go top

GTB DLP Data Loss Prevention

When enterprises send text files, spreadsheets, presentations, and database files, they sometimes contain "sensitive" or "proprietary" information (such as personal data, patents, etc.) that needs protection to prevent unauthorized transmission or leakage. Although most enterprises implement effective "outside-in" protection measures and management mechanisms, they often neglect "inside-out" data leakage, exposing the company to huge risks such as reputational damage, regulatory violations, loss of competitive advantage, early exposure of financial conditions, loss of customer trust, and damaged business partner relationships.

add Catalog Download

Product Features

  • icon
    Effortlessly Ensure Information Security
  • icon
    Prevent Violations to Stop Malicious Data Theft
  • icon
    Complete Data Security Whether in the Cloud, On-Premises, or External

Product Advantages

  • 01
    Protect Intellectual Property / Valuable Multimedia Content (trailers, movies, music files, photos, source code) in Any Data Format
  • 02
    Covers All Network Ports, All TCP Channels (Including SSL)
  • 03
    100% Detection Rate, No False Negatives
  • 04
    Block Based on Severity Without the Need for a Proxy Server
  • 05
    Uses Multi-Field Policies to Protect Structured Data

Why Choose GTB

The GTB DLP solution differs from other major competitors in the market. Its unique features cover internal threats from both "trusted" and "untrusted" sources. GTB’s patented Data AccuMatch™ technology is the most precise and fast detection algorithm available. GTB’s Content-aware Reverse Firewall™ combines its advanced fingerprinting engine to detect all protocols (including unknown protocols) and prevent leakage, not just event reporting.

Protect Sensitive Company Data, GTB Provides the Solution

  • GTB Inspector

    Content-aware Reverse Firewall™, combined with its advanced fingerprinting engine, can accurately and quickly detect all communication protocols and immediately block data leakage. It covers all network ports and all TCP channels (including SSL) and all communication protocols, regardless of data format. GTB DLP protects confidential data and intellectual property/valuable multimedia content, such as trailers, movies, music files, photos, and source code, with 100% detection accuracy.

  • eDiscovery GTB

    eDiscovery allows the discovery of confidential data on any user’s computer within the corporate network and performs data classification. It accurately monitors and reports violations of any document retention rules, saving system administrators time searching for and classifying confidential data.

  • Endpoint Protector

    GTB’s endpoint protection prevents the output of protected confidential content to removable media devices in a content-aware manner. It can automatically encrypt and side-record the output of related confidential data. Supports both online and offline enterprise operation policies.

  • Users can encrypt and authorize important files themselves, or automatically encrypt and manage permissions for sensitive data identified by eDiscovery on computers, allowing users to only read or edit, restricting printing or screen capture, etc.

Management Platform Provided by GTB

The GTB DLP console provides unified management of gateway and endpoint information, effectively classifying sensitive information, and centralizing policy settings for easy and effective management of all GTB DLP modules.

figure

GTB Offers You the Best Service

GTB brings the latest generation of technology to prevent the loss of confidential and personal data and introduces groundbreaking innovation to the information security market. The product provides unprecedented real-time visibility and precise control, suitable for organizations of all sizes, with easy management and reasonable cost to effectively prevent data leakage, enforce corporate information security policies, and protect the company’s brand and reputation.

DataSunrise Database Security

DataSunrise Database Security Solution is a high-performance, real-time software that spans multiple platforms, designed to protect databases and their stored content in heterogeneous environments. Whether hosted in the cloud or on-premises, it safeguards the enterprise’s databases from external and internal threats, including SQL injection attacks and unauthorized access. The built-in DataSunrise Database Compliance Automation Engine and reporting features provide a comprehensive audit, protection, search, and high-performance data masking solution.

add Catalog Download

Product Features

  • icon
    Database Activity Monitoring and Auditing
  • icon
    Database Firewall
  • icon
    Data Masking
  • icon
    Data Inventory

Product Advantages

  • 01
    Regulatory Compliance

    Role-based database security management policies. Automates compliance actions for regulations such as GDPR, HIPAA, SOX, PCI (or custom regulations).

  • 02
    Traffic Analysis

    DataSunrise intercepts database traffic and performs intelligent analysis. It automates the process.

  • 03
    Intelligent Learning Engine

    Role-based database security management policies. Automates compliance actions for regulations such as GDPR, HIPAA, SOX, PCI (or custom regulations).

Why Choose DataSunrise

  • icon
    Provides database auditing, database firewall, data masking, and data inventory features
  • icon
    Continuous monitoring of cloud database services or on-premises database service traffic
  • icon
    Supports popular SQL and NoSQL database systems across multiple platforms
  • icon
    Prevents SQL injection attacks in real-time (Database Compliance Automation Engine)
  • icon
    Centralized management of security policies and compliance controls
  • icon
    Comprehensive web and CLI management interfaces
  • icon
    Easy installation and fast deployment with support for AD (Active Directory) and HA architecture
  • icon
    Integrates with SIEM systems

Applicable to Various Types of Databases

figure

RANDTRONICS Protect Sensitive Data

RANDTRONICS is the perfect solution to prevent potential internal data leakage. Only by encrypting sensitive data can regulatory compliance be ensured. The company’s data will be fully protected, eliminating concerns about the leakage of sensitive information.

add Catalog Download

Product Features

  • icon
    Prevent Data Leakage
  • icon
    Prevent Hacker Data Theft
  • icon
    Avoid Penalties from Regulatory Violations

DPM (Data Privacy Manager)

DPM is a software solution developed by Randtronics that provides protection for files, applications, and databases without requiring any changes to the applications.
DPM is a data protection software solution that supports Windows & Linux (including virtual machine environments) and can protect both structured and unstructured data simultaneously. It provides encryption, tokenization, masking, and anonymization capabilities, allowing users to choose encryption keys and integrate with HSM.

figure
  • 01
    easyCipher

    Provides encryption and access control for files, directories, applications, and databases on laptops, desktops, and servers.

