Дмитрий Крид
    • Create new note
    • Create a note from template
      • Sharing URL Link copied
      • /edit
      • View mode
        • Edit mode
        • View mode
        • Book mode
        • Slide mode
        Edit mode View mode Book mode Slide mode
      • Customize slides
      • Note Permission
      • Read
        • Only me
        • Signed-in users
        • Everyone
        Only me Signed-in users Everyone
      • Write
        • Only me
        • Signed-in users
        • Everyone
        Only me Signed-in users Everyone
      • Engagement control Commenting, Suggest edit, Emoji Reply
    • Invite by email
      Invitee

      This note has no invitees

    • Publish Note

      Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note No publishing access yet

      Your note will be visible on your profile and discoverable by anyone.
      Your note is now live.
      This note is visible on your profile and discoverable online.
      Everyone on the web can find and read all notes of this public team.

      Your account was recently created. Publishing will be available soon, allowing you to share notes on your public page and in search results.

      Your team account was recently created. Publishing will be available soon, allowing you to share notes on your public page and in search results.

      Explore these features while you wait
      Complete general settings
      Bookmark and like published notes
      Write a few more notes
      Complete general settings
      Write a few more notes
      See published notes
      Unpublish note
      Please check the box to agree to the Community Guidelines.
      View profile
    • Commenting
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
      • Everyone
    • Suggest edit
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
    • Emoji Reply
    • Enable
    • Versions and GitHub Sync
    • Note settings
    • Note Insights New
    • Engagement control
    • Make a copy
    • Transfer ownership
    • Delete this note
    • Save as template
    • Insert from template
    • Import from
      • Dropbox
      • Google Drive
      • Gist
      • Clipboard
    • Export to
      • Dropbox
      • Google Drive
      • Gist
    • Download
      • Markdown
      • HTML
      • Raw HTML
Menu Note settings Note Insights Versions and GitHub Sync Sharing URL Create Help
Create Create new note Create a note from template
Menu
Options
Engagement control Make a copy Transfer ownership Delete this note
Import from
Dropbox Google Drive Gist Clipboard
Export to
Dropbox Google Drive Gist
Download
Markdown HTML Raw HTML
Back
Sharing URL Link copied
/edit
View mode
  • Edit mode
  • View mode
  • Book mode
  • Slide mode
Edit mode View mode Book mode Slide mode
Customize slides
Note Permission
Read
Only me
  • Only me
  • Signed-in users
  • Everyone
Only me Signed-in users Everyone
Write
Only me
  • Only me
  • Signed-in users
  • Everyone
Only me Signed-in users Everyone
Engagement control Commenting, Suggest edit, Emoji Reply
  • Invite by email
    Invitee

    This note has no invitees

  • Publish Note

    Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note No publishing access yet

    Your note will be visible on your profile and discoverable by anyone.
    Your note is now live.
    This note is visible on your profile and discoverable online.
    Everyone on the web can find and read all notes of this public team.

    Your account was recently created. Publishing will be available soon, allowing you to share notes on your public page and in search results.

    Your team account was recently created. Publishing will be available soon, allowing you to share notes on your public page and in search results.

