![]() All my other security tools help keep my business safe without Cyberhaven, my business model comes apart at the edges. Because of the importance of data tracing and data loss prevention to me, every single year when it comes time to renew my Cyberhaven contract I exhaustively search the market for other ways of solving the problem of insider threats, and nothing else I've ever found is as effective or as straightforward as Cyberhaven. ![]() ![]() Because of the nature of my business, insider threat and data crosstalk between clients was significantly impacting our ability to scale up with our client base-without the ability to wrangle customer data effectively, we would have lost several of our biggest clients years ago, and our clients wouldn't have continued to invest in growing our relationships. monitor high risk leavers for data loss) Read reviewsĬyberhaven is, and I don't say this facetiously, the single most important security tool in my belt. We look forward to gaining more value from the product as we develop use cases that the tool enables (i.e. We have only just started to use the product but are already seeing real value, for example, detecting sensitive credentials being sent to fa user's freemail address which is strictly out of compliance. Prior to this, we had a gut feeling it was something we had to take seriously based on events, but having Enforcer has now given us high quality insights into exactly what is leaving via email.īecause of these insights, and Enforcer's capability combined with the fine grained rules you can create with Architect, we have been able to deter users from sending sensitive content via email and we are already seeing a ~20% reduction in our weekly rolling average of sensitive emails sent externally (in 4 weeks of turning the product on Warn Mode). We acquired Enforcer at the start of 2022 and since then have been able to articulate meaningfully to the board and other senior stakeholders what the risk of sensitive data loss is. GTB DLP truly is a game changer in protecting our company and the ROI is 1000% with the peace of mind knowing that even if the firewall port was open, and the app was allowed to run, the data someone tries to transfer is not going to through if it contains our proprietary or customer data and I am going to know about it. After the first call I had my entire deployment completed to all our assets and I was collecting compliance activity. Our implementation only took 2 phone calls. You truly get a one on one feeling like you are their only customer. It is flexible and unlike larger vendors, GTB treats each deployment with the same effort and prioritization no matter what your company size is. GTB DLP is an excellent product that met the unique compliance needs of my company. You have a complete record of the transmission and the files that were transmitted even if the user deletes their files and email. The ability to shadow transmissions and archive those on a server is invaluable. If they allow a transmission to occur in the Endpoint Protector and it did not meet the policy requirements, the Inspector will catch it and block/quarantine it and notify the sender. The Inspector sits inline and monitors all data exiting your network. We use both the Endpoint Protector and the Inspector appliance. It becomes the speedbump that the user has to stop and think, "What am I sending, where or who to, and does it need protection." It has paid for itself countless times by preventing data transmissions caused by human error. It has been almost 2 years since install and I am still impressed with GTB DLP and the company.
0 Comments
Leave a Reply. |