2021 Legal 100 GTB Best DLP Solution

2021 Winner

Best DLP Solutions Provider Lawyer International

Lawyer International .. Acknowledging exceptional global achievements.

The process…

Each year we have the pleasure of announcing the Legal 100, Global Awards and Legal 100 Asia and select 100 leading professional firms and individuals, globally, who are noted for their individual areas of specialisation, within their geographical locations.

Over the previous 12 months, we analyse in excess of 189,000 votes, either provided as self-submission or via third party nomination, and we are then able to provide a comprehensive breakdown as to who are the winners.

 The world’s leading professional firms and individuals are called upon to assist with transactional and corporate matters continually. Helping the corporate team on matters of vital importance in areas associated with the geographical location and the sector that a business may operate within. Regulatory, compliance, property, environmental, fund formation, technology, employment law, banking, corporate, M&A, private equity, insurance & due diligence amongst others all rank high on the agenda. Recognising the experience and skills that many of the developed nations have, we know how important it is to be recognised as a leader in your field of expertise.

Lawyer International’s awards recognise a select number of leading professional firms and individuals, across the globe, for their individual areas of specialisation, within their geographical location.

During the judging process a number of factors are considered. The voting readers are asked to identify those firms and individuals that are noted for having a high degree of ability in complex situations, those that continually innovate, level of service is of great importance as is overall value for money, in what is a tough global economy.

The awards will provide the Global readership with a definitive guide to those firms, and individuals, that truly are the most able, within all areas, across all geographical locations that the monthly magazine reaches.

Across all regions, it is important to recognise that many firms and individuals are notable, and very able, but few can really consider themselves as being the firm and individual of choice within a certain practice area, or practice areas, within a specific geographical location.

The awards exist to showcase those firms and individuals that continually provide the client with an outstanding level of service, demonstrating an incredibly high degree of ability, whilst delivering the outstanding results that are synonymous with firms and individuals of this calibre.

Nominations were received across our entire global readership, a judging panel consisting of in-house counsel, individuals within both the world of Banking and Private Equity, as well as corporations, both public and private. We have also received a large degree of nominations from the Corporate Finance industry, from senior individuals within areas such as Investment Banking, as these individuals will often experience the sheer tenacity of those involved in transactions alongside them and the other advisors, required within the transaction team.[1]

In summary, for a firm and individual to be recognised as a winner in Lawyer International’s awards there needs to be evidence of unquestionable ability, endorsed with positive comments from both clients and peers.

[1] https://www.lawyer-intl.com/winners

Technology Leadership:

Technology which is simple and easy to deploy while being the most powerful within the data protection space.  GTB’s Data Protection that Works platform provides organizations the overall control and visibility needed to manage advanced threats, analyze data, prevent data loss, enforce compliance while protecting the brand and reputation.

Protects structured dataSecures database data – SSNs, CCNs, etc.
Protects unstructured dataSecures digital assets including movie and audio files, pictures, intellectual properties, patent apps, source code, etc.
Protects text and binary dataData format agnostic
Language independent with  Multilingual Detection & UI PresentationCan be deployed internationally
Virtually zero false positive rateProprietary artificial intelligent algorithms provide FPRs & FNRs of ZERO!  Can be deployed in-line or off-line to block transmissions with 100% accuracy*
Sophisticated content rules
definitions, OCR within images, GEO-Location context
Customized security rules aligned with your security policies. I.E.: FISMA, GLBA, PCI, HIPAA, etc.
Resilience to data manipulation, I.E. copy-n-paste, excerpting, format conversion, and retypingHighest possible security and precision of monitoring and blocking secure content
Coverage of all network protocols, Endpoints (Mac OS X & Windows)
including SSL, & Cloud apps
No secure content can be leaked
Protects any databaseMeets your enterprise needs and offers easy implementation
Protected data is never duplicated onto the InspectorDuplicating your data would create a security breach in itself
Scalable to outbound network bandwidthNo false negatives
Enterprise Workflow,  Alerts security respondents based on policy and/or severity levelEasy to manage DLP system
Supports TLS and Smart HostsEasy Email Integration
Detects encrypted contentAvoids severe data breaches
Discover, Classify & Inventory Data – with OCRRealtime coverage of Data Repositories, cloud storage, etc.
Advanced Endpoint Protection, Network DLP in a feather light agent, GeoTag / GeoFence, Data Classifier.Coverage for endpoint & applications including POS solutions.  Data Classifier now available.
Advanced Application ControlBlock unauthorized data ex-filtration, White-List & Black-List with ease, continuous visibility and control
Printer Control  Coverage for printers and printer apps
URL FilteringWhite-List & Black-List with ease

Visibility: Accurately, discover sensitive data; detect and address broken business process, or insider threats including sensitive data breach attempts.

Protection: Automate data protection, breach prevention and incident response both on and off the network; for example, find and quarantine sensitive data within files exposed on user workstations, FileShares and cloud storage.

Notification: Alert and educate users on violations to raise awareness and educate the end user about cybersecurity and corporate policies.

Education: Start target cyber-security training; e.g., identify end-users violating policies and train them.

  • Employees and organizations have knowledge and control of the information leaving the organization, where it is being sent, and where it is being preserved.
  • Ability to allow user classification to give them influence in how the data they produce is controlled, which increases protection and end-user adoption.
  • Control your data across your entire domain in one Central Management Dashboard with Universal policies.
  • Many levels of control together with the ability to warn end-users of possible non-compliant – risky activities, protecting from malicious insiders and human error.
  • Full data discovery collection detects sensitive data anywhere it is stored, and provides strong classification, watermarking, and other controls.
  • Delivers full technical controls on who can copy what data, to what devices, what can be printed, and/or watermarked.
  • Integrate with GRC workflows.
  • Reduce the risk of fines and non-compliance.
  • Protect intellectual property and corporate assets.
  • Ensure compliance within industry, regulatory, and corporate policy.
  • Ability to enforce boundaries and control what types of sensitive information can flow where.
  • Control data flow to third parties and between business units.
"100% Catch Rate for Data Leakage? You Bet! ... We give this product our SC LabApproved Rating, the highest recognition we offer"
Peter Stephenson,
SC Magazine
Take the Next Step to Stop Data Breaches
Want to see something cool in less than 30 seconds?

Want Easy Access to
Data Security that Works?

Secure your Sensitive Data, including from  Remote Users

Try it for Free

Take the Next Step to Stop Data Breaches