Precise Control, Easy Management, and Cost-Effective Measures to Prevent Data Leaks
GTB Technologies provides true data protection with the ability to create, manage & enforce DLP security policies based on content &/ context for when, where, how, and by whom data can or can't be moved to or from the network &/ devices. Based on patented, and patent-pending, proprietary technology; GTB's Inspector, a “Content-Aware Reverse Firewall” inspects, classifies, and analyzes ALL outbound &/ inbound data transmissions from your network in real-time. We're talking about ALL Channels and ALL types of data, structured and /or unstructured. Once a unique threshold of protected data is detected, the GTB Inspector enforces the appropriate action
GTB Technologies provides true data protection with the ability to create, manage & enforce DLP security policies based on content &/ context for when, where, how, and by whom data can or can't be moved to or from the network &/ devices. Based on patented, and patent-pending, proprietary technology; GTB's Inspector, a “Content-Aware Reverse Firewall” inspects, classifies, and analyzes ALL outbound &/ inbound data transmissions from your network in real-time. We're talking about ALL Channels and ALL types of data, structured and /or unstructured. Once a unique threshold of protected data is detected, the GTB Inspector enforces the appropriate action
GTB DLP solution is different from other competitors in the market. Its unique function is to cover the threats from the "trusted" or "untrusted" within the enterprise.
The patented Data AccuMatch™ technology owned by GTB is the most accurate and fast detection algorithm on the market. GTB content-aware reverse firewall "Content-aware Reverse Firewall™", combined with its excellent fingerprint engine (finger-printing), can detect all communication protocols (including unknown protocols) and prevent leakage, not just event notifications.
MTA and Proxy Server,provide more big and flexible server and help reduce expenses Provide fingerprint file inspection, database fingerprint inspection, Regular Expression, keyword inspection Flexible set up:Inline, Mirror, Transparent Mode Support 0-65535 TCP Port inspection Support HTTP/S, FTP, SMTP, POP3, IMAP, IM.etc. communications protocol inspection Pmode support:Log、block、 Hierarchy block、record、 Active Directory 、 Novell eDirectory Syslog、SNMP support,and intergrate with Syslog Server EMAIL encrypt ,intergrate with SPAM system decompressed file inspection and protect function File encryption or communicative encryption audition and block
GTB eDiscovery can scan every location on the network, including file servers, desktops and laptops. Confidential data is discovered with the same precision and real-time performance of the GTB Inspector.
The GTB Endpoint Protector Agent may work in one of two possible modes: online and offline. The GTB Endpoint Protector Agent is in online mode when it has access to the Fingerprints Storage database and the reporting database. This mode of Agent‘s operation is typically set when the computer is situated inside the corporate network perimeter.
GTB DLP master control board provides an unite management gate, end-to-end inform, and separate the sensitive information effectivily. Centralizing policy information set-up. Manage all GTB DLP model simply and efficiency.
GTB has primarily focused its efforts on developing a product with strong detection capabilities, and continues to improve the overall user experience. It has also achieved notable client wins in the past 12 months, thereby increasing its overall market presence.
6F., No. 578, Ruiguang Rd., Neihu Dist., Taipei City 114 , Taiwan (R.O.C.)
Copyright © 2024 Ruiting. All Rights Reserved
叡廷股份有限公司版權所有 | Privacy Statement
This website uses cookies to provide you with better service. By continuing to browse this site you are agreeing to our use of cookies. For more information, please refer to the Privacy Statement.