SlideShare ist ein Scribd-Unternehmen logo
1 von 29
GTB DLP Suit
                Content-aware
                Security Suite
True DLP for Data Protection

       Daniel Jay   May 2012
AGENDA


•   Who we are?
•   What is DLP?
•   Why say we are next generation?
•   Enterprise configuration?
•   How to prevent your data loss?
Who we are?

• Founded: 2005
• Ownership: Private and self funded
• Headquarter: Newport Beach, CA
    – Development in Kiev, Ukraine
    – International Office in Tel Aviv, Taipei, Kuala Lumpur, Tokyo, Kiev
• Security Segment: Data Loss Prevention + EDRM (IRM)
• Target verticals: Financial Institutions, Government, High
  Tech, Healthcare
• Channel Partners:
  UK, Poland, Slovenia, Turkey, Italy, France, Russia, Kenya, Taiwa
  n, Philippines, Singapore, Japan, South
  Korea, Malaysia, Mexico, Romania
• Named Accounts:
    –   Apple Computer
    –   American Greetings
    –   E2V Semi Conductor
    –   Citgo Oil Company
Who we are?

“GTB has primarily focused its
efforts on developing a
product with strong detection
capabilities, and continues to
improve the overall user
experience. It has also
achieved notable client wins
in the past 12
months, thereby increasing its
overall market presence. “
--- Gartner DLP MQ 2O11
Awards
What is DLP?
                                           Who sent my data, and…
                                           to who?
                                                         HTTP(S)
   Desktops                                              FTP
   Laptops                     Data in Motion            SMTP
   Network Shares                                        IM
   (NTFS, NFS…)                                          RDP
   SharePoint                                            VNC
   Databases (via ODBC)                                  SSL
                                                         Network Printer
Where is my data?
                                   DATA                  Too many to list here



         Data at Rest                                    Data in Use

                            Cut / Copy
                            Paste                     Set access rights for
                            Print                     data usage
                            Print Screen
                            Access Files
                            Removable Media
What is DLP?
      DLP Answers 5 questions:
                            Desktops
                            Laptops
Where is my data?           Network Shares (NTFS, NFS…)
                            SharePoint
                            Databases

                            Trusted users
                            Intruders
Who is sending my data?     Spyware
                            Viruses

                            PII
                            PHI
What data is sent?          Source Code
                            Intel. Property


                            IP address
Who received my data?       Email destination
                            Geographic location

                            Cut / Copy
                            Paste
                            Print
How do I protect my data?   Print Screen
                            Access Files
                            Removable media
Why is GTB next generation DLP?


                   GTB Inspector for Network




                         GTB Central
  GTB Endpoint                                 GTB eDiscovery
                          Console
    Protector                                    to find your
                         control and
for endpoint end                               sensitive Data at
  device control         monitor all                  Rest
                          behavior


                            GTB IRM
                   Full content-aware Rights
                     Management System
Why is GTB Next Generation DLP
                                         HTTP(S)
                                         FTP
                                         SMTP
                                         IM
                       Data in Motion    Network Printer
                                         SSL
Desktops                                 RDP
Laptops                                  VNC
Network Shares                           SSH
                                         Webmail
(NTFS, NFS…)                             TCP on all ports
SharePoint                 DATA
Databases (via ODBC)

    Data at Rest                              Data in Use

                                        Cut / Copy
                                        Paste
                                        Print
                                        Print Screen
                                        Access Files
                                        Removable Media
Data Protection Architecture
How to prevent your data loss?


      Support multi-language content
                                                    MTA and Smart Host
                filtering
                                                    Integration with any
            Supports all file types
                                                       external proxy

       Scan ports 0 to 65,535on all                Enforces content-based
              TCP channels                             policies based

            Integrates with SEIM               Alerts violators, Managers


      Scalable with Load Balancing                  SSL Content Filtering

       Redacts text from emails in
                                                       Educates users
                real-time

       Seamless integration with             Quarantines email with user
       email Encryption gateways                    remediation

                                                                   Enforcement
                             Quaranti   Severity
      Log          Block
                               ne        Block
                                                       Pass          actions
How to prevent your data loss?
How to specify/fingerprint files ?




       Controls granularity of detection
                 size in bytes
Customized Policy definitions
Detailed Events Data
Management Log




        Complete Auditing
How to prevent data loss?


  USB Drives

  iPod, other mp3 players

  CD/DVD

  Firewire

  SD cards

  Floppy drives

  Bluetooth

  Wi-Fi

   Other I/O devices
How to prevent data loss?


