Preparing for the GDPR · (DLP) and digital rights management (DRM) with file activity monitoring,...

6
Preparing for the GDPR Data Security and the European General Data Protection Regulation (GDPR). A best practice guide to helping you protect data on endpoints. This document is purely for general guidance purposes and does not constitute legal advice or legal analysis. Click Here

Transcript of Preparing for the GDPR · (DLP) and digital rights management (DRM) with file activity monitoring,...

Page 1: Preparing for the GDPR · (DLP) and digital rights management (DRM) with file activity monitoring, data visualisation andreporting all in one integrated package. Dell Endpoint Security

Preparing for the GDPRData Security and the European General Data Protection Regulation (GDPR).A best practice guide to helping you protect data on endpoints.

This document is purely for general guidance purposes and does not constitute legal advice or legal analysis.

Click Here ›

Page 2: Preparing for the GDPR · (DLP) and digital rights management (DRM) with file activity monitoring, data visualisation andreporting all in one integrated package. Dell Endpoint Security

Home

Why endpoint data protection is vital

Three proactive steps to improve data security

How can Dell help?

Better security is better business

Find out more

An introduction to the GDPR

Under GDPR, it is important that an organisation implements appropriate technical security measures, such as, encryption of personal data.

GDPR views data pseudonymisation and data encryption as necessary technical measures for the protection of personal data.

An introduction to the GDPR

The new European privacy law1, the EU General Data Protection Regulation (GDPR), enshrines data control and privacy as a fundamental human right for EU citizens and residents.

Coming into effect on May 25, 2018, the driving principle of the GDPR is that any data that specifically relates to a person belongs to that person and not to the organisation creating, holding or processing it.

The EU is ensuring that this law is taken seriously, with financial implications for companies that violate the rules and fines of up to €20 million, or 4% of total annual revenue.

The regulation builds on the previous legislation: but provides more protections for consumers, and more privacy considerations for organisations. It puts an onus on businesses to change their mindset on data protection.

1 http://ec.europa.eu/justice/data-protection/reform/index_en.htm

Page 3: Preparing for the GDPR · (DLP) and digital rights management (DRM) with file activity monitoring, data visualisation andreporting all in one integrated package. Dell Endpoint Security

An introduction to the GDPR

Home

How can Dell help?

Better security is better business

Find out more

Three proactive steps to improve data security

Why endpoint data protection is vital

Why endpoint data protection is vital

The end-user is the most vulnerable part of the security chain – we are curious, we want to collaborate and we want to communicate. We also click on links and attachments in emails, go to infected websites, upload data to cloud sync and share services, send data to the wrong person or location and forget laptops and phones at airports and in coffee shops. We call this vulnerability ‘human error’.

Three proactive steps to improve data security

While complying to GDPR regulations can be challenging, some measures can be implemented quickly and easily to help build the foundation for a data protection strategy.

1. Protect data at restData at rest is often considered by attackers to be the most valuable, so data on your desktops, laptops and file servers should be encrypted.

2. Protect data in motionEnabling collaboration between co-workers, users, vendors and partners, demands data sharing and transfer of data outside of protected business applications and systems. Deploying solutions like Data Loss Prevention (DLP) and Digital Rights Management (DRM) allows employees to share sensitive data safely outside your company’s walls, with intended recipients.

3. Prevent data breachesImplementing next-generation anti-malware solutions that can detect and stop advance persistent threats on your endpoints reduces the chances of a data breach and mitigates risk.

95%1

of data breaches originate at the endpoint

45%2

of corporate data is stored on the endpoint

1 million new malware variants appear every day3

Sources: 1 Data Breach Investigations Report 2016 2 The Datastrophe Study 3 CNN Tech http://money.cnn.com/2015/04/14/technology/security/cyber-attack-hacks-security/index.html

Page 4: Preparing for the GDPR · (DLP) and digital rights management (DRM) with file activity monitoring, data visualisation andreporting all in one integrated package. Dell Endpoint Security

An introduction to the GDPR

Home

Why endpoint data protection is vital

Three proactive steps to improve data security

Better security is better business

Find out more

How can Dell help?

How can Dell help?

Dell is the only hardware vendor offering endpoints with factory-installed encryption licenses. Embedding encryption into all endpoints demonstrates a commitment to compliance, creates competitive advantage and provides a simple, effective and efficient way of to support you with your GDPR technical data security compliance initiatives.

The Dell range of security solutions includes:

Dell Encryption Enterprise – data centric encryption solution that takes a unique, layered, multi-key approach to encryption that applies different encryption keys for different users and data types, ensuring that only the right person can access sensitive information, even on multi-user systems. The solution enables automated patch management and system maintenance while end-users work as normal, with data that stays secure on a variety of devices and external media.

