What is GTB Technologies' DLP?
GTB Technologies DLP Suite is a platform known for its exceptional effectiveness and reliability in protecting confidential data, offering comprehensive tools for securing information across industries.
With advanced detection, classification and real-time data loss protection capabilities, the system uses intelligent algorithms and machine learning to accurately identify and protect sensitive data in on-premises, network and cloud environments.
The platform's intuitive and flexible interface enables companies to fine-tune their security policies to meet individual needs and regulatory requirements, while providing ongoing insight into threats and protection against cyber attacks
With advanced detection, classification and real-time data loss protection capabilities, the system uses intelligent algorithms and machine learning to accurately identify and protect sensitive data in on-premises, network and cloud environments.
The platform's intuitive and flexible interface enables companies to fine-tune their security policies to meet individual needs and regulatory requirements, while providing ongoing insight into threats and protection against cyber attacks

Solution
Solution module consists of several elements:
01
GTB Inspector
designed to capture and review data sent to the Internet via various protocols (HTTP, HTTPS, SMTP, FTP, etc.). GTB Inspector also includes:
GTB SSL Proxy a proxy server that provides data transfer and message interception over encrypted protocols;
GTB Mail Transfer Agent - a mail server that enables the interception and forwarding of emails, as well as the addition of information to MIME headers.
02
GTB Central Console
management console for GTB Inspector, GTB Discovery and GTB Endpoint Protector for policy configuration, analysis of recorded events and reporting.
03
GTB Endpoint Protector
operates within Active Directory and allows control of information transferred via removable media. It supports multiple device types.
04
GTB Discovery
is an agent-based system designed to monitor information stored on the hard drives of various devices anywhere on the infrastructure. It supports files of any format, including binary files.
05
GTB Security Manager
is a programme that creates digital fingerprints of protected information and sends them to the GTB Inspector database.
GTB Technologies features
Key features and functions of GTB Technologies' DLP
GTB Enterprise DLP Suite allows you to capture and analyse different types of network traffic, control access to data on different network devices. It also controls access to information in network file stores and on removable devices.
The following methods can be used to determine which data can be considered confidential:
- creating digital fingerprints of the data to be protected;
- creation of dictionaries and templates containing samples of data considered confidential;
- creating samples from databases and tables using the Microsoft ODBC module.
All the above data is entered into a single database stored in the GTB Inspector system.
The following methods can be used to determine which data can be considered confidential:
- creating digital fingerprints of the data to be protected;
- creation of dictionaries and templates containing samples of data considered confidential;
- creating samples from databases and tables using the Microsoft ODBC module.
All the above data is entered into a single database stored in the GTB Inspector system.
The GTB Inspector system functions enable:
preventing the leakage of confidential information
blocking visits to unwanted resources
blocking instant messaging
e-mail control, sending of false e-mails
collecting an incident archive for retrospective analysis
collection of statistical data
generation of incident reports
notification of events
GTB Inspector also enables the identification and tracking of protected content, including within files:
MS Office (also for password-protected Word, Excel and PowerPoint files)
ZIP
PDF
PGP
S/MIME
RAR
The depth of the nested archives can be up to 40
The following actions are possible in the event of a suspected or attempted data leak:
The following actions are possible in the event of a suspected or attempted data leak:
security breach registration with delivery blocking or delivery authorisation
notification of the security officer
quarantine of e-mails until a decision is taken
redirection of e-mails to the encryption node
transmission of content without inspection
GTB Inspector enables network traffic to be captured and analysed using the following protocols:
HTTP/ HTTPS
FTP
MTP+ESMTP
IMAP
POP3 (as well as protocols using encryption: POP3S, HTTPS/SMTPS)
SSH
Network printing protocols (LPD, IPP)
SSL
RDP
VNC
NNTP
Internet mail handling
messaging systems
other protocols are analysed under TCP

GTB Discovery functions
GTB Discovery functions
Workstation and network information is controlled by GTB Discovery
This allows full control over access to important information by applying information access distribution rules based on configured policies.
This allows full control over access to important information by applying information access distribution rules based on configured policies.
Supports all file formats (text and binary)
A distinctive feature of the system is the ability to scan temporary files for protected information. The GTB Discovery agent can operate in both automatic and manual modes. If illegal user activities are detected, the agent sends a message to the security officer.
A distinctive feature of the system is the ability to scan temporary files for protected information. The GTB Discovery agent can operate in both automatic and manual modes. If illegal user activities are detected, the agent sends a message to the security officer.
Full integration with Active Directory (or other LDAP user database)
Provides the ability to control and differentiate access to data at user and domain level. The ability to create multi-level policies is supported.
Provides the ability to control and differentiate access to data at user and domain level. The ability to create multi-level policies is supported.
Data access control through hardware identification of the device
E.g. via MAC address, network, IP address or IP address range. This allows the GTB DLP Suite to control access to data stored in cloud environments. For example, you can deny access to corporate email if the device is disconnected from the domain or is on a different network/subnet.
E.g. via MAC address, network, IP address or IP address range. This allows the GTB DLP Suite to control access to data stored in cloud environments. For example, you can deny access to corporate email if the device is disconnected from the domain or is on a different network/subnet.
GTB Discovery features
Other system functions and capabilities
Data analysis
All data received is carefully analysed before decisions are made, taking into account established principles. The information is analysed in terms of various attributes, using content analysis and linguistic analysis technologies, comparison with reference samples, etc. with reference samples, etc.
Integration with third-party solutions
Integration with the following systems is supported:
LDAP;
Microsoft Active Directory;
proxy servers using the ICAP protocol;
SIEM;
Support for email encryption gateways Voltage, Zix, Secureworks, Secure Computing, PostX, Tumbleweed,
Symantec, Frontbridge, Exchange, Postini Perimeter
DropBox, Evernote, Salesforce, Skydrive, Google Drive cloud storage systems
Creation of digital fingerprints, templates and dictionaries of protected information
GTB Security Manager is used to define criteria for confidential information and upload it to the common GTB Inspector database. It allows the creation of digital fingerprints from anywhere on the network (folders, network folders, individual files).
Reporting system
For the convenience, visibility and comfort of security staff, the GTB DLP Suite includes a powerful and convenient reporting system to always display a clear picture of staff activities when working with data. Incidents are collected and archived to enable retrospective analysis of statistical data and incidents.

Why GTB Technologies
Why use GTB Technologies' DLP?
full visibility - data protection: in use
- by user authentication; at rest, in any location, including the cloud
- through access restrictions; on the move, during transmission
- through encryption.
- by user authentication; at rest, in any location, including the cloud
- through access restrictions; on the move, during transmission
- through encryption.
high precision, low percentage of false positives;
reliable intellectual property protection capabilities - using fingerprint technology, OCR and native SSL decryption;
intuitive and user-friendly interface;
Big data analysis and rapid classification;
Support for all protocols, including SMTP, HTTP, HTTPS, WebMail, ActiveSync (WBMXL);
More extensive coverage of cloud environments with support for Box, Dropbox, Google Drive and Microsoft OneDrive for businesses through integrations based on a proprietary API;
built-in data classification - for both files and Outlook - the system can classify data based on the DLP content in the file, comparing classification levels with DLP classifiers;
a complete DRM (Digital Rights Management) / IRM (Information Rights Management) system available as part of the solution.