                            Endpoint Protector access control


   Active Directory rules                 File rules            Device rules

Entire domain rules             File group rules        Bus type

Group rules                     File type rules         Device type

Computer rules                                          Device drive name

Individual user rules                                   Volume number
How to prevent data loss?


    Endpoint Protector Enforcement actions

BLOCK
LOG
SHADOW
ENCRYPT


            Endpoint Protector reporting
Built in Table reports
Built in Crystal reports
Central Console reports
How to prevent your data loss?



                    Features                                Benefits

  Agent Based solution                      Scans thousands of computers at same
                                            time with no performance degradation

  High performance                          Network friendly
  Protects all file formats (binary/text)   Secures all content including Source
                                            Code, Audio, Video and text files
  Protects database records & fields        Ensures regulatory compliance
  Virtually zero false positive rate        Highest precision
  Insures absence of violations             No false negatives
  Automatic or manual discovery             Non-stop data protection
  Customized data type definition           Discovers data unique to your business
  Unattended operation                      Maintenance free
How to prevent your data loss?]




                      Various Users         Different Rights
                                                View            Edit          Print     Cpy/Paste       Time Limit         Location


                              USER 1                                                                                        Office
                              USER 2                                                                    1-5 Jan

Usage Rights Matrix           USER 3

                              USER 4                                                                                        Office
                                                                                           Representative form of Usage Rights Matrix

     Examples of protected files


                                                                                                                    … & other
                                                                                                                    combinations


               View only           View & Edit only
                                                      Seclore Policy Server (PS) only
                                                               View & Distribute          View & Print only
How to prevent data loss?




Unified policies for Networ, eDiscovery Endpoint and IRM
GTB Enterprise DLP Suite Solution Matrix
                                                                           GTB         GTB        GTB Rights     GTB      GTB DLP
Feature
                                                                        Inspector   eDiscovery   Management    Endpoint    Suite

Real-time network traffic inspection                                       ●                                                ●
Sensitive data-at-rest discovery                                                        ●            ●                      ●
Removable devices inspection                                                                         ●            ●         ●
Blocking leakage of the sensitive data                                     ●                         ●            ●         ●
Pattern-based inspection                                                   ●            ●            ●            ●         ●

Structured data inspection (Recursive Transitional Gaps ™ Technology)      ●            ●            ●            ●         ●

Unstructured data inspection (Recursive Transitional Gaps™
                                                                           ●            ●            ●            ●         ●
Technology)
SSL/TLS Inspection                                                         ●                                                ●
Email notification and alerting                                            ●            ●                         ●         ●
Active Directory integration                                               ●            ●                         ●         ●
Security data encryption                                                   ●            ●                         ●         ●
Information usage policies support                                                      ●            ●                      ●
Audit of the usage of the information                                                   ●            ●                      ●
Email Encryption                                                           ●1                                               ●
Data classification                                                                     ●            ●                      ●

Antiphishing, Antivirus, spam and malware detection                        ●                                                ●

Web Filtering                                                              ●                                                ●
Easy deployment and maintenace                                             ●            ●                         ●         ●
Centralized reporting (GTB Central Console)                                ●            ●                         ●         ●
The competition?
Others?
Feature / Functionality                                        GTB                                  Websense
Channel coverage -       ability to BLOCK
HTTP Server                                                      √                                        No
HTTP/HTTPS                                                       √                                        √
HTTP Tunnel                                                      √                                        No
FTP                                                              √                                        No
FTP Server                                                       √                                        No
IM                                                               √                                        No
P2P                                                              √                                        No
SMTP Mail                                                        √                                        √
SSL                                                              √                                        No
Unknown Protocols                                                √                                        No
Webmail                                                          √                                        √
SSH                                                              √                                        No
Telenet                                                          √                                        No
SFTP, SSMTP                                                      √                                        No
POP3                                                             √                                        No
Printing                                                         √                                        √
Fingeprinting                                                    √                                        √
Central Policy Console                                           √                                        √
                                            Voltage, Zix, Sophos, Secureworks, Secure
Email Encryption support                    Computing, PostX, Tumbleweed, Symantec, Front Voltage
                                            bridge, Exchange, Positini,Perimeter
Smart Host                                                      √                        unknown
SEIM integration                                                √                                          √
Workflow                                                        √                                          √
ICAP support                                                    √                                          √
                                            TMG, Blue Coat, Ironport, Squid,Webroot,
Proxy support                                                                            TMG, Blue Coat, Squid
                                            Mcafee, others
Endpoint protection                                             √                                          √
eDiscovery                                                      √                                          √
When will you start?




