Strengthen Security, Compliance Control Governance & Risks
#imetrixexpert
Strengthen Security, Compliance Control Governance & Risks
#imetrixexpert
GTB Technologies file share monitoring solution, the Auditortm, lets organizations focus on the continuous monitoring of file user activities – based on the end-user and the content which aids in the identification, tracking, and alerting of the suspicious end-user file activity. GTB’s Auditor helps in the determination of whether your organization is at risk of a data breach, insider threat, or just not meeting compliance requirements.
the Auditortm, is file share agnostic, supports any file-share storage and focuses on the continuous monitoring of file user activities, including identifying suspicious or malicious activity. File activities include Read, Write, Modify, Rename, Copy, Attach, Move, Delete, Execute, and more.
The Auditor is unique with the ability to accurately focus on the End-user / file share, not the file extensions thus allowing organizations to protect their intellectual property, including design documents, source code, manufacturing plans, and drug patent applications. Many times, these types of Intellectual property are created in custom-built or industry-specific applications, so they have unique file extensions.
Movement of sensitive data is controlled to and / from any file share
Centrally manage data security risks, policies, and controls across different environments, endpoints, applications, and cloud applications including unstructured, semi-structured, and structured repositories or silos.
Focusing on file extensions creates the dreaded “alert fatigue” due to the increase in false-positive events. By focusing on the content, the Auditor is able to accurately track, monitor, and protect important and sensitive data as the end-user moves it.
Understand your blind spots and see what your end users are doing with your sensitive data, then take action
GTB improves traditional role-based access control (RBAC) with adaptive access control (conditional access control)
While GTB DLP monitors and inspects actual content at all egress points of the enterprise, GTB UBA focuses and reports on data handling by users. The combination of the two improves visibility to possible insider threat as well as data breaches.
GTB DLP with a combination of GTB UBA monitors all users’ activity both when the user is on-premises as well as when the user is off-premises. All file activities are monitored including Open, Save, Read, Write, Print, Attach, Delete and even which applications were executed. In addition, the system may filter for those files that have had sensitive data for better analysis. Such monitoring is done for all egress points including USB Devices, Email, Webmail, FTP, and Print jobs.
Monitoring all users’ activity may result in producing millions of events most of which are not relevant to effective data security. GTB DLP/UBA allows administrators to set up a policy to only monitor a specific division or a computer group or a hostname and even just monitor a specific username. This way the system generates events that are pertinent and useful to the organization.
Whether the user is on-premises or off-premises, the system will monitor all USB device activities including Read, Write, Move, Delete, Copy, Attach, and any application that was executed from such a device. The system also measures the number of files as well as the size of the files which were saved during a pre-defined time-range.
GTB advanced DLP/UBA Classification system provides three modes of classification: User-based classification, System based classification, and the combination of the two. The system maps DLP Policies to classification levels and is able to classy files and emails based on these classification settings. Once files are classified, the system is able to monitor any user accessing highly sensitive data based on the classification of such data. A full report of file names, location, activity, and timestamp are available.
Control data from a myriad of sources— laptops, database exchanges, all cloud services and infrastructures, such as AWS, Amazon Cloud, Azure, Box, Dropbox, Evernote, Google Cloud, Google Docs, Google Drive, Office 365, OneDrive, Salesforce, Skype for Business and more to Shadow IT (BYOx). GTB's CASB with a Twist
T: +30 210.300 2050
Ad: 20-22 Tzortz st. | Athens | GR
24/7 Client Support
22 years of experience in one click! Follow the link to enter to our support suite.
Business Continuity
Operational
Hospitality
Remote Secure
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-advertisement | 1 year | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Advertisement". |
cookielawinfo-checkbox-analytics | 1 year | This cookies is set by GDPR Cookie Consent WordPress Plugin. The cookie is used to remember the user consent for the cookies under the category "Analytics". |
cookielawinfo-checkbox-necessary | 1 year | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 1 year | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Others". |
cookielawinfo-checkbox-performance | 1 year | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
elementor | never | This cookie is used by the website's WordPress theme. It allows the website owner to implement or change the website's content in real-time. |
Cookie | Duration | Description |
---|---|---|
pll_language | 1 year | This cookie is set by Polylang plugin for WordPress powered websites. The cookie stores the language code of the last browsed page. |
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | This cookie is installed by Google Analytics. The cookie is used to calculate visitor, session, campaign data and keep track of site usage for the site's analytics report. The cookies store information anonymously and assign a randomly generated number to identify unique visitors. |
_ga_579L5T1NYX | 2 years | This cookie is installed by Google Analytics. |
_gat_gtag_UA_203525984_1 | 1 minute | This cookie is set by Google and is used to distinguish users. |
_gid | 1 day | This cookie is installed by Google Analytics. The cookie is used to store information of how visitors use a website and helps in creating an analytics report of how the website is doing. The data collected including the number visitors, the source where they have come from, and the pages visted in an anonymous form. |
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-functional | 1 year | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
WHMCSy551iLvnhYt7 | session | No description available. |