    Explore these features while you wait
    Complete general settings
    Bookmark and like published notes
    Write a few more notes
    Complete general settings
    Write a few more notes
    See published notes
    Unpublish note
    Please check the box to agree to the Community Guidelines.
    View profile
    Engagement control
    Commenting
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    • Everyone
    Suggest edit
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    Emoji Reply
    Enable
    Import from Dropbox Google Drive Gist Clipboard
       Owned this note    Owned this note      
    Published Linked with GitHub
    • Any changes
      Be notified of any changes
    • Mention me
      Be notified of mention me
    • Unsubscribe
    ![](https://i.imgur.com/1pYP5Yi.png) GTB Enterprise-Class DLP Suite Overview === Dmitry Creed --- **Table of Content:** [TOC] # 1. Introduction The constant increase in the amount of information, the number of users and mobile devices used by employees leads to a situation where it is almost impossible to control the movement and use of confidential data without special tools. DLP-systems became a good help in solving this problem. You can control the movement of confidential data and prevent their leakage. One of the tasks of the DLP system is to monitor the movement of information within the company. At the same time, DLP systems do not allow controlling access to data that resides in the company or leaves its infrastructure. For example, data is unauthorized transmitted within the company to colleagues or the device on which important information was stored (and DLP systems cannot encrypt data on devices). To solve this problem, data encryption systems can be used, including IRM systems (Information Rights Management). With the help of IRM systems, data usage policies are defined that allow answering four basic questions: * WHO can use data; * WHAT you can do with the data (read, write, print, transfer to third parties); * WHEN this can be done (for example, in what period of time); * WHERE you can carry out these actions (for example, only on a corporate laptop). Most importantly, by encrypting the data, IRM systems guarantee confidentiality even if the data are trapped by unauthorized persons. However, IRM does not control the movement of confidential data (inside or outside the company's perimeter) or detect leaks. DLP systems must handle this. As you can see, DLP and IRM systems are complementary systems. The DLP + IRM bundle allows full control over confidential data both inside and outside the company’s perimeter. And also provide a complete picture of the use of data and access to them. In 2012, the comprehensive GTB Enterprise-Class DLP Suite DLP system was introduced. Its uniqueness lies in the fact that it already incorporates the full-fledged component of GTB IRM. It is designed to distinguish and structure the rights to access important data. Conveniently, both functions are integrated in one product. This reduces the total cost of ownership of the system (the licensing policy takes into account the number of users), and also increases the security of company data. # 2. GTB Enterprise-Class DLP Suite Architecture GTB Enterprise-Class DLP Suite consists of several systems: * GTB Inspector; * GTB IRM (Information Rights Management); * GTB eDiscovery; * GTB Endpoint Protector; According to the developers in the latest version of the system, GTB eDiscovery and GTB Endpoint Protector modules are combined into a single agent. * GTB Central Console. In addition to these systems, the GTB Enterprise-Class DLP Suite includes support components: * GTB Security Manager; * Name Resolution Helper Logon Script (NRH). Software-hardware monitoring system "Information in motion" - GTB Inspector is designed to intercept and view data that is sent to the Internet using various protocols (HTTP, HTTPS, SMTP, FTP, etc.). The GTB Inspector also includes: * "GTB SSL Proxy" - a proxy server that provides data transmission and interception of messages in encrypted protocols; * "GTB Mail Transfer Agent" is a mail server that allows you to intercept and redirect e-mail, as well as add information to the MIME headers of the letter. **GTB IRM** (Information Rights Management). This system is designed to provide access to confidential information. It is a ready-made VMware virtual machine with an integrated Seclore IRM solution. GTB IRM is fully integrated with LDAP (Active Directory). It is also possible to work GTB IRM without integration with LDAP. When working together with GTB eDiscovery, GTB IRM allows you