High accuracy of detection and a full range of defense capabilities

              Flexible data manipulation detection

The largest set of protocol support and file format independence

  High efficiency and without interrupting the network status

                 Encryption is no longer an issue

      Comprehensive policy framework for data protection
We are ready when you are!
Live Product Demo
Gtb Product Technical Present

Weitere ähnliche Inhalte

Was ist angesagt?

Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
Risk Crew
 
Doing Less More Often: An Approach to Digital Strategy for Cultural Heritage ...
Doing Less More Often: An Approach to Digital Strategy for Cultural Heritage ...Doing Less More Often: An Approach to Digital Strategy for Cultural Heritage ...
Doing Less More Often: An Approach to Digital Strategy for Cultural Heritage ...
Trevor Owens
 
NCompass Live: Digital Preservation, Part 2: Storage and Protection
NCompass Live: Digital Preservation, Part 2: Storage and ProtectionNCompass Live: Digital Preservation, Part 2: Storage and Protection
NCompass Live: Digital Preservation, Part 2: Storage and Protection
Nebraska Library Commission
 
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review   Can Your Dlp Provider Protect You From The CloudGtb Technology Review   Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
gtbsalesindia
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
jmical
 
ReSoft Buyers Guide
ReSoft Buyers GuideReSoft Buyers Guide
ReSoft Buyers Guide
ReSoft International LLC
 

Was ist angesagt? (19)

Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
 
ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708
 
The Open Splice.Org Community
The Open Splice.Org CommunityThe Open Splice.Org Community
The Open Splice.Org Community
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to Fit
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
Introduction to Data
Introduction to DataIntroduction to Data
Introduction to Data
 
Doing Less More Often: An Approach to Digital Strategy for Cultural Heritage ...
Doing Less More Often: An Approach to Digital Strategy for Cultural Heritage ...Doing Less More Often: An Approach to Digital Strategy for Cultural Heritage ...
Doing Less More Often: An Approach to Digital Strategy for Cultural Heritage ...
 
NCompass Live: Digital Preservation, Part 2: Storage and Protection
NCompass Live: Digital Preservation, Part 2: Storage and ProtectionNCompass Live: Digital Preservation, Part 2: Storage and Protection
NCompass Live: Digital Preservation, Part 2: Storage and Protection
 
CSC1100 - Chapter08 - Database Management
CSC1100 - Chapter08 - Database ManagementCSC1100 - Chapter08 - Database Management
CSC1100 - Chapter08 - Database Management
 
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
Comment détecter des virus inconnus en utilisant des « honey pots » et d’autr...
 
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review   Can Your Dlp Provider Protect You From The CloudGtb Technology Review   Can Your Dlp Provider Protect You From The Cloud
Gtb Technology Review Can Your Dlp Provider Protect You From The Cloud
 
Intranets and Extranets
Intranets and Extranets Intranets and Extranets
Intranets and Extranets
 
Starting the Small Case: Technical Considerations
Starting the Small Case: Technical ConsiderationsStarting the Small Case: Technical Considerations
Starting the Small Case: Technical Considerations
 
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGYCYBER INTELLIGENCE & RESPONSE TECHNOLOGY
CYBER INTELLIGENCE & RESPONSE TECHNOLOGY
 
ReSoft Buyers Guide
ReSoft Buyers GuideReSoft Buyers Guide
ReSoft Buyers Guide
 
Virtual Data Room Brochure
Virtual Data Room BrochureVirtual Data Room Brochure
Virtual Data Room Brochure
 

Ähnlich wie Gtb Product Technical Present

Gtb Dlp Suite Presentation
Gtb Dlp Suite PresentationGtb Dlp Suite Presentation
Gtb Dlp Suite Presentation
gtbsalesindia
 
Gtb Dlp & Irm Solution Product And Deployment Overview
Gtb Dlp & Irm Solution   Product And Deployment OverviewGtb Dlp & Irm Solution   Product And Deployment Overview
Gtb Dlp & Irm Solution Product And Deployment Overview
gtbsalesindia
 
GTB DLP Suite Presentation
GTB DLP Suite PresentationGTB DLP Suite Presentation
GTB DLP Suite Presentation
gtbsalesindia
 
How a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of VisibilityHow a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of Visibility
eladgotfrid
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
alex hincapie
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal Stern
OpenStorageSummit
 

Ähnlich wie Gtb Product Technical Present (20)

GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
 
Gtb Dlp Suite Presentation
Gtb Dlp Suite PresentationGtb Dlp Suite Presentation
Gtb Dlp Suite Presentation
 
