8e6 to Introduce New Line of Defense in Fight Against Data Leakage.
Filtering Leader Forms Strategic OEM (Original Equipment Manufacturer) The rebranding of equipment and selling it. The term initially referred to the company that made the products (the "original" manufacturer), but eventually became widely used to refer to the organization that buys the products and Alliance with GTB GTB Global Transaction Banking
GTB General Terms of Business
GTB Global Trust Bank
GTB Go To Bed
GTB Grand Traverse Band (of Ottawa and Chippewa Indians; Michigan)
GTB Ghana Tourist Board
GTB Gay Teen Boys Technologies to Deliver New Data Leakage Appliance
ORANGE, Calif. -- 8e6 Technologies, a security company dedicated to Internet filtering and reporting, today announced a strategic partnership with GTB Technologies, a leading provider of comprehensive security solutions for detecting and preventing outbound transmissions, to deliver a new data leakage appliance within the rapidly growing data security market. Under terms of the agreement, 8e6 plans to integrate the new data leakage product into its existing Web filtering Blocking access to unwanted Internet content. Businesses can block content based on traffic type. For example, Web access might be allowed, but file transfers may not. Content can also be blocked by site, using lists of URLs cataloged by content that are updated frequently. and reporting infrastructure to provide customers with a comprehensive solution that goes beyond simply tracking user's Web usage, to include monitoring of all outbound Internet-based communication to determine if employees are trying to send confidential information Noun 1. confidential information - an indication of potential opportunity; "he got a tip on the stock market"; "a good lead for a job"
steer, tip, wind, hint, lead outside the company's network.
"Organizations in highly regulated industries, such as financial services The examples and perspective in this article or section may not represent a worldwide view of the subject.
Please [ improve this article] or discuss the issue on the talk page. , healthcare and pharmaceuticals, are stuck in between a rock in a hard place," said George Shih, CEO (1) (Chief Executive Officer) The highest individual in command of an organization. Typically the president of the company, the CEO reports to the Chairman of the Board. of 8e6. "On the one hand, data and intellectual property leakage stemming from the insider threat and inadvertent employee misuse are costing them millions of dollars annually in compliance penalties, failed security audits, brand damage and lost customers. On the other hand, the only viable solutions to date have been monolithic software packages that require new hardware and infrastructure to install and maintain, driving their total cost of ownership into the millions of dollars. 8e6's appliance-based solutions have already changed the economic, performance and value landscapes in the Web filtering market, and we plan to bring that same value to customers in the data leakage space."
Enterprises today are heavily burdened with the need to protect confidential information such as customer and employee information, source code, competitive information, human resources-related content, financial statements and patents. In addition, there are federal regulations such as Sarbanes-Oxley, GLBA GLBA Gramm-Leach-Bliley Act of 1999 (Financial Modernization Act of 1999)
GLBA Gay and Lesbian Business Association
GLBA Great Lakes Booksellers Association
GLBA Glacier Bay National Park and Preserve , HIPAA (Health Insurance Portability & Accountability Act of 1996, Public Law 104-191) Also known as the "Kennedy-Kassebaum Act," this U.S. law protects employees' health insurance coverage when they change or lose their jobs (Title I) and provides standards for patient health, and PCI (1) (Payment Card Industry) See PCI DSS.
(2) (Peripheral Component Interconnect) The most widely used I/O bus (peripheral bus). standards which require companies to secure private data. Despite heightened awareness and increased regulations, serious data breaches continue to occur due to poor endpoint controls, resulting in the loss of private customer data and other confidential information.
"Pure-play content monitoring and filtering (CMF CMF Christian Medical Fellowship
CMF Compressed Mortality File
CMF Content Management Framework
CMF Council of Michigan Foundations
CMF Congressional Management Foundation (Washington DC, USA)
CMF Code Monétaire et Financier ) tools are the best and most-comprehensive solution for detecting information loss through transmission, because they cover managed and unmanaged systems across the widest range of network protocols," said Gartner Analysts, Rich Mogull and Paul Proctor Paul Proctor is an editorial columnist who identifies himself as a "rural resident of the Volunteer State" residing somewhere near Nashville, Tennessee. His columns, under the heading "Biblically Speaking", are published at NewsWithViews. in a February 2006 report entitled, "Content Monitoring and Filtering Helps Find Faulty Business Process, Accidental Disclosures." "These products can monitor multiple channels for specific inbound and outbound content based on rules or signatures. Increasingly, single-channel filters, dedicated to just e-mail or IM, are expanding into the multiple-channel market through partnership and acquisition," Mogul added.
"As the threat landscape evolves, it is critical that GTB broaden its focus to deliver next-generation security solutions that address the dynamic nature of business today," said Uzi Yair, CEO of GTB. "8e6 is our first OEM partner and we are excited to integrate our solution with 8e6's world class solution to provide customers with the most advanced overall data leakage prevention solution available."
Unlike software-based data leakage products, 8e6's appliance-based solutions are easy to install and do not require a repository for confidential information. 8e6's new solution also monitors and blocks confidential information across any file type and TCP/IP TCP/IP
in full Transmission Control Protocol/Internet Protocol
Standard Internet communications protocols that allow digital computers to communicate over long distances. protocols without the need for painful integration with e-mail or IM systems. In addition, 8e6's new data leakage solution fingerprints binary data binary data - binary file across multiple applications and across various iterations and no matter what file type the data is stored. Organizations can easily integrate 8e6's data leakage appliance with their existing solutions while gaining enterprise class information leakage Information leakage happens whenever a system that is designed to be closed to an eavesdropper reveals some information to unauthorized parties nonetheless. For example, when designing an encrypted instant messaging network, a network engineer without the capacity to crack your prevention. Customers can be confident that their internal data is secure from privacy, regulatory compliance and intellectual property threats.
8e6 will unveil its new data leakage appliance within 90 days.
About 8e6 Technologies
8e6 Technologies is a security company dedicated to Internet filtering and reporting. We are the only Web filtering company that uses a unique "pass-by technology" on a highly scalable appliance. Our standalone reporting appliance is easy to use and provides extremely detailed information, faster than any other product on the market. 8e6 helps protect its customers from all internal threats including spyware, malware, and Internet abuse leading to data loss and liability-while preventing bandwidth misuse. By preventing improper use of network resources and employee time, 8e6 also increases productivity and ensures regulatory compliance. Our standalone security solution achieves a dramatic reduction in the cost of hardware, subscriptions, maintenance, and support, and produces a substantially lower total cost of ownership. A Web filtering pioneer since 1995, the company maintains headquarters in Orange, California The City of Orange is located in Orange County, California, United States. It is approximately 3 miles (6 kilometers) north of the county seat, Santa Ana, and approximately 32 miles (52 kilometers) southeast of Los Angeles. , with offices in Taipei and Beijing, as well as a network of channel partners worldwide. For more information, please call 888.786.7999 or visit www.8e6.com.
About GTB Technologies
Based in Newport Beach, CA, GTB Technologies provides comprehensive security solutions for detecting and preventing outbound transmissions of confidential content that violates corporate policy, as well as government and industry regulations. GTB focuses its offering on threats to corporate security that come from inside the organization. GTB Technologies sells to organizations in the financial, insurance, health care and manufacturing sectors, universities and governments. For further information, call 949-863-9254, email firstname.lastname@example.org or visit www.gttb.com.