to differentiate access to important information for different users, control actions with files (view, edit, save, print, track screenshots, etc.). It is possible to set time intervals for file access. **GTB eDiscovery** is an agent-based system designed to control information stored on the hard drives of various devices anywhere in the infrastructure. Files of any formats, including binary, are supported. **GTB Endpoint Protector** allows you to control information transmitted via removable media. A large number of device types are supported. GTB Endpoint Protector runs in an Active Directory environment. **GTB Central Console** is the management console for GTB eDiscovery and GTB IRM, policy settings, a tool for analyzing registered events and viewing reports. **GTB Security Manager** is a program that creates digital fingerprints of protected information and is loaded into the GTB Inspector database. **Name Resolution Helper Logon Script** (NRH) is required for the rules to work correctly for Active Directory user groups in the GTB Inspector. Following figure shows a schematic diagram of the organization of the GTB Enterprise-Class DLP Suite. ![](https://i.imgur.com/GLUzNFg.png) # 3. GTB Enterprise-Class DLP Suite System Requirements **GTB Central Console** Minimum requirements: - CPU – Intel Core Duo 2GHz or higher (2 cores). - RAM – 2GB or more. - HDD free space – 250GB or more. - External or internal CD/DVD-ROM connected to the Server. The recommended requirements provide general requirements: - CPU – Intel Core Duo 2GHz or higher (4 cores). - RAM – 4GB or more. - HDD free space – 500GB or more. - External or internal CD/DVD-ROM connected to the Server. **GTB Central Console** Minimum requirements: - CPU – Intel Core Duo 2GHz or higher (2 cores). - RAM – 2GB or more. - HDD free space – 150GB or more. - External or internal CD/DVD-ROM connected to the Server. The recommended requirements provide general requirements: - CPU – Intel Core Duo 2GHz or higher (4 cores). - RAM – 4GB or more. - HDD free space – 200GB or more. - External or internal CD/DVD-ROM connected to the Server. **GTB IRM Policy server** VM Host Minimum Requirements - CPU – Intel Core 2 Duo 2GHz or higher. - RAM – 4GB or more. - HDD free space – 160GB or more. - The VMware Player/Workstation installed on the host server. Minimum Requirements - CPU – Intel Core 2 Duo 2GHz or higher. - RAM – 3GB or more. - HDD free space – 120GB or more. # 4. GTB Enterprise-Class DLP Suite Functional Features GTB Enterprise-Class DLP Suite allows you to intercept and analyze various types of network traffic, to control access to data on various devices on the network. And also to control access to information in file network storages and on removable devices. All these features are provided by the systems that are part of the GTB Enterprise-Class DLP Suite. Determining what data can be considered confidential is possible by the following methods: * Creating digital fingerprints from protected data. * Create dictionaries and templates that contain sample data that is considered confidential. * Create a sample from databases and tables using the Microsoft ODBC module. All this data is stored in a single database, which is stored in the GTB Inspector system, except for templates and dictionaries. Templates and dictionaries are created for each system separately. To facilitate the integration of this data, it is possible to export them to a TXT file. ## 4.1. The functionality of the system GTB Inspector "The Information on the Move" monitoring system - GTB Inspector allows solving the following tasks: * Prevention of confidential information leakage; * Blocking visits to unwanted resources; * Blocking instant messaging systems; Control email, erroneous email sending; * Accumulation of incident files for retrospective analysis; * The accumulation of statistical data; * Formation of reporting on events; * Incident Notification. GTB Inspector allows you to intercept and analyze network traffic using the following protocols: * HTTP / HTTPS * FTP * SMTP + ESMTP * IMAP POP3 (as well as protocols using encryption: POP3S, HTTPS / SMTPS) * SSH * Network Printing Protocols (LPD, IPP) * SSL * RDP * VNC * NNTP * Support Webmail * Yahoo Mail * GMail * MS Hotmail * AOL Webmail * Netscape Mail * Messengers * ICQ * AIM * Yahoo Messenger * MSN Messenger * Google Talk (without TLS support) * IRC * Jabber (XMPP, without TLS support) * P2P protocol * The rest of the protocols are understood in terms of TCP. Also, GTB Inspector allows you to identify and track protected content, including: * MS Office (password-protected Word, Excel