GDRP - Compliance - eXploit-Hunter

PDF Version

The European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. This is a reform of the old law, standardizing protections for personal information across the EU. Organisations will have to take measures to comply, or otherwise be subject to sanctions by the EU. This is another victory for the average consumer anywhere in the world, because any organisation dealing with an international audience will have to comply with the EU law. For all of us, whether you live in the EU or not, we can sleep better at night knowing that our personal information is a lot safer. There are also cost savings and red tape reductions for businesses to enjoy, with some benefits applying in particular to small/medium enterprises (SMEs).

Who does this apply to?

The law applies to all organisations that collect and manage the personal information of EU citizens, and also any organisation based in the EU, even if they do not deal with EU citizens. This includes any website that would be viewed by someone living in the EU, which would mean basically all public websites.

What does the law change for consumers?

  1. Organisations will have to make it clear to you how your data is processed;
    b. It will be easy to transfer your personal data between service providers;
    c. You have the right to be 'forgotten' – organisations are required to delete your data when you no longer want it to be processed, provided that there are no legitimate grounds for retaining it;
    d. You have the right to know when your data has been hacked – organisations must notify the national supervisory authority of serious data breaches as soon as possible so that users can take appropriate measures.

What does the law change for organisations/businesses?

  1. There is only one set of EU rules now that needs to be complied with;
    b. Organisations/businesses will only have to deal with one single supervisory authority (saving an estimated £2 billion per year);
    c. Increased penalties for non-compliance – from the previous upper limit of £500,000, penalties have increased to £17.7 million or 4% of annual global turnover – whichever is higher.

Introduction of the ultimate solutions

With Endpoint Encryption, you can meet your data security compliance obligations with a single MSI package. Full disk and removable media encryption keeps your data safe on the road. File, folder and email encryption keeps any collaboration across your established workgroups and teams secure; with your security policy enforced at all endpoints by the Endpoint Encryption Enterprise Server.

Manage users and workstations together or independently with the Endpoint Encryption Enterprise server. Keep your most high-risk endpoints under close control at all times: activation and changes to security policy, software feature-set, encryption keys and endpoint status are all handled securely through the cloud to simplify control. Endpoint Encryption offers full control wherever your users are allowing employees to work from home or on the move whilst enjoying the full protection of Endpoint Encryption.

Endpoint Encryption Mobile is now available for iOS and compliments the full Windows products perfectly. Create, read and reply to encrypted email messages and attachments on your iPhone, iPod, or iPad. Fully compatible with Endpoint Encryption central management.

Product Features Include:

  • Full Disk Encryption keeps you entire HDD encrypted with pre-boot security, with full remote management. Only available with Endpoint Encryption Pro.
  • Removable Media Encryption enables you to protect removable media with full or file encryption. Only available with Endpoint Encryption Standard and Pro.
  • Endpoint Encryption Go Portable Encryption is an on-device application that runs straight from a USB stick which, with the correct passwords, allows user to edit, read and write encrypted documents on any PC. Only available on Endpoint Encryption Standard and Pro.
  • File and Folder Encryption ensuring that your teams and workgroups can collaborate securely.
  • Mail Encryption ensures that only its intended recipient reads your email.
  • Text and Clipboard Encryption ensures that sensitive information can't be read from the clipboard.
  • Virtual Disks and Compressed Archives ensure that information sent on CD/DVD's or via an FTP server is secure.
  • Encryption Key Management allows you to add or remove encryption keys with ease, without affecting the user..
  • Centralised Management helps you manage every endpoint user and workstation from a single centralised hub.
  • Enterprise Server Proxy can act as an intermediary ensuring that all connections from the client and server are outgoing.

ESET Endpoint Encryption Mobile for iOS, offers Email, Text and attachment encryption and is fully compatible with central administration.

Closing questions

  • How much client data do you hold?
  • How much are these clients worth to you?
  • How much is your company and your reputation worth?

Contact us now to get your organisation kick started on GDPR. eXploit Hunter brings you this solutoin in collaboration with our partner ESET.

Telephone: +44(0)333 360 1337

E-mail Info@exploit-hunter.com

Download the offline Case Study for more detail here.



SHARE THIS
Previous Post
Next Post