Prevention, Detection, and Response
for attacks, whether or not they use malware, and advanced threats.
The GDPR (General Data Protection Regulation) will imply a change in the way that personal data is handled by organizations, reflecting on how data is collected and checking that it is being efficiently protected.
The new legislation simplifies the regulatory environment for companies doing business in and with the European Union, creating a common framework that sets an extra security barrier to protect the main asset of companies: data.
Likewise, the GDPR will require that businesses reinforce their control of personal data.
“Data volume is set to grow 800% over the next 5 years and 80% of it will reside as unstructured data.”
The legislation will be applicable beginning May 25, 2018. It will affect any company that handles the personal data of natural persons belonging to the EU
Businesses will be required to notify the authorities about any security incident involving personal data. And they will have just 72 hours to do so from the moment the incident is discovered
Up to 20,000,000 euros in fines for non-compliance with the regulation, as well as implicationsº such as: loss of client trust, negative publicity, reputational damages, or cease of business operations
A Data Protection Officer in charge of consulting on and supervising GDPR compliance will be a requirement
for companies to comply with the GDPR
The GDPR affects any organization that stores and handles the data of citizens of the European Union, even if they do not have physical presence in Europe.
New requirements that will affect the way data protection figures in your IT processes. Naming a Data Protection Officer.
Requirement to notify the authorities about any security incident involving personal data within 72 hours after the company becomes aware of the personal data violation.
The GDPR requires greater transparency. Users will be able to request the erasure of their data (“the right to be forgotten”), and will have the right to data portability, the right to access, and the right to be notified of any data violation, among other rights.
Managing and disclosing personal data while having to control for and inform on where it can be found, how it is collected and stored, and who can access it.
Managing identities and accesses, following applicable identity policies that are transparent and documented, as well as tools that allow for authorization and authentication to guarantee security.
Non-compliance could lead to fines of up to 20 million euros, or 4% of the company’s annual turnover.
A guide on compliance with security regulations with Panda Adaptive Defense
Panda Adaptive Defense + Data Control will help you to comply with the GDPR
Our cyber-intelligence platform categorizes and correlates all data obtained on cyber-threats in order to carry out Prevention, Detection, Response, and Remediation tasks, combined with reduction services.
Panda Adaptive Defense
Panda Adaptive Defense can help with GDPR* compliance, guaranteeing security and data monitoring.
Prevention, Detection, and Response
Classification of 100% of Processes
99.98% via Machine Learning, and 0.02% by Panda’s analysts.
Real-time Historical Visibility
of all endpoints on the corporate network.
Threat Hunting - Forensic Analysis
Spearheaded by experts at Panda and our MSSPs.
Panda Data Control offers visibility and supervision of unstructured personal data in real time and in a single solution, with only one agent and from the same platform. It helps to avoid uncontrolled access to personal data, as well as sensitive corporate data, and aides in compliance with the GDPR*.
Discover and audit
Identifies users, employees or collaborators, devices, or servers in your company with access to Personally Identifiable Information (PII).
Monitor and detect
Implements proactive measures for access and operation involving PII with the help of reporting tools and alerts, in real time, on leaks, use, and suspicious unauthorized transit.
Its activation is immediate and managed directly from the same Cloud platform.
Control of Personal Data
Demonstrate to management, to the DPO, and to the rest of your organization’s employees that the company has complete control over the PII located on its devices.
*Art. 32, 33, 35 and 39 of GDPR