and PowerPoint files); * ZIP; * PDF; * PGP; * S / MIME; * Rar. The depth of the nested archives can reach 10. With regard to the intercepted data, the following actions can be applied: * Registration of a security policy violation with delivery blocking or delivery permission; * Security Officer Notification; * Quarantine email before making a decision; * Redirecting email to an encryption host; * Skip content without inspection. In the case of using GTB Inspector in high-loaded networks, it is possible to balance the network network load with load distribution among several installed GTB Inspector modules with clustering. The load on one link of the cluster can be more than 100 Mbit / s. ## 4.2. GTB IRM (Information Rights Management) System Functionality Control of information located on workstations and in the network is carried out using the GTB eDiscovery system, which can work in conjunction with the GTB IRM (Information Rights Management) system and the GTB Endpoint Protector. This allows complete control over access to important information by applying rules for distributing access to information based on configured policies. GTB eDiscovery supports all file formats (text and binary). A distinctive feature of this system is the ability to view temporary files for the presence of protected information. Also, the GTB eDiscovery with GTB IRM together, provides the ability to encrypt data according to the specified conditions. What can be very useful, for example, in case of loss of a laptop or other portable device. The GTB eDiscovery agent can work in both automatic and manual mode. In case of detection of illegal actions of the user, the agent sends a notification to the security officer. When working in tandem with GTB IRM, the agent can apply the policies set in GTB IRM, limiting user actions with data: * Policies can be used both within the local network and outside it; * Allowing users to view files only; * Permission to access files only at certain times; * Clipboard control; * Prevent writing to file; * Prohibiting the use of PrintScreen; * Disallow print file. Full integration with Active Directory (or other LDAP-user base) provides the ability to control and delimit access to data at the user and domain level. The ability to create multi-level policies is supported. One of the most important features is support for access control to data on hardware identification of the device (MAC address), network, IP address or range of IP addresses. Thus, GTB Enterprise-Class DLP Suite allows you to control access to data located in cloud environments. For example, you can deny access to corporate e-mail if the device is disconnected from a domain or is located on another network / subnet. GTB IRM also allows you to control the use of information on various devices. Users who brought their devices and connected to the corporate network can view files using a web browser (webconnect), but cannot save them to their devices. This relieves network administrators of ongoing control over the installation of agents on mobile devices. ## 4.3. The functionality of the system GTB Endpoint Protector GTB Endpoint Protector is a powerful data leak prevention system for: * Removable devices; * MP3 players (including iPod); * CD / DVD discs; * SD cards; * Floppy disks; * Firewire; * Wi-Fi; * Bluetooth; * Other devices and I / O ports. One of the key features is the ability to control IM-based applications and cloud services, such as: * Skype; * QQ; * GTalk; * DropBox, Evernote, Salesforce, Skydrive, Google Drive. GTB Endpoint Protector is fully integrated with Active Directory, which allows you to control data for groups of users and individual users, computers and domains. It also provides the ability to work in online mode / OffLine (when the device is out of the domain). In case of detection of illegal actions of the user, GTB Endpoint Protector can: * Block data transfer; * Block read from device; * Block the launch of applications from the device; * Register violation with blocking transmission or without; * Encrypt data on the device; * Create a shadow copy of the data; * Notify the user about the wrongful act; * Notify security officer about the violation. ## 4.4. Other features **Analysis of the data.** All the data obtained is carefully analyzed for decision-making based on the given policies. The analysis of information is carried out according to various attributes, technologies of content analysis and linguistic analysis are applied, compared with reference samples. **Creation of digital fingerprints, templates and dictionaries of protected information.