Dell Data Guardian – protects data, controls data access, gives visibility of data usage and reduces infrastructure complexity. The solution combines encryption, data loss prevention (DLP) and digital rights management (DRM) with file activity monitoring, data visualisation andreporting all in one integrated package.

Dell Endpoint Security Suite Enterprise and Dell Threat Defense - leading-edge, advanced threat prevention solutions using artificial intelligence and machine learning technology that prevents malware from executing before it can do any damage.

Dell Endpoint Security Suite Enterprise – stops evolving attacks, simplifies endpoint security and exceeds compliance requirements with a combination of enterprise class encryption and advanced threat prevention in an integrated suite with single pane of glass on-premise management.

Dell Threat Defense – aimed at small and medium businesses requiring an effective advanced threat prevention solution, easy set-up without a dedicated IT department, easy deployment and central management, with subscription-based pricing.

Dell Mozy – a cloud based secure backup and restore solution with a centralised console and easy deployment. Mozy utilises the most comprehensive security and privacy measures and encrypts your data before it leaves your machine, during the transfer process and while at rest in the data centre.

In recent years there have been numerous incidents where personal data has been stolen, lost or subject to unauthorised access. In many of these cases, these were caused by data being inadequately protected or the devices the data was stored on being left in inappropriate places – and in some cases both. The Information Commissioner has formed the view that in future, where such losses occur and where encryption software has not been used to protect the data, regulatory action may be pursued.

Source: ICO

See more at Dell.com/datasecurity ›

Page 5: Preparing for the GDPR · (DLP) and digital rights management (DRM) with file activity monitoring, data visualisation andreporting all in one integrated package. Dell Endpoint Security

An introduction to the GDPR

Home

Why endpoint data protection is vital

Three proactive steps to improve data security

How can Dell help?

Find out more

Better security is better business

Better security is better business

Dell security solutions protect and support businesses, delivering:

• Security transformation, by stopping external threats and by protecting data, no matter where it might reside or roam, and by building security into the hardware itself.

• Artificial intelligence capabilities that allow evaluation of an executable in a fraction of a second, to distinguish between good or bad applications and prevent execution.

• Technologies that allow end-users to be productive and collaborative, while providing a much richer level of protection against external threats.

• Encryption that is not aligned to the device but to the end-users themselves, protecting data across its entire lifecycle, not just when it is at rest.

Data Protection is an opportunity to be seized

“The GDPR gives regulators greater enforcement powers. If an organisation can’t demonstrate that good data protection is a cornerstone of their business policy and practices, they’re leaving themselves open to enforcement action that can damage their public reputation and their financial bottom line. But I think it would be short-sighted to view data protection solely as a risk to be mitigated and the ICO as a regulator not to fall foul of. Instead I urge you to view data protection as an opportunity to be seized. Seized by companies looking to build a level of trust with their customers that helps deliver competitive advantage. Get data protection right, and you can see a real business benefit.”

Rob Luke ICO Deputy Commissioner

Source: https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2017/03/isba/

Page 6: Preparing for the GDPR · (DLP) and digital rights management (DRM) with file activity monitoring, data visualisation andreporting all in one integrated package. Dell Endpoint Security

An introduction to the GDPR

Home

Why endpoint data protection is vital

Three proactive steps to improve data security

How can Dell help?

Better security is better business

Find out more

Find out more

Get in better shape for GDPR with DellView the Video ›

Dell’s Commitment to compliance with the GDPRView the Infosheet ›

Download key data sheetsDell Encryption Enterprise ›Dell MozyPro ›Dell Endpoint Security Suite Enterprise ›Dell Data Guardian ›Dell Threat Defense ›

Download the Dell security and GDPR white paper ›

View the GDPR infographic ›

View solution videosDell Data Guardian ›Dell Endpoint Security Suite Enterprise ›

Contact Us ›

Learn More at Datasecurity.dell.com ›

© 2017 Dell, Inc. ALL RIGHTS RESERVED.

Dell Corporation Limited. Registered in England. Reg. No. 02081369 Dell House, The Boulevard, Cain Road, Bracknell, Berkshire, RG12 1LF. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose without the written permission of Dell, Inc. (“Dell”). Dell, the Dell logo and products — as identified in this document — are registered trademarks of Dell, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners. This document is for informational purposes only, and may contain typographical errors and technical inaccuracies. The content is provided as is, without express or implied warranties of any kind. The contents are not intended – and under no circumstances may be used or relied upon – as legal advice. If you have any questions about your organisation’s legal or regulatory requirements, please consult with an attorney.