The solution is basically a DLP product. It helps customers protect data before it can leave the organization. It also helps classify data as well, which can be classified, for example, as sensitive, public, or confidential. The classification would be based on the context of the document. Those rules and policies can be run through the DLP to block certain documents from sharing or leaving the company.
Consultant Architect- Cyber Security at a financial services firm with 1,001-5,000 employees
Real User
2021-07-23T11:14:16Z
Jul 23, 2021
We are in the implementation stage of GTB Technologies Inspector and we use it for inspecting our sensitive data between departments and third parties. It can be used as a Cloud Access Security Broker (CASB). We are in the monitoring stage, and gathering all the information. Then after one month, we are going to implement the blocking mode. It functions similar to a firewall because they have security policies and many configurations.
What is data loss prevention? Data loss prevention (DLP) is a solution or process used to prevent data breaches and ensure that sensitive data is not lost, accessed by unauthorized users, or otherwise misused.
The product has an endpoint OCR, which other DLPs don't provide.
The solution is basically a DLP product. It helps customers protect data before it can leave the organization. It also helps classify data as well, which can be classified, for example, as sensitive, public, or confidential. The classification would be based on the context of the document. Those rules and policies can be run through the DLP to block certain documents from sharing or leaving the company.
We are in the implementation stage of GTB Technologies Inspector and we use it for inspecting our sensitive data between departments and third parties. It can be used as a Cloud Access Security Broker (CASB). We are in the monitoring stage, and gathering all the information. Then after one month, we are going to implement the blocking mode. It functions similar to a firewall because they have security policies and many configurations.
It is mainly for data classification and data leakage prevention. We currently have three customers of this solution.
The primary use case for this solution is to protect our confidential documents from being stolen from the network and endpoints