** To set the criteria for confidential information and upload them to the GTB Inspector common database, the GTB Security Manager program is used. It allows you to create digital prints from anywhere on the network (folders, network folders, individual files). **Integration with third-party solutions.** Integration with the following systems is supported: * LDAP; * Microsoft Active Directory; * Proxy servers using ICAP; * SIEM; * Email encryption gateways support Voltage, Zix, Secureworks, Secure Computing, PostX, Tumbleweed, Symantec, Frontbridge, Exchange, Postini Perimeter * Cloud Storage Systems DropBox, Evernote, Salesforce, Skydrive, Google Drive **Reporting System.** For convenience, visibility and comfort employees of the security service, GTB Enterprise-Class DLP Suite includes a powerful and convenient reporting system, through which you can always display a clear picture of the actions of employees when working with data. There is an accumulation of incidents in the archive for the retrospective analysis of events. # 5. Working with the GTB Enterprise-Class DLP Suite using the example of GTB Inspector and GTB Central Console Show the complete operation of the entire system and tell in detail about each section, we are not able to because of the complexity and bulk of the product as a whole. Therefore, we restrict ourselves to a brief description of **the old version DLP Suite** interface and some parameters. All work with GTB Inspector and GTB Central Console is done via a web console. ![](https://i.imgur.com/1wLixIh.png) ## 5.1. GTB Inspector The first tab that is displayed after authentication in GTB Inspector - Events. Here you can see statistics on all the incidents that occurred. Detailed incident statistics in the GTB Inspector: ![](https://i.imgur.com/Z8Btfjh.png) Various filter options are available for easy viewing of statistics. Also here the opportunity to provide statistical data in the form of graphs. Graphic display of incidents in GTB Inspector: ![](https://i.imgur.com/uaaR2Ff.png) This graph shows the ratio of recorded incidents by protocol. Other options are available for sorting and displaying graphic information. Including it is possible to display graphs in the form of a pie chart, columns and a table. The next tab is the Rule Editor. Here you can create and manage traffic interception and analysis rules. GTB Inspector Rules Management tab: ![](https://i.imgur.com/mXX3L99.png) First you need to specify the objects to which the rules will be applied. As objects, you need to specify the protocol that will be analyzed. Next, you need to create a rule that will be applied to this or that object. The third tab - Quarantine. Displays email messages that have been intercepted and, according to specified rules, were sent to quarantine before making decisions on them. Configuration tab. This tab contains all the menus for managing the settings of the GTB Inspector. Configuration tab of the GTB Inspector web console: ![](https://i.imgur.com/Y5efXS0.png) Briefly tell about the purpose of each menu on this tab. Central Console IP - in this menu we specify the IP address of the GTB Central Console to connect to this component of the GTB Enterprise-Class DLP Suite. Network is the network interface configuration menu for GTB Inspector to work correctly. Setting up network interfaces and parameters for GTB Inspector: ![](https://i.imgur.com/GqeuldF.png) Alerts - setting parameters for receiving notifications about incidents detected by the system. The settings menu for sending and receiving incident notifications for GTB Inspector incidents: ![](https://i.imgur.com/H8riEWU.png) The Notifications menu provides a variety of incident message format settings. GTB Inspector Incident Report Format Setup Menu: ![](https://i.imgur.com/HgaRs2b.png) All this is necessary in order to provide notice to staff in a convenient form, to facilitate the analysis of the information received. The next menu is Inspection Settings. It specifies the global settings for analyzing intercepted messages or files. Global settings for analyzing captured messages or files in the GTB Inspector: ![](https://i.imgur.com/54klmWc.png) The following three menu items contain settings for analyzing intercepted files, analyzing intercepted content by database and by templates created using the GTB Security Manager. Setting up analysis of intercepted attachments in the GTB Inspector: ![](https://i.imgur.com/dAscw0w.png) Setting up the analysis of captured data on the database in the GTB Inspector: ![](https://i.imgur.com/RO0wtfA.png) Setting up analysis of captured data by templates