Gtb Dlp & Irm Solution Product And Deployment Overview
Gtb Dlp & Irm Solution   Product And Deployment OverviewGtb Dlp & Irm Solution   Product And Deployment Overview
Gtb Dlp & Irm Solution Product And Deployment Overview
 
Vormetric - Gherkin Event
Vormetric - Gherkin EventVormetric - Gherkin Event
Vormetric - Gherkin Event
 
Introduction
IntroductionIntroduction
Introduction
 
Solving the Really Big Tech Problems with IoT
 Solving the Really Big Tech Problems with IoT Solving the Really Big Tech Problems with IoT
Solving the Really Big Tech Problems with IoT
 
GTB DLP Suite Presentation
GTB DLP Suite PresentationGTB DLP Suite Presentation
GTB DLP Suite Presentation
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Utilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentUtilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligent
 
Dham bangalore q407
Dham bangalore q407Dham bangalore q407
Dham bangalore q407
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Insights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionInsights Into Modern Day Threat Protection
Insights Into Modern Day Threat Protection
 
How a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of VisibilityHow a Cloud Computing Provider Reached the Holy Grail of Visibility
How a Cloud Computing Provider Reached the Holy Grail of Visibility
 
Hadoop's Opportunity to Power Next-Generation Architectures
Hadoop's Opportunity to Power Next-Generation ArchitecturesHadoop's Opportunity to Power Next-Generation Architectures
Hadoop's Opportunity to Power Next-Generation Architectures
 
Introducing Splunk – The Big Data Engine
Introducing Splunk – The Big Data EngineIntroducing Splunk – The Big Data Engine
Introducing Splunk – The Big Data Engine
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLogin
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal Stern
 
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementSecuring Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
 
Cloud desktop for byod
Cloud desktop for byodCloud desktop for byod
Cloud desktop for byod
 

