GDPR Consultancy

Aligning your company to GDPR involves the following approach:

  • Phase 1, which includes: analysis of the existing situation and mapping of personal tiles and existing processes.
    Basically, after completing this phase, you have all the information in order to be able to continue on its own the implementation of the GDPR accession measures.
  • Phase 2, which includes support for the implementation of the proposed measures in internal processes and documents, the adaptation of documents / procedures / contracts, including support for implementing solutions to ease work after May 25, 2018.

Thus, the assessment of the current situation as well as the understanding of the specifics of the business, of the processed personal data categories and of the main processes will be made by:

  • Analyze public data
  • Discussions with management
  • Completing an assessment questionnaire by those responsible
  • Studying the provided documents (on request)
  • Agreeing results with management

It will then be used to identify the personal data used (both from the subjects and from other sources or products of the company) – on business areas – as well as to identify the means of processing and storing information:

  • Analysis of questionnaire responses,
  • Delivering on-demand information (process documents, contracts, or sample data)
  • For high generalized domains (HR, accounting, video security, GPS …), starting with a standard set of existing data, only the differences are analyzed) – for a minimum effort

The next step will be to identify and map the processing goals (by data types), the length of the processing, the roles involved, and the third parties that have access to the data.

Analysis of risks and gaps is done by identifying gaps and proposing alternatives. For each non-compliance with GDPR requirements, we will analyze:

  • the risk (in terms of impact on the subjects, but also on the business),
  • alternatives will be presented,
  • an estimate of deployment costs will be made

Finally, a proposal for missing procedures / procedures will be made, and for areas not previously addressed, a set of new processes and procedures will be proposed.

**** The proposed processes and procedures will require some further customization, depending on the implementation possibilities, or will contain a set of new requirements that will need to be included in internal documents or contracts with third parties.

Portfolio Categories:

GDPR Solutions 


DLP & Mobil Device management – Endpointprotector
Endpointprotector Manage:

  • Data Leakage / Data Loss / Data Theft
  • Uncontrolled use of devices
  • Mobile Device Management
  • Regulatory Non-Compliance
  • Low Productivity

With Endpoint Protector being offered as hardware or virtual appliance, it can be setup in minutes. Moreover, the responsive management interface allows managing policies and checking reports from any device, from desktop to tablet.
Endpoint Protector dramatically reduces the risks posed by internal threats that could lead to data being leaked, stolen, or otherwise compromised. In addition to these, compliance with various rules and regulations is also met.

The blacklist and whitelist-based approach grants exibility in policy building. Organizations have the option to prohibit the use of speci c removable devices and data transfers to le cloud sharing applications and other online services, to scan for certain PIIs, but to allow transfers to speci c URLs and domain names for certain computers/users/groups, avoiding task interruption.

Suitable for any type of network, our products can be used by enterprise customers, small and medium business and even home users. With a client-server architecture, they are easy to deploy and centrally manage from the web-based interface. Besides the Hardware and Virtual Appliance, Amazon Web Services Instance and Cloud version, a Stand-alone version is also available for those looking for basic features.

Endpoint Protector

Portfolio Categories:

GDPR Solutions 


Camouflage Data Masking – Imperva

Camouflage Data Masking Benefits:

  • Use production data safely and freely in non-production environments, such as testing/ QA, application development, training, and outsourcing.
  • Gain visibility into where and what sensitive data is
  • Enable data-driven business processes without exposing sensitive data
  • Deploy an enterprise scalable data masking process
  • Comply with data privacy and protection regulations such as PCI, HIPAA, GDPR

 

Portfolio Categories:

GDPR Solutions