• English

Network & Cloud Enterprise Data Loss Prevention



GTB Inspector, a Content-Aware Reverse Firewall

Next-Generation Network and Cloud DLP … goes beyond EDLP with Real-Time Accuracy, an Agent-less, Reliable Policy Enforcer – One Console for Increased Efficiency giving the Lowest Network and Cloud Data Security TCO

GTB Technologies provides true data protection with the ability to create, manage & enforce DLP security policies based on content &/ context for when, where, how, and by whom data can or can’t be moved to or from the network &/ devices.

Based on patented, and patent-pending, proprietary technology; GTB’s Inspector, a “Content-Aware Reverse Firewall”TM inspects, classifies, and analyzes ALL outbound &/ inbound data transmissions from your network in real-time.

We’re talking about ALL Channels and ALL types of data, structured and /or unstructured.  Once a unique threshold  of protected data is detected, the GTB Inspector enforces the appropriate action such as

  • Log
  • Encrypt
  • Quarantine
  • Block
  • Severity Block
  • Pass



Employee / End User Education and Security Awareness:

With the belief that education is the most important aspect of security, the GTB Inspector will stop embarrassing or costly mistakes users make on a daily basis. With the GTB Inspector, an organization has the ability to notify/educate employees of a potential security breach / or policy infraction with providing the ability to remediate.

Furthermore, despite company policies forbidding the practice, employees frequently utilize peer to peer applications. Microsoft Networks and similar protocols, initially designed for LAN, are perfectly capable of working over the InternetThe Security Administrator will be notified and take appropriate action. The GTB Inspector can be in transparent mode to gain visibility to user behavior.

Apply Data Security for Global Governance, Risk & Compliance (GRC)

Organizations become secured and compliant with government data security regulations as it relates to Sarbanes Oxley, GLBA, HIPAA, PII, CA SB1386, CA AB1950, Payment Card Industry (PCI) Data Security Standard, The Patriot Act, FISMA, FERC/NERC, GDPR, CCPA, and many others.

We provide comprehensive and detailed reporting for your auditors to prove you are doing what it takes to be compliant and abide by the mandatory mandates

Insider Threats & User Errors

New programs requiring the use of unconventional protocols are becoming increasingly more prevalent. Content Inspection is mandatory to know what users are doing and on what channel. Recent studies show the users of the more popular protocol utilize are email, webmail, FTP, and IM. Having content inspection on these protocols will allow the ability to have a healthy business process and still stop the malicious anomaly of a disgruntled insider.

Have Malware?  Now What?

Malicious applications (e.g., viruses and worms) can be utilized to transfer data across a broad variety of protocols. So supporting just SMTP, HTTP, FTP, and IM is a real limitation for the majority of DLP Solutions and is not real DLP. We know malware and other bot-nets use unknown ports and protocols to send out the sensitive PII/PHI data so organizations must have coverage of all 65,000+ ports and protocols or ways of communicating. Resulting in malicious or unintentional transmissions of confidential data over the network are identified and blocked.

Immediately & easily integrate actions to protect against threats (external and multi-vector such as malware, trusted users, or employee error) by:

  • Automatically setup data ex-filtration blocking controls to prevent the compromising of sensitive data
  • ID infected machines and bring into action containment controls
  • Speed up forensic investigations

The GTB Inspector,  the Data Loss Prevention (DLP) device placed at the network edge (more than one device can be installed if necessary.) The Content-Aware Reverse Firewall offers mass communication features and is compatible with multiple devices and multiple protocols.

Send alerts to different applications including a SIEM, inbox, syslogs, and the like 

Integrate accurate, expansive data security events and analytics into your SIEM or favorite application for better data protection.

GTB’s Technology Differentiators & Features:
  • 1GB speed outbound bandwidth
  • Support for ALL protocols
  • Virtually no false-positive OR no false negatives** for detecting both Personal Identifiable Information and partial file matching
  • Intellectual Property Protection
  • Multi-language support
  • Detection of Encrypted Content
  • Scalability to outbound network bandwidth
  • Enterprise Workflow
  • Multi-location Central Management Console
  • SIEM integration
  • Designed for unattended, maintenance-free operation
  • Portable “all-in-one ” device – to quickly move the appliance between networks (internal or external)
  • Extend data loss prevention to iOS and Android devices,  corporate-owned or user-owned
Data-in-Motion – Outbound & Inbound 
is all traffic on the network. GTB’s “Reverse Content-Aware Firewall” TM Inspector analyzes this traffic for pieces of source code; all communication channels are scanned, such as: e-mails, instant messages, weblogs, etc. If a violation is attempted, the transmission is blocked and then logged on the security report. You can also elect to have the network administrator notified through an alert email.
Accuracy and Precision with Content Inspection & Context Awareness provides Real-time Control of your Data 
•  Virtually zero false positives
•  Virtually 100% detection rate
•  Resilient to data manipulation, including:
•  Data extracting – only a small part of a file or a subset of a database table is copied and pasted from one document to another
•  File format conversion
•  Compression
•  Embedding – the data from a protected file is inserted into another file
•  File extension changes
•  Re-typing – text is re-typed from a printed document
•  Language encoding changes, especially conversion between Unicode and plain English
•  Different representation -, i.e., a social security number may be represented in the form ‘777-77-7762′, ‘777 77 7762′ or ‘777777762”
Protects ALL Protocols 
  • SMTP
  • HTTP
  • WebMail
  • Active Sync (WBMXL)
  • RDP
  • VNC
  • IMAP
  • NNTP
  • HTTP Server
  • POP3
  • FTP
  • FTP Server
  • SSL (capable of decryption)
  • Instant Messengers
  • Yahoo Messenger
  • Microsoft Messenger
  • ICQ
  • AIM
  • Google Talk
  • Cisco Jabber
  • Skype for Business
  • Peer-to-Peer applications
  • (20+ applications and protocols)
  • All protocols, sending data in clear
  • Capable of blocking on all protocols

All other ports and protocols are reported as TCP.

Centralized Enterprise Workflow & Reporting

Visibility: Accurately, discover sensitive data; detect and address broken business process, or insider threats including sensitive data breach attempts.

Protection: Automate data protection, breach prevention and incident response both on and off the network; for example, find and quarantine sensitive data within files exposed on user workstations, FileShares and cloud storage.

Notification: Alert and educate users on violations to raise awareness and educate the end user about cybersecurity and corporate policies.

Education: Start target cyber-security training; e.g., identify end-users violating policies and train them.

  • Employees and organizations have knowledge and control of the information leaving the organization, where it is being sent, and where it is being preserved.
  • Ability to allow user classification to give them influence in how the data they produce is controlled, which increases protection and end-user adoption.
  • Control your data across your entire domain in one Central Management Dashboard with Universal policies.
  • Many levels of control together with the ability to warn end-users of possible non-compliant – risky activities, protecting from malicious insiders and human error.
  • Full data discovery collection detects sensitive data anywhere it is stored, and provides strong classification, watermarking, and other controls.
  • Delivers full technical controls on who can copy what data, to what devices, what can be printed, and/or watermarked.
  • Integrate with GRC workflows.  
  • Reduce the risk of fines and non-compliance.
  • Protect intellectual property and corporate assets.
  • Ensure compliance within industry, regulatory, and corporate policy.
  • Ability to enforce boundaries and control what types of sensitive information can flow where.
  • Control data flow to third parties and between business units.
What's Hot