GDPR Consultancy

Aligning your company to GDPR involves the following approach:

  • Phase 1, which includes: analysis of the existing situation and mapping of personal tiles and existing processes.
    Basically, after completing this phase, you have all the information in order to be able to continue on its own the implementation of the GDPR accession measures.
  • Phase 2, which includes support for the implementation of the proposed measures in internal processes and documents, the adaptation of documents / procedures / contracts, including support for implementing solutions to ease work after May 25, 2018.

Thus, the assessment of the current situation as well as the understanding of the specifics of the business, of the processed personal data categories and of the main processes will be made by:

  • Analyze public data
  • Discussions with management
  • Completing an assessment questionnaire by those responsible
  • Studying the provided documents (on request)
  • Agreeing results with management

It will then be used to identify the personal data used (both from the subjects and from other sources or products of the company) – on business areas – as well as to identify the means of processing and storing information:

  • Analysis of questionnaire responses,
  • Delivering on-demand information (process documents, contracts, or sample data)
  • For high generalized domains (HR, accounting, video security, GPS …), starting with a standard set of existing data, only the differences are analyzed) – for a minimum effort

The next step will be to identify and map the processing goals (by data types), the length of the processing, the roles involved, and the third parties that have access to the data.

Analysis of risks and gaps is done by identifying gaps and proposing alternatives. For each non-compliance with GDPR requirements, we will analyze:

  • the risk (in terms of impact on the subjects, but also on the business),
  • alternatives will be presented,
  • an estimate of deployment costs will be made

Finally, a proposal for missing procedures / procedures will be made, and for areas not previously addressed, a set of new processes and procedures will be proposed.

**** The proposed processes and procedures will require some further customization, depending on the implementation possibilities, or will contain a set of new requirements that will need to be included in internal documents or contracts with third parties.

Portfolio Categories:

GDPR Solutions 


Panda Security

Endpoint Protection Plus

Endpoint Protection Plus provides centralized and uninterrupted protection for all of your Windows, Mac and Linux workstations, including laptops and servers, in addition to the leading virtualization systems and Android devices.

With Endpoint Protection, the protection is managed conveniently and easily from a single Web console, permitting centralized administration anytime and anywhere, without needing technical knowledge.

Endpoint Protection Plus

Systems Management

Systems Management is the easy and affordable way to manage, monitor and maintain all your organization’s devices, whether they are in the office or remote. Thanks to the simplicity offered by the pre-configured settings, the learning curve is practically non-existent, and it ensures that the organization’s IT infrastructure operates exactly according to plan.

Control your devices:

  • 100% granular visibility of the devices you manage
  • Stay up-to-date on your IT environment and changes
  • Keep a check on the hardware and software installed and in use

Manage your IT resources from a single Web console with all the information and tools you need:

  • Cloud-hosted; with no additional infrastructure
  • Manage all your devices no matter where they are at any time and from anywhere
  • Almost non-existent learning curve

Systems Management

Email Protection

Email Protection includes a powerful antivirus engine that leverages the maximum detection capabilities provided by Collective Intelligence. It comprises a multi-layer system of filters for inbound and outbound email, using multiple connection, antivirus and content filters to deliver the most effective security.

The integration of Cyren’s technology, including anti- spam, pattern-based virus detection and reputation lists, provides maximum protection.

Email Protection offers immediate, effective protection against viruses and spam, through online scans performed on Panda Security’s servers.

Email Protection is incredibly simple to use. The configuration of the service and its Web console ensure complete operability right from the outset.

Email Protection

Portfolio Categories:

GDPR Solutions 


DLP & Mobil Device management – Endpointprotector
Endpointprotector Manage:

  • Data Leakage / Data Loss / Data Theft
  • Uncontrolled use of devices
  • Mobile Device Management
  • Regulatory Non-Compliance
  • Low Productivity

With Endpoint Protector being offered as hardware or virtual appliance, it can be setup in minutes. Moreover, the responsive management interface allows managing policies and checking reports from any device, from desktop to tablet.
Endpoint Protector dramatically reduces the risks posed by internal threats that could lead to data being leaked, stolen, or otherwise compromised. In addition to these, compliance with various rules and regulations is also met.

The blacklist and whitelist-based approach grants exibility in policy building. Organizations have the option to prohibit the use of speci c removable devices and data transfers to le cloud sharing applications and other online services, to scan for certain PIIs, but to allow transfers to speci c URLs and domain names for certain computers/users/groups, avoiding task interruption.

Suitable for any type of network, our products can be used by enterprise customers, small and medium business and even home users. With a client-server architecture, they are easy to deploy and centrally manage from the web-based interface. Besides the Hardware and Virtual Appliance, Amazon Web Services Instance and Cloud version, a Stand-alone version is also available for those looking for basic features.

Endpoint Protector

Portfolio Categories:

GDPR Solutions 


Camouflage Data Masking – Imperva

Camouflage Data Masking Benefits:

  • Use production data safely and freely in non-production environments, such as testing/ QA, application development, training, and outsourcing.
  • Gain visibility into where and what sensitive data is
  • Enable data-driven business processes without exposing sensitive data
  • Deploy an enterprise scalable data masking process
  • Comply with data privacy and protection regulations such as PCI, HIPAA, GDPR

 

Portfolio Categories:

GDPR Solutions