in the GTB Inspector: ![](https://i.imgur.com/LIxMNfz.png) Since GTB Inspector supports clustering, in this mode of operation it is necessary to distribute the network load between the cluster shoulders. These settings can be made in the Load Balancing menu. Setting up network load sharing in GTB Inspector: ![](https://i.imgur.com/Z93bzYv.png) Name resolution & LDAP. This menu contains settings for integration with LDAP and the Name Resolution Helper add-on module, which is required for correct operation with Microsoft Active Directory. Settings for connecting GTB Inspector to an LDAP server: ![](https://i.imgur.com/S5t94rJ.png) In the SSL / TLS menu, you can enable or disable support for encrypted traffic interception. Quarantine & Encrypt - GTB Inspector settings menu for working with intercepted e-mails. Configure GTB Inspector to work with intercepted e-mails: ![](https://i.imgur.com/vFwhTD0.png) Log & Audit - in this menu, system logging of the OS that manages the device with the GTB Inspector is configured. Mail Transfer Agent - this menu contains the GTB Inspector settings necessary to configure it as a mail server. Setting GTB Inspector as an email server is necessary for intercepting and analyzing email messages. GTB Inspector Mail Server Settings: ![](https://i.imgur.com/0MW45pq.png) The ICAP menu allows you to enable the built-in ICAP server and specify its port, and the SIEM menu contains settings for integrating the GTB Inspector with third-party SIEM solutions. The GTB SSL Proxy menu allows you to configure the built-in SSL proxy server, which is needed to intercept and analyze encrypted traffic. Setting up a proxy server built into GTB Inspector SSL: ![](https://i.imgur.com/AvodING.png) In the Logs tab, we can view the system.log file, the OS system log, under which the device runs with the GTB Inspector. View device logs with GTB Inspector: ![](https://i.imgur.com/0AnxNqm.png) The Statictics tab displays the hardware and OS settings of the device with the GTB Inspector. Displaying the software and hardware parameters of the device with the GTB Inspector: ![](https://i.imgur.com/ljBzL7b.png) The SSL-keys tab allows you to manage SSL certificates necessary for the correct analysis and decryption of encrypted traffic. The Administration tab allows you to update the device software with the GTB Inspector, specify a valid GTB Inspector license number and manage some additional features of the GTB Inspector. Tab Device Administration with GTB Inspector: ![](https://i.imgur.com/xRF3oDh.png) This concludes our brief overview of the GTB Inspector console and proceeds to reviewing the GTB Central Console. ## 5.2. GTB Central Console Consider working with another component - GTB Central Console. It is part of the GTB Enterprise-Class DLP Suite and allows you to manage the operation of the GTB eDiscovery, GTB Endpoint and GTB IRM modules, configure policies, analyze logged events, and view reporting. Endpoint and eDiscovery are the only agent in the latest version. As with the GTB Inspector, the web console is also used to control the GTB Central Console. After authentication, the first display is the Dashboard page with a summary of the events registered in the system. Dashboard. Summary statistics of GTB Central Console incident events: ![](https://i.imgur.com/RltC15B.png) Widgets are used to display additional data. To facilitate the work and analysis of the provided data, you can customize the Dashboard "by yourself" by disabling unnecessary widgets or adding new, more necessary ones. For ease of navigation between widgets, there is a floating menu on the left side that allows you to quickly switch to the desired widget. The Network, Endpoint and eDiscovery tabs display incidents registered on the network by eDiscovery agents and Endpoint agents. It supports a dynamic graphical representation of the statistics of incidents, filtering by various criteria and uploading statistical data to a file. Since we have no recorded incidents, the magazines are empty. For all three of the above tabs presented a single interface. GTB Central Console log of online incidents: ![](https://i.imgur.com/bsQxV0N.png) The Reports tab contains graphical reports of all events that occurred, registered on the network, by Endpoint and eDiscovery agents. The graphs are empty because there are no recorded events. Bookmark Reports in the GTB Central Console: ![](https://i.imgur.com/cYq2TPX.png) The Network Status tab displays the status of all connected GTB Inspector inspectors and Endpoint agents. This feature allows you to quickly monitor and control the status of the entire