  • 02
    DPM easyData

    Offers tokenization, encryption, and anonymization via a network service interface while creating masking policies for unauthorized access.

  • 03
    DPM easyKey

    An independent key management module that can generate keys internally or through HSM.

  • 04
    DPM Database Manager

    Provides column-level encryption for databases. Can be integrated with DPM easyData for tokenization, encryption, and anonymization.

DPM Server System Architecture

figure figure

DPM modules can perform encryption at the application, database, and file system levels.

figure

Encryption can be applied from the entire database down to the column level, and up to application encryption.

HSM Utimaco Hardware Encryption/Decryption Module

CryptoServer Se Series Gen2

Next-generation hardware encryption modules industry standard. Utimaco’s next-generation CryptoServer protects critical keys for various servers and application systems. It comes with integrated software support for industry standards (e.g., PKCS#11, Microsoft CSP/CNG, JCE, ...) suitable for most application scenarios such as financial transaction security, enterprise PKI integration, database encryption, etc. The next-generation CryptoServer Se-Series Gen2 offers two operational modes: PCIe interface card and network device. The computational speed can reach up to 10,000 RSA signatures per second or 6,000 ECDSA signatures per second (in bulk processing mode), with both PCIe cards and LAN Box versions available, suitable for common PC and server architectures, ideal for server centers.

add Catalog Download

u.trust Anchor Se15k/Se40k

Utimaco’s highest-performance key protection encryption module pushes the encryption process to another level. Up to 40,000 signatures per second, RSA 2048 bits can reach up to 35,000 signatures per second. It also provides unlimited key storage space, offering excellent cost-performance to challenge industry leaders. The optimal choice for large data storage and encryption.

  • icon
    Database Security
  • icon
    Digital Signatures
  • icon
    Web Applications
  • icon
    Integrity and Digital Signatures
  • icon
    Cloud
  • icon
    Big Data and IoT
  • icon
    Privileged Access
  • icon
    POS Terminal Management
  • icon
    Transaction Delivery and Authorization
  • icon
    Distributed Ledger Technology
  • icon
    Payment Card Personalization
  • icon
    Key Management

Low Operating Costs

  • Provides high-performance at an attractive price
  • Entry-level models available for low-performance applications
  • Complete and detailed remote management functions, accessible via PinPad or Smartcards login
  • Efficient key management and remote firmware updates
  • Automated remote monitoring and diagnostics, supports SNMP protocol
  • Software simulator provided for evaluation or integration testing

Features

  • Key authorization API and tools (according to EN 419 221-5 protection principles)
  • Tamper-resistant security
  • Secure key storage and computation within the HSM’s secure boundary
  • Secure key storage and computation
  • Comprehensive key management functions
  • Keys can be stored in the HSM or in encrypted files
  • Smartcards can be used for high-strength identity authentication
  • Supports "n out of m" identity authentication mechanism to encrypt and protect backup data (objects, keys, configuration files) with up to 16 people holding the MBK keys
  • Role-based access control can be set for duty separation
  • Remote management
  • Supports OS: Windows 2016, Solaris 9, 10 (32/64-bit), Red Hat Enterprise Linux 8, SUSE Linux Enterprise Server 11, Debian 9 "Stretch"

Specifications

  • 01
    Supported Algorithms
    • RSA, ECDSA with NIST and Brainpool curves
    • ECDH with NIST and Brainpool curves
    • AES
    • CMAC, HMAC
    • SHA-2 family, SHA-3
    • Hash-based Deterministic Random Number Generator (DRG.4 acc. AIS 31)
    • True random number generator (PTG.2 acc. AIS 31)
    • Up to 3,000 RSA signature operations per second or 2,500 ECDSA signature operations per second (in bulk processing mode)
  • 02
    Application Programming Interfaces (API)
    • PKCS#11
    • ECDH with NIST and Brainpool curves
    • Microsoft Cryptography Next Generation (CNG)
    • Utimaco High-Performance Cryptographic Extended services Interface (CXI)
  • 03
    Network Device Hardware Specifications
    • 1U height, 19” rack specification
    • Built-in dual power supply redundancy, 100~240 V, 50~60 Hz AC 2 x 300 W
    • Power consumption: average 45 W / 66 VA, max. 50 W / 70 VA
    • Heat dissipation: max. 171 BTU/h
    • 2 RJ45 1 Gb/s network interfaces
    • Operating temperature: +10°C to +50°C (+50°F to +122°F)
    • Storage temperature: -10°C to +55°C (+14°F to +131°F)
    • Mean time between failures (MTBF): 100,000 hours at 25°C / 77°F, environment GB, GC - Ground Benign, Controlled
figure

International Certifications and Environmental Certifications

  • FIPS 140-2 Level 3*
  • CE, FCC Class B
  • UL, IEC/EN 60950-1
  • CB certificate
  • RoHS II, WEEE

Our Partners

figure