Espanhol Português Inglês

GTB Inspector

 

Monitors, blocks and logs outbound transmissions of secure content

The GTB Inspector scans and analyzes ALL outbound data transmissions from your network in real time. Once a threshold amount of protected data is detected, it stops the violating transmission and/or alerts the designated security officer or administrator.

 

Protected data may include bank accounts, credit card numbers, and passwords. The Data Loss Prevention (DLP) device is completely opposite to the secure location. It is installed on the network edge and more than one device can be installed if necessary. The Inspector offers mass communication features and is compatible with multiple devices and multiple protocols.

 

• Protects text and binary data, structured or unstructured in all file formats in all protocols including SSL through Blue Coat or Microsoft ISA

• Near 100% detection ratio with negligible amount of false positives

• Designed for unattended, maintenance free operation

 

Result. Malicious or unintentional transmissions of confidential data over the network are identified and blocked. Organizations are fully secured and compliant with government data security regulations as it relates to Sarbanes Oxley, GLBA, HIPAA, PII, CA SB1386, CA AB1950, Payment Card Industry (PCI) Data Security Standard, The Patriot Act,  FISMA, FERC/NERC, and others.

 

Data-in-Motion

 

is all traffic on the network. GTB's Inspector analyzes this traffic for pieces of source code; all communication channels are scanned, such as: e-mails, instant messages, web logs, etc. If a violation is attempted, the transmission is blocked and then logged on the security report. You can also elect to have the network administrator notified through an alert email.

 

Accuracy and Precision

 

• Virtually zero false positives

• Virtually 100% detection rate

• Resilient to data manipulation, including:

•Data extracting – only a small part of a file or a subset of a database table is copied    and pasted from one document to another

• File format conversion

• Compression

• Embedding – the data from a protected file is inserted into another file

• File extension changes

• Re-typing – text is re-typed from a printed document

• Language encoding changes, especially conversion between Unicode and plain English

• Different representation -, i.e., a social security number may be represented in the form ‘777-77-7762', ‘777 77 7762' or ‘777777762''

 

Protects ALL Protocols

 

• SMTP
• HTTP
• HTTPS
• Web Mail
• HTTP Server
• POP3
• FTP
• SSL (capable of decryption)
• Instant Messengers
• Yahoo Messenger

• Microsoft Messenger
• ICQ
• AIM
• Google Talk
• Jabber
• Peer-to-Peer applications
  (20+ applications and protocols)
• All protocols, sending data in clear
• Capable of blocking on all protocols

 

Reporting

 

• Built in table reports

• Built in Crystal Reports

• MS Access format for exporting

 

 

 

...........................................................................................................................................................................................................................................................................................................
© 2010 BRsec - Network and Security Solutions. All rights reserved - Phone / Fax: +55 (11) 3675-2016 - E-mail: vendas@brsec.com.br