system. Monitoring connected GTB Inspector to GTB Central Console: ![](https://i.imgur.com/puQf8Uo.png) In the next tab, we can manage the accounts that are used to work with the GTB Central Console. Account Management GTB Central Console: ![](https://i.imgur.com/kTofs8Y.png) The Logs tab displays the events transmitted by eDiscovery agents, as well as the GTB Central Console audit log. Device audit log with GTB Central Console: ![](https://i.imgur.com/PZaPOMB.png) The DLP Settings tab includes sections that include menus required to configure the entire DLP system, including rights management rules. The first section is System. Unlike GTB Inspector, the GTB Central Console interface supports several localizations. Localizations available for the GTB Central Console interface: ![](https://i.imgur.com/pA3S4y7.png) In the Network menu, the network parameters of the GTB Central Console are configured. In the LDAP menu, you can configure settings for connecting to LDAP servers. The parameters that are needed to connect to the devices on which shadow copies will be stored are located in the Shadow Location menu. In the Emails menu, settings for sending email notifications about events that have occurred are configured. The Date and Time menu includes settings for the system date and time of the device with the GTB Central Console. The most important menu is Security Policy. Predefined security policies are displayed here. And also provides for the possibility of editing and creating your own policies. The security policy management menu in the GTB Central Console: ![](https://i.imgur.com/JskLAEg.png) The Inspection section contains menus for managing the search parameters for important information in attachments, by digital fingerprints, databases, and templates. The IRM (Information Rights Management) section allows you to manage access policies that are superimposed on files with sensitive information. In the eDiscovery section, you can configure eDiscovery agent settings. Configuring eDiscovery agents connected to the GTB Central Console: ![](https://i.imgur.com/j3aoofb.png) Control of devices is configured on the Endpoint & Device Control tab. Configure Endpoint & Device Controls connected to the GTB Central Console: ![](https://i.imgur.com/JZW1U7J.png) In the Policy Management section, there are menus for managing objects for DLP policies, a policy editor, and a policy set management tool. Predefined policy objects in the GTB Central Console: ![](https://i.imgur.com/4lN7aex.png) The Service tab provides the ability to create and restore a backup. And on the Help tab, links to GTB Enterprise-Class DLP Suite documentation are available, as well as a link to download the GTB Endpoint agent. This concludes our brief overview of the GTB Enterprise-Class DLP Suite. It is not possible to consider the whole in the complex in view of its volume and complexity. # 6. Conclusion In this review we looked at the modern multi-component GTB Enterprise-Class DLP Suite DLP system. This is a corporate-level product that provides comprehensive protection of information against leaks. Advantages: * The ability to scale the system, which allows you to create complex configurations for work in high-loaded infrastructures; * Integration with information security monitoring and event management systems; * Presence of predefined search templates for confidential data; * A large number of supported protocols for analysis and interception; * Control cloud storage services; * Webmail control; * Simple and convenient deployment in the customer's infrastructure; * Ability to check the network for unauthorized copies of sensitive data; * The ability to track not only text documents, but also binary files (audio and video files, CAD drawings, etc.); * The ability to track the movement of documents in the infrastructure; * Improved and augmented linguistic and content analysis technologies; * Control clipboard and temporary files; * Good accompanying documentation; * The ability to encrypt data on devices, depending on the prevailing conditions; * The ability to redirect e-mail messages to encryption nodes, which will ensure centrally controlled encryption of electronic messages when exchanging with partners and customers; * Tracking the erroneous sending of mail messages, to minimize the risks associated with the fact that secret information will go to an undesirable recipient; * The ability to export reports in CSV format. Disadvantages: * Lack of control of search queries; * The lack of Russian-language documentation; * Incomplete Russian localization; * No voice traffic recognition.

