and inspected by the GTB inspection engine. Various enforcement actions can then be taken, such as blocking, alerting, encryption, etc.
• USB Drives
• Wireless Interfaces such as: Wi-Fi, Bluetooth
• Mac • Windows • Other I/O devices
• POS System devices
• Cloud Apps / Cloud Storage
• Drop Box
• Gtalk, Google Drive, Google for Work
• Evernote, Microsoft Office 365, Salesforce, Skydrive, Google Drive
• and much more!
• LDAP Integration
• Files Encryption
• Detailed File Auditing
• Detailed Hardware Auditing
• Two way file control
• Online and Offline modes - even for SSL encrypted data