White Paper: A practical Guide for GDPR Compliance

The General Data Protection Regulation (GDPR) has been approved by the European Union and, once it comes into force in May 2018, will give data subjects significant new rights over how their personal data is collected, processed, and transferred by data controllers and processors. It demands significant data protection safeguards to be implemented by organizations. The time to get ready is now, as the consequences of getting it wrong are significant.

GDPR is coming fast, it almost certainly applies to your organization, and the consequences of getting it wrong are severe.

Continue reading “White Paper: A practical Guide for GDPR Compliance”

Facebooktwittergoogle_plusredditpinterestlinkedinmailby feather

GDPR Watch – Auditing Data Access

To satisfy the GDPR companies will need to track who had access to personal data, when, and why.

Access is controlled by Identity Management authorisations and access control, but the actual access to the data should be logged. Automatic Audit logging tracks user activities for any and all file events and enables extranal audit and/or subject access requests to be satisfied easily and effectively.

Continue reading “GDPR Watch – Auditing Data Access”

Facebooktwittergoogle_plusredditpinterestlinkedinmailby feather

How to discover PII Data on any local or remote Storage

A number of compliance standards hinge on identifying and protecting Personal Information.  This Personal Information can take many forms including Personal Health Information (PHI), Personally Identifiable Information (PII), and Sensitive Personal Information (SPI).

The General Data Protection Regulation (GDPR), coming into effect May of 2018, is the newest compliance standard sweeping the industry.  However existing compliance standards such as HIPPA , GLBA and FERPA all require strict controls of personal data. Fines for violating compliance skyrocket with GDPR, so how should Enterprises find and classify existing PII data?

Introducing the PII Scanning and Detection engine for the Enterprise File Fabric…

Continue reading “How to discover PII Data on any local or remote Storage”

Facebooktwittergoogle_plusredditpinterestlinkedinmailby feather

Webinar: Military Grade Cloud Storage Security for Enterprises and Service Providers

Join us for a webinar and live demonstration of a highly secure low-cost storage solution from Leonovus with file collaboration and end to end governance powered by Storage Made Easy.

First, we’ll see how Leonovus 3.0 software-defined object storage uses military grade tactics for securing highly distributed systems along with home-grown patented algorithms that virtualize and slice data across a network of on-premises, hybrid or multi-cloud storage nