The GTB Inspector 10.0 is a different type of product from the others we looked at in this group test. While the other solutions, with one exception, focus on protecting documents at rest and in transit, GTB Technologies' offering is designed to prevent unauthorized outbound transmissions of confidential information in violation of the organization's corporate policies. This gives it a core capability of extrusion prevention as opposed to digital rights management in the traditional sense.
That said, we found the GTB Inspector to be a competent tool, delivered as an appliance, and appropriate to its tasks. However, we thought that it lacked maturity in some areas.
Simple to deploy, the product sits in-line at the enterprise exit point, but can be deployed out-of-line as well. It is built upon a security-hardened RedHat platform that allows relatively easy management of the appliance.
The web interface is easy to navigate and can be accessed from anywhere on the network. But the product's rule builder is awkward, and the documentation could be more helpful in this regard. Often we found that rules we had created did not perform their expected functions, even though the log indicated that they had.
The documentation could be stronger generally. The GTB Inspector comes with a small 32-page system manual that includes screen shots and outlines procedures. There aren't quite enough examples, and some of those provided are ambiguous. Although the documentation is weak in the area of rule creation, it documents deployment of the product very well.
Support is available by phone and email. A maintenance fee is payable, which includes a support plan and free software upgrades. There is a strong support area on the website, but only subscribers to the plan have access to it.
The GTB Inspector is an expensive product, especially if taking into account the maintenance fee. However, if your organisation is concerned about data leakage, and has the patience to implement and manage a young product (this version was introduced in June), this is worth looking at.
This solution can look at both documents and what the supplier refers to as "passive data", including email, instant messages and web servers.