GTB’S Vision to the DLP Data Protection Space

GTB’S Vision for the DLP  Data Protection Space

From a philosophical standpoint, the main difference between GTB DLP and the others is policymaking.

 

Good Data Protection / DLP Policy making has many ingredients.

 

First, is the classification of data. Then, the ability to detect that data followed by policy making. Finally, enforcement of those policies.

The problem for most DLP solutions has to do with the implementation of the DLP methodology or what we call “DLP Vision”.

 

failure of DLP Solutions

What other solutions focus on 

Detection: Other “leading ” DLP vendors focus on detection of content using imprecise detection methods.  Imprecise detection (regular expressions, keyword matching, tagging, Machine Learning, etc) are a major cause for DLP failures.  These detection techniques cause an unmanageable amount of false positives, thus require “tuning”, the achilles heel for DLP solutions.  Only precise detection (content registration or fingerprinting) will yield virtually zero false positive rates.  Other DLP solutions can’t perform fingerprinting without “choking”.

Policy: Other solutions also focus on policy making for what’s allowed, what’s not allowed, what are the sources and variables of data, etc.  There are just so many policy options and inputs these DLP systems with the described vision can handle,  especially with large organizations encompassing thousands of end users.   To visualize this, take the following example, most DLP solutions will need to develop a policy for EACH specific user, in order to send certain amounts or types of data to a specific destination.

Enforcement:  This requires thousands of polices! One can get lost within the jungle of polices. Because this approach requires customers to create polices for EACH user, there are repercussions for a large enterprise such as false-positives, expensive “tuning“, and network degradation. All are costly and unproductive creating more problems than solving.

[spacer]

MSSP

GTB Technologies DLP that WorksTM platform is geared to revolutionize this poor vision for the DLP space.

The Data Loss Prevention vision of GTB is focused on deploying policies, utilizing precise detection methods, with our patented, proprietary content-aware-reverse-firewall with AccuMatch technology. Just like a firewall, GTB policy making is focused on the exceptions to the rules rather than what is allowed or disallowed for each specific user. GTB created this technology along with its detection engines to insure that each DLP event is a valid and noteworthy event for efficient workflow.

GTB customers do not need to insert thousand of policies, for a specific user or user groups. Instead, they can gain network visibility throughout their entire environment via a firewall process creating objects and administering rules on the objects. This deductive methodology allows for simple policy making and enforcement all in a firewall format.

gtb-dlp-that-works-cloud-app-endpoint

Data Protection outside the network

Furthermore adding to its’ data extrusion protection methods, GTB DLP offers organizations the ability to place policies on specific files and / or data  that are outside their environment.

The above capabilities are some of the many reasons why GTB prides itself in providing true data protection to its’ customers, a data protection solution that works.

 

Visibility: Accurately, discover sensitive data; detect and address broken business process, or insider threats including sensitive data breach attempts.

Protection: Automate data protection, breach prevention and incident response both on and off the network; for example, find and quarantine sensitive data within files exposed on user workstations, FileShares and cloud storage.

Notification: Alert and educate users on violations to raise awareness and educate the end user about cybersecurity and corporate policies.

Education: Start target cyber-security training; e.g., identify end-users violating policies and train them.

  • Employees and organizations have knowledge and control of the information leaving the organization, where it is being sent, and where it is being preserved.
  • Ability to allow user classification to give them influence in how the data they produce is controlled, which increases protection and end-user adoption.
  • Control your data across your entire domain in one Central Management Dashboard with Universal policies.
  • Many levels of control together with the ability to warn end-users of possible non-compliant – risky activities, protecting from malicious insiders and human error.
  • Full data discovery collection detects sensitive data anywhere it is stored, and provides strong classification, watermarking, and other controls.
  • Delivers full technical controls on who can copy what data, to what devices, what can be printed, and/or watermarked.
  • Integrate with GRC workflows.
  • Reduce the risk of fines and non-compliance.
  • Protect intellectual property and corporate assets.
  • Ensure compliance within industry, regulatory, and corporate policy.
  • Ability to enforce boundaries and control what types of sensitive information can flow where.
  • Control data flow to third parties and between business units.