    Import from clipboard

    Paste your markdown or webpage here...

    Advanced permission required

    Your current role can only read. Ask the system administrator to acquire write and comment permission.

    This team is disabled

    Sorry, this team is disabled. You can't edit this note.

    This note is locked

    Sorry, only owner can edit this note.

    Reach the limit

    Sorry, you've reached the max length this note can be.
    Please reduce the content or divide it to more notes, thank you!

    Import from Gist

    Import from Snippet

    or

    Export to Snippet

    Are you sure?

    Do you really want to delete this note?
    All users will lose their connection.

    Create a note from template

    Create a note from template

    Oops...
    This template has been removed or transferred.
    Upgrade
    All
    • All
    • Team
    No template.

    Create a template

    Upgrade

    Delete template

    Do you really want to delete this template?
    Turn this template into a regular note and keep its content, versions, and comments.

    This page need refresh

    You have an incompatible client version.
    Refresh to update.
    New version available!
    See releases notes here
    Refresh to enjoy new features.
    Your user state has changed.
    Refresh to load new user state.

    Sign in

    Forgot password
    or
    Sign in via Google Sign in via Facebook Sign in via X(Twitter) Sign in via GitHub Sign in via Dropbox Sign in with Wallet
    Wallet ( )
    Connect another wallet

    New to HackMD? Sign up

    By signing in, you agree to our terms of service.

    Help

    • English
    • 中文
    • Français
    • Deutsch
    • 日本語
    • Español
    • Català
    • Ελληνικά
    • Português
    • italiano
    • Türkçe
    • Русский
    • Nederlands
    • hrvatski jezik
    • język polski
    • Українська
    • हिन्दी
    • svenska
    • Esperanto
    • dansk

    Documents

    Help & Tutorial

    How to use Book mode

    Slide Example

    API Docs

    Edit in VSCode

    Install browser extension

    Contacts

    Feedback

    Discord

    Send us email

    Resources

    Releases

    Pricing

    Blog

    Policy

    Terms

    Privacy

    Cheatsheet

    Syntax Example Reference
    # Header Header 基本排版
    - Unordered List
    • Unordered List
    1. Ordered List
    1. Ordered List
    - [ ] Todo List
    • Todo List
    > Blockquote
    Blockquote
    **Bold font** Bold font
    *Italics font* Italics font
    ~~Strikethrough~~ Strikethrough
    19^th^ 19th
    H~2~O H2O
    ++Inserted text++ Inserted text
    ==Marked text== Marked text
    [link text](https:// "title") Link
    ![image alt](https:// "title") Image
    `Code` Code 在筆記中貼入程式碼
    ```javascript
    var i = 0;
    ```
    var i = 0;
    :smile: :smile: Emoji list
    {%youtube youtube_id %} Externals
    $L^aT_eX$ LaTeX
    :::info
    This is a alert area.
    :::

    This is a alert area.

    Versions and GitHub Sync
    Get Full History Access

    • Edit version name
    • Delete

    revision author avatar     named on  

    More Less

    Note content is identical to the latest version.
    Compare
      Choose a version
      No search result
      Version not found
    Sign in to link this note to GitHub
    Learn more
    This note is not linked with GitHub
     

    Feedback

    Submission failed, please try again

    Thanks for your support.

    On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?

    Please give us some advice and help us improve HackMD.

     

    Thanks for your feedback

    Remove version name

    Do you want to remove this version name and description?

    Transfer ownership

    Transfer to
      Warning: is a public team. If you transfer note to this team, everyone on the web can find and read this note.

        Link with GitHub

        Please authorize HackMD on GitHub
        • Please sign in to GitHub and install the HackMD app on your GitHub repo.
        • HackMD links with GitHub through a GitHub App. You can choose which repo to install our App.
        Learn more  Sign in to GitHub

        Push the note to GitHub Push to GitHub Pull a file from GitHub

          Authorize again
         

        Choose which file to push to

        Select repo
        Refresh Authorize more repos
        Select branch
        Select file
        Select branch
        Choose version(s) to push
        • Save a new version and push
        • Choose from existing versions
        Include title and tags
        Available push count

        Pull from GitHub

         
        File from GitHub
        File from HackMD

        GitHub Link Settings

        File linked

        Linked by
        File path
        Last synced branch
        Available push count

        Danger Zone

        Unlink
        You will no longer receive notification when GitHub file changes after unlink.

        Syncing

        Push failed

        Push successfully