Aligning your company to GDPR involves the following approach:
Phase 1, which includes: analysis of the existing situation and mapping of personal tiles and existing processes.
Basically, after completing this phase, you have all the information in order to be able to continue on its own the implementation of the GDPR accession measures.
Phase 2, which includes support for the implementation of the proposed measures in internal processes and documents, the adaptation of documents / procedures / contracts, including support for implementing solutions to ease work after May 25, 2018.
Thus, the assessment of the current situation as well as the understanding of the specifics of the business, of the processed personal data categories and of the main processes will be made by:
Analyze public data
Discussions with management
Completing an assessment questionnaire by those responsible
Studying the provided documents (on request)
Agreeing results with management
It will then be used to identify the personal data used (both from the subjects and from other sources or products of the company) – on business areas – as well as to identify the means of processing and storing information:
Analysis of questionnaire responses,
Delivering on-demand information (process documents, contracts, or sample data)
For high generalized domains (HR, accounting, video security, GPS …), starting with a standard set of existing data, only the differences are analyzed) – for a minimum effort
The next step will be to identify and map the processing goals (by data types), the length of the processing, the roles involved, and the third parties that have access to the data.
Analysis of risks and gaps is done by identifying gaps and proposing alternatives. For each non-compliance with GDPR requirements, we will analyze:
the risk (in terms of impact on the subjects, but also on the business),
alternatives will be presented,
an estimate of deployment costs will be made
Finally, a proposal for missing procedures / procedures will be made, and for areas not previously addressed, a set of new processes and procedures will be proposed.
**** The proposed processes and procedures will require some further customization, depending on the implementation possibilities, or will contain a set of new requirements that will need to be included in internal documents or contracts with third parties.
Endpoint Protection Plus provides centralized and uninterrupted protection for all of your Windows, Mac and Linux workstations, including laptops and servers, in addition to the leading virtualization systems and Android devices.
With Endpoint Protection, the protection is managed conveniently and easily from a single Web console, permitting centralized administration anytime and anywhere, without needing technical knowledge.
Systems Management is the easy and affordable way to manage, monitor and maintain all your organization’s devices, whether they are in the office or remote. Thanks to the simplicity offered by the pre-configured settings, the learning curve is practically non-existent, and it ensures that the organization’s IT infrastructure operates exactly according to plan.
Control your devices:
100% granular visibility of the devices you manage
Stay up-to-date on your IT environment and changes
Keep a check on the hardware and software installed and in use
Manage your IT resources from a single Web console with all the information and tools you need:
Cloud-hosted; with no additional infrastructure
Manage all your devices no matter where they are at any time and from anywhere
Email Protection includes a powerful antivirus engine that leverages the maximum detection capabilities provided by Collective Intelligence. It comprises a multi-layer system of filters for inbound and outbound email, using multiple connection, antivirus and content filters to deliver the most effective security.
The integration of Cyren’s technology, including anti- spam, pattern-based virus detection and reputation lists, provides maximum protection.
Email Protection offers immediate, effective protection against viruses and spam, through online scans performed on Panda Security’s servers.
Email Protection is incredibly simple to use. The configuration of the service and its Web console ensure complete operability right from the outset.
With Endpoint Protector being offered as hardware or virtual appliance, it can be setup in minutes. Moreover, the responsive management interface allows managing policies and checking reports from any device, from desktop to tablet.
Endpoint Protector dramatically reduces the risks posed by internal threats that could lead to data being leaked, stolen, or otherwise compromised. In addition to these, compliance with various rules and regulations is also met.
The blacklist and whitelist-based approach grants exibility in policy building. Organizations have the option to prohibit the use of speci c removable devices and data transfers to le cloud sharing applications and other online services, to scan for certain PIIs, but to allow transfers to speci c URLs and domain names for certain computers/users/groups, avoiding task interruption.
Suitable for any type of network, our products can be used by enterprise customers, small and medium business and even home users. With a client-server architecture, they are easy to deploy and centrally manage from the web-based interface. Besides the Hardware and Virtual Appliance, Amazon Web Services Instance and Cloud version, a Stand-alone version is also available for those looking for basic features.
unifies prevention, detection, and response in a single platform driven by sophisticated machine learning and intelligent automation.
reducing the overall attack surface through whitelisting and blacklisting
monitor and render detailed forensics in real time.
It enables you to predict malicious behavior across major threat vectors in real-time, rapidly eliminate threats with fully-automated, integrated response capabilities, and adapt your defenses against the most advanced cyber attacks.
Real-Time Analysis for Advanced Threat Protection – Forcepoint Web Security goes beyond anti-virus defenses via eight defense assessment areas, using a composite scoring process with the Forcepoint ACE predictive analysis.
Easy Dashboard Access to Forensic Data – The Forcepoint Web Security advanced threat dashboard provides forensic reporting on who was attacked, what data was targeted, the data’s intended endpoint and how the attack was executed.
Integrated Data Theft Defenses – Industry-leading integrated data theft defenses (optional) detect and intercept data theft attempts and provide regulatory compliance for data loss prevention (DLP).
Integrated Sandboxing – Learn how to better protect your company’s assets through automatic analyzing of malware behavior with the integrated sandbox service.
Cloud Application Discovery, Monitoring and Control – Discover cloud applications being used within your organization and prevent users from jeopardizing your data by sending to unsanctioned cloud applications and services.
STOP APT AND OTHER ADVANCED TARGETED THREATS Forcepoint’s Advanced Classi cation Engine (ACE) is at the heart of all Forcepoint solutions
SECURE SENSITIVE DATA AGAINST EXTERNAL ATTACKS AND INSIDER THREATS To prepare for a malicious insider threat or the potentially successful cyberattack, it’s vital that outbound communications be monitored.
SAFELY ADOPT CLOUD TECHNOLOGIES LIKE OFFICE 365 AND BOX ENTERPRISE WHILE SUPPORTING A MOBILE WORKFORCE IT departments are strained to maintain current systems while supporting an increasingly mobile workforce and the demands to adopt new technologies like Office 365.
IDENTIFY ”HIGH-RISK” USER BEHAVIOR AND EDUCATE USERS TO IMPROVE AWARENESS The rich data collections in Forcepoint Email Security are used by a number of policies to report and identify systems that may require special IT attention.
GDPR – Specialized consulting and implementation solutions
Did you know that:
Name, First name
Personal identification code
Series and number of identity book and passport
Banking biometry data
Data regarding the health status of a person
ARE PERSONAL DATA?
Be aware and avoid fines up to 20 MILLION EURO or 4% of the annual worldwide turnover of the preceding financial year whichever is greater and comply with the General Data Protection Regulation regarding the processing and free circulation of these data.
Are you ready for GDPR?
There are only:
remaining until 25 Mai 2018.
Although many companies have already embarked on certain privacy practices and procedures, the GDPR contains a number of new protections for targeted individuals in the EU and threatens to apply significant fines and penalties to data controllers and processors who will not meet the requirements from the moment in which they will come into force.
Maintaining compliance with General Data Protection Regulation at company level is a complex effort that begins with the identification of sensitive data, location, access and protection of it.
Take the first step towards compliance!
Call PowerNet’s specialists to get more information about Security solutions and services that comply with GDPR.