GTB Endpoint Protector Brochure - Cloud Ready Endpoint DLP
-
Upload
ravindran-vasu -
Category
Documents
-
view
279 -
download
11
Transcript of GTB Endpoint Protector Brochure - Cloud Ready Endpoint DLP
GTB Technologies is a next generation Data Loss Prevention
(DLP) company combining the accuracy and speed required to
prevent unauthorized, embarrassing leaks of sensitive data from
occurring over the corporate network or at endpoint devices.
Independent evaluations confirm that GTB's Data AccuMatch™
detection algorithms are the most accurate and fastest
detection algorithms on the market. The GTB Inspector can
detect both structured and unstructured data preventing
leakage of you actual business data. Both text and binary files
like source code, audio and video are supported.
Endpoint Protector Cloud enabled DLP T M
blocks, encrypts, alerts and audits removable media o Provides complete access
control addressing all removable media
o Manages detailed file
auditing
INNOVATION = TRUST
G TB Tec h no l og i es m iss i on
i s t o l e ad i n b o th
i n n ov a t i o n a n d c us tom e r
t ru s t .
Th e G TB D a ta L os s
P re ve n t io n S u i te o f f e rs t h e
e ss e n t i a l e l em en ts o f a
D a ta Lo ss P re ve n t io n
s o lu t i on i nc lu d in g :
• A cc u racy
• A l l P ro toc o l s / Po r t s
• S ca l ab i l i t y
• S ec u r i ty
• L a n gu a ge su p po r t
• L o w es t c os t o f
o w n e rs h ip
The GTB Endpoint Protector is a content-aware
device control addressing the growing problem of
sensitive data leaving the organization through
removable media devices such as iPods, iPads, USB
Drives, CD and DVD writers and many others.
The GTB Endpoint Protector controls access to
removable media, provides detail audit reports on any
activity, protects data by selective encryption of
specific file types or protected content, and optionally
integrates with the GTB Inspector to monitor and
control data before it is transferred to removable
media.
Result: The GTB Endpoint Protector monitors any I/O
activity on a PC for all removable media activity,
enforcing access policies created in the management
console.
"100% catch rate for data leakage? You bet! If you have sensitive information on your enterprise, you need
this device... This is a first rate product with some real innovations.” Peter Stephenson, Editor, SC Magazine
Accuracy Ports Protocols Support
GTB Technologies Inc. 5000 Birch St., suite 3000 Newport Beach, CA 92660 1.800.507.9926 www.gtbtechnologies.com Copyright 2010 All rights reserved
Endpoint Protector Cloud enabled DLP T M
blocks, encrypts, alerts and audits removable media o Provides complete access
control addressing all removable media
o Manages detailed file
auditing
INNOVATION = TRUST
G TB Tec h no l og i es m iss i on
i s t o l e ad i n b o th
i n n ov a t i o n a n d c us tom e r
t ru s t .
Th e G TB D a ta L os s
P re ve n t io n S u i te o f f e rs t h e
e ss e n t i a l e l em en ts o f a
D a ta Lo ss P re ve n t io n
s o lu t i on i nc lu d in g :
• A cc u racy
• A l l P ro toc o l s / Po r t s
• S ca l ab i l i t y
• S ec u r i ty
• L a n gu a ge su p po r t
• L o w es t c os t o f
o w n e rs h ip
`
Supported Devices Access Control
USB Drives Individual Users
iPod, other mp3 players User Group
CD/DVD Computer Group
Firewire Port
SD Cards Device Type
Floppy Drives File Type
Other I/O devices Drive Serial Number
Features
LDAP Integration - Automatically identifies
the Domain, Groups, Computers and Users.
Files Encryption – Automatically encrypts
files based on action or based on content.
Detailed File Auditing – Records all Read and
Write actions to removable media.
Detailed Hardware Auditing – Records any
device connected to any machine on the
Network.
Two way file control – Controls Read and
Write as well as Execute.
Online & Offline mode – Enforces policies
when the machine is not connected to the
Domain.
File shadowing – Retains copies of all
Blocked or Read files.
GTB Technologies Inc. 5000 Birch St., suite 3000 Newport Beach, CA 92660 1.800.507.9926 www.gtbtechnologies.com Copyright 2010 All rights reserved
Enforcement Actions
Blocks
Logs
Audits
Encrypts
Device Type
Content-aware