Gtb Product Technical Present

  • 1. GTB DLP Suit Content-aware Security Suite True DLP for Data Protection Daniel Jay May 2012
  • 2. AGENDA • Who we are? • What is DLP? • Why say we are next generation? • Enterprise configuration? • How to prevent your data loss?
  • 3. Who we are? • Founded: 2005 • Ownership: Private and self funded • Headquarter: Newport Beach, CA – Development in Kiev, Ukraine – International Office in Tel Aviv, Taipei, Kuala Lumpur, Tokyo, Kiev • Security Segment: Data Loss Prevention + EDRM (IRM) • Target verticals: Financial Institutions, Government, High Tech, Healthcare • Channel Partners: UK, Poland, Slovenia, Turkey, Italy, France, Russia, Kenya, Taiwa n, Philippines, Singapore, Japan, South Korea, Malaysia, Mexico, Romania • Named Accounts: – Apple Computer – American Greetings – E2V Semi Conductor – Citgo Oil Company
  • 4. Who we are? “GTB has primarily focused its efforts on developing a product with strong detection capabilities, and continues to improve the overall user experience. It has also achieved notable client wins in the past 12 months, thereby increasing its overall market presence. “ --- Gartner DLP MQ 2O11
  • 6. What is DLP? Who sent my data, and… to who? HTTP(S) Desktops FTP Laptops Data in Motion SMTP Network Shares IM (NTFS, NFS…) RDP SharePoint VNC Databases (via ODBC) SSL Network Printer Where is my data? DATA Too many to list here Data at Rest Data in Use Cut / Copy Paste Set access rights for Print data usage Print Screen Access Files Removable Media
  • 7. What is DLP? DLP Answers 5 questions: Desktops Laptops Where is my data? Network Shares (NTFS, NFS…) SharePoint Databases Trusted users Intruders Who is sending my data? Spyware Viruses PII PHI What data is sent? Source Code Intel. Property IP address Who received my data? Email destination Geographic location Cut / Copy Paste Print How do I protect my data? Print Screen Access Files Removable media
  • 8. Why is GTB next generation DLP? GTB Inspector for Network GTB Central GTB Endpoint GTB eDiscovery Console Protector to find your control and for endpoint end sensitive Data at device control monitor all Rest behavior GTB IRM Full content-aware Rights Management System
  • 9. Why is GTB Next Generation DLP HTTP(S) FTP SMTP IM Data in Motion Network Printer SSL Desktops RDP Laptops VNC Network Shares SSH Webmail (NTFS, NFS…) TCP on all ports SharePoint DATA Databases (via ODBC) Data at Rest Data in Use Cut / Copy Paste Print Print Screen Access Files Removable Media
  • 11. How to prevent your data loss? Support multi-language content MTA and Smart Host filtering Integration with any Supports all file types external proxy Scan ports 0 to 65,535on all Enforces content-based TCP channels policies based Integrates with SEIM Alerts violators, Managers Scalable with Load Balancing SSL Content Filtering Redacts text from emails in Educates users real-time Seamless integration with Quarantines email with user email Encryption gateways remediation Enforcement Quaranti Severity Log Block ne Block Pass actions
  • 12. How to prevent your data loss?
  • 13. How to specify/fingerprint files ? Controls granularity of detection size in bytes
  • 16. Management Log Complete Auditing
  • 17. How to prevent data loss? USB Drives iPod, other mp3 players CD/DVD Firewire SD cards Floppy drives Bluetooth Wi-Fi Other I/O devices
  • 18. How to prevent data loss? Endpoint Protector access control Active Directory rules File rules Device rules Entire domain rules File group rules Bus type Group rules File type rules Device type Computer rules Device drive name Individual user rules Volume number
  • 19. How to prevent data loss? Endpoint Protector Enforcement actions BLOCK LOG SHADOW ENCRYPT Endpoint Protector reporting Built in Table reports Built in Crystal reports Central Console reports
  • 20. How to prevent your data loss? Features Benefits Agent Based solution Scans thousands of computers at same time with no performance degradation High performance Network friendly Protects all file formats (binary/text) Secures all content including Source Code, Audio, Video and text files Protects database records & fields Ensures regulatory compliance Virtually zero false positive rate Highest precision Insures absence of violations No false negatives Automatic or manual discovery Non-stop data protection Customized data type definition Discovers data unique to your business Unattended operation Maintenance free
  • 21. How to prevent your data loss?] Various Users Different Rights View Edit Print Cpy/Paste Time Limit Location USER 1 Office USER 2 1-5 Jan Usage Rights Matrix USER 3 USER 4 Office Representative form of Usage Rights Matrix Examples of protected files … & other combinations View only View & Edit only Seclore Policy Server (PS) only View & Distribute View & Print only
  • 22. How to prevent data loss? Unified policies for Networ, eDiscovery Endpoint and IRM
  • 23. GTB Enterprise DLP Suite Solution Matrix GTB GTB GTB Rights GTB GTB DLP Feature Inspector eDiscovery Management Endpoint Suite Real-time network traffic inspection ● ● Sensitive data-at-rest discovery ● ● ● Removable devices inspection ● ● ● Blocking leakage of the sensitive data ● ● ● ● Pattern-based inspection ● ● ● ● ● Structured data inspection (Recursive Transitional Gaps ™ Technology) ● ● ● ● ● Unstructured data inspection (Recursive Transitional Gaps™ ● ● ● ● ● Technology) SSL/TLS Inspection ● ● Email notification and alerting ● ● ● ● Active Directory integration ● ● ● ● Security data encryption ● ● ● ● Information usage policies support ● ● ● Audit of the usage of the information ● ● ● Email Encryption ●1 ● Data classification ● ● ● Antiphishing, Antivirus, spam and malware detection ● ● Web Filtering ● ● Easy deployment and maintenace ● ● ● ● Centralized reporting (GTB Central Console) ● ● ● ●
  • 25. Others? Feature / Functionality GTB Websense Channel coverage - ability to BLOCK HTTP Server √ No HTTP/HTTPS √ √ HTTP Tunnel √ No FTP √ No FTP Server √ No IM √ No P2P √ No SMTP Mail √ √ SSL √ No Unknown Protocols √ No Webmail √ √ SSH √ No Telenet √ No SFTP, SSMTP √ No POP3 √ No Printing √ √ Fingeprinting √ √ Central Policy Console √ √ Voltage, Zix, Sophos, Secureworks, Secure Email Encryption support Computing, PostX, Tumbleweed, Symantec, Front Voltage bridge, Exchange, Positini,Perimeter Smart Host √ unknown SEIM integration √ √ Workflow √ √ ICAP support √ √ TMG, Blue Coat, Ironport, Squid,Webroot, Proxy support TMG, Blue Coat, Squid Mcafee, others Endpoint protection √ √ eDiscovery √ √
  • 26. When will you start? High accuracy of detection and a full range of defense capabilities Flexible data manipulation detection The largest set of protocol support and file format independence High efficiency and without interrupting the network status Encryption is no longer an issue Comprehensive policy framework for data protection
  • 27. We are ready when you are!