GTB Technologies GTB Inspector
May 03, 2010
$9,990 (200 seats and console)
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: A solid value for the money. The appliance performs well.
- Weaknesses: Support site is seriously lacking. No help section or documentation available from the administration interface.
- Verdict: Overall, a decent value for network DLP. However, the finer points need to be improved before this solution can be considered an enterprise-class product.
GTB Inspector is an appliance solution that scans outbound network traffic for confidential information. The tool can be configured inline, out of line or via network tap. The solution is able to scan, detect and perform many different actions against the information depending on its configured rule set.
Getting up and running after the network configuration information takes only a few minutes. The appliance can perform several actions against the data that it finds. It can alert, quarantine and redact block, as well as perform the actions across various types of data sets, including instant messages, HTTP traffic, printers, email and others. Overall, the actual performance of the appliance was good. The solution itself does what it says it will do and there are many important protocols that the solution can detect and many email and proxy solutions with which the appliance can integrate. However, what we found lacking was the overall implementation of the solution from a holistic perspective.
From an overall ease-of-use perspective, the interface felt a bit unpolished and underwhelming by today's standards. Most of the configuration and editing is done through the appliance's web browser, but the heart of the solution is the way in which it detects data through rules, pattern-matching and fingerprinting. The pattern-matching interface is a bit archaic. The web browser launches a text editor inside the browser, which contains very specific and structured rows of data that must be formatted exactly in order to customize patterns.
Additionally, the fingerprinting mechanism (learning the different types of data and applying/detecting its digital signature) is a separate standalone installation performed on a desktop or workstation. This process works in conjunction with the appliance. Lastly, the management console is a separate component and is supplied as a virtual appliance to monitor events and run reports. Although the solution states the console virtual appliance is shipped separately with a DVD containing the documentation, we were not provided the DVD.
The appliance does not come with any printed documentation, nor does the appliance contain any help files. We were directed to a URL that contained a few PDFs, which contained the basic information that we needed.
Pricing starts at $9,990 for 200 users and includes basic eight-hours-a-day/five-days-a-week phone and email support. Premium support is available. The GTB website does not contain much of a support section other than a contact form.
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Cybercriminals already able to hack ATM biometric readers
- Education sector bullied by ransomware and can barely defend itself, report
- IoT assault, connected devices increasingly used for DDoS attacks
- Cisco warns of exploitation of new flaws linked to Shadow Brokers exploits
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Hacker purportedly selling over 650,000 stolen medical records on dark web marketplace
- Wi-Fi warning! Study finds U.S. unaware of public Wi-fi risks
- Presidential debate 2016: Candidates pledge cyber investment, differ on Russia
- Yahoo faces congressional action and class action lawsuits following historic data breach
- Case study: Hawaiian Telcom says aloha to AlienVault security management
- Pippa Middleton's iCloud account hacked
- OpenSSL patches 14 vulns, including high-severity flaw that can be exploited for DoS attacks