GTB Endpoint Protect

Enterprise Data Protection with Detect, Respond & Prevent (EDR /P)

Protect Data accurately with unrivaled detection against data theft while on-premises, off, and anywhere in between WITHOUT having to send data to the cloud. GTB’s Enterprise Endpoint Data Protection with DLP, Detect and Prevent (EDR /P); with an optional Data Classifier is a comprehensive security solution designed to safeguard endpoints against a wide range of cyber threats. Utilizing advanced technologies and threat intelligence, it provides robust protection, detection, and remediation capabilities to ensure the security and integrity of endpoints, thus providing unrivaled protection against accidental disclosure, and the theft of sensitive data and critical assets from trusted and untrusted (malware, APT) users.

Stop Data Breaches at the Endpoint

With GTB Technologies®, Unprecedented Data Visibility & Control...anywhere

Detect and Respond Instantly – no cloud connection required

Rather than restricting devices that connect to the cloud/network and passively audit data transfers, the GTB Advanced Endpoint Protect allows organizations to control what content can be transferred between the network, applications & removable media devices – both on and off-premises, including cloud applications.  With the unique ability to ACCURATELY detect, investigate, and respond to data exfiltration attempts, many enterprises use GTB for DLP, EDR & UBA instead of 3 different vendor tool sets.

 

Secure intellectual property, and sensitive data, and meet regulatory compliance quickly with out-of-the-box and custom policies, applying unique market-leading DLP detection capabilities to control data theft on Mac, Windows & Linux.

Data-in-Use

is data that is saved on removable media devices. GTB’s Endpoint Protect scans data for sensitive content before it is saved and can block unauthorized transfers. The Endpoint Protect can also detect activities such as copying and pasting or using sensitive data in an unapproved application, such as someone encrypting the data to bypass the Endpoint Protect’s block.

Key Features:

Endpoint Protection:

  • Real-time protection against malware, ransomware, and other malicious threats.
  • Advanced threat detection algorithms to identify and block sophisticated attacks.
  • Monitoring to detect suspicious activities and potential breaches.
  • Zero-day vulnerability protection to mitigate emerging threats.

Data Loss Prevention (DLP):

  • Granular control over data transfers and access to sensitive information.
  • Content inspection and policy enforcement to prevent data leaks and unauthorized sharing.
  • Encryption capabilities to secure data at rest.
  • Integration with data classification systems for enhanced data protection.

Fingerprint Detection:

  • Identification and tracking of sensitive data based on unique fingerprints.
  • Accurate detection of data patterns and signatures to prevent unauthorized access and exfiltration.
  • Real-time monitoring and accurate alerting and control on fingerprinted data for immediate response.

Data Classification:

  • Automatic classification of data based on content and context.
  • Tagging and labeling of sensitive information for improved visibility and control.
  • Policy-based actions to enforce data handling and protection policies.

OCR (Optical Character Recognition):

  • Extraction of text and data from images, scanned documents, and other non-text files.
  • Analysis of OCR results for sensitive information identification and classification.
  • Integration with DLP and data classification systems for comprehensive data protection.

Device Control:

  • Management and enforcement of device usage policies.
  • Granular control over peripheral devices such as USB drives, printers, and external storage.
  • Prevention of unauthorized device connections to mitigate data breaches and malware threats.

GTB Endpoint Protect Options include:

  • Automatically encrypts and shadows.
  • Enterprise Application Control with Blacklisting and Whitelisting
  • Secure traffic over applications & devices with one, unified policy.
  • Discovery with data classification & misclassification – user based & / or automatic based on content
  • Provide context & content-aware device & data control that recognize and optionally block the output or removal of secure data/content.
  • Supports online and offline policies (on-premises or off-premises) fingerprinted data, and controls encrypted data.
  • Prevent APT incidents from sending out sensitive data while “phoning home”, without even knowing you have malware; while generating forensic data – in real-time with GTB Endpoint Detect & Prevent (EDP)

GTB’s Endpoint Enterprise EDR / DLP

  • controlling removable media devices connecting to the network both in-line or wireless
  • providing detailed removable media auditing of hardware and file transactions
  • protecting data by selective encryption of specific file types or protected content
  • ability to monitor and control data before it is transferred to removable media
  • protection against malicious insider or malware-based data exfiltration

Unrivaled Results

The GTB Endpoint Enterprise DLP/EDR client monitors I/O activity, enforcing access policies created in the management console. All data sent to removable media is intercepted and inspected by the GTB inspection engine.  Various enforcement actions can then be taken, such as blocking, alerting, classifying, watermarking, encryption, etc.  

  • Provides complete access control addressing all removable media
  • Manages detailed file auditing
  • Offers both online, wireless, and offline protection mode
  • OFF-LINE DETECTION – Off-premises fingerprint detection, no need to “phone home” No other solution can!
  • The only solution supporting accurate partial file match on unstructured ‘fingerprint’ data!!
  • Retail POS system data control
  • Drip DLP, OCR, Watermarking
  • Monitor and Control the transfer of files based on usage including the number of files, file size
  • Monitor user behavior using proprietary advanced threat detection techniques
  • Prevent the sharing of data to unauthorized devices or users
  • Understand, Control, Inventory, and Report on which files are being copied to USB devices
  • NO Kernel Extensions, KEXT-Less DLPtm. First Enterprise DLP agent built without kernel extension. OS updates are simple

Features

  • LDAP Integration
  • Files Encryption
  • Detailed File Auditing
  • Detailed Hardware Auditing
  • Printer DLP – with off-premises control
  • Real-time Forensics
  • Detailed Hardware Auditing
  • Online and Offline modes – even for SSL encrypted data
  • Two-way file control … Off-premises printer controls

Actions

  • Block
  • Classify
  • Log
  • Watermark
  • Encrypt
  • Shadow
  • Audit plus File Share DLP – the system controls access and monitors file share activities

Supported Devices & OSx

  • USB Drives
  • Wireless Interfaces such as Wi-Fi
  • FireWire
  • Mac • Windows • Linux: • REHL • Ubuntu • CentOS • SUSE
  • KEXT-less DLP
  • Other I/O devices
  • POS System devices

Apps & Cloud Control

  • BOX
  • Drop Box
  • Citrix ShareFile, QQ
  • Cloud Apps / Cloud Storage
  • File Share Utilities (FUT) including:
  • Gtalk, Google Drive, Google for Work
  • Evernote, Microsoft Office 365, Teams, Salesforce, Skydrive, Slack, Snippet
  • Filezilla
  • FreeFileSync
  • PCloud
  • PuTTy
  • ShareX
  • WinSCP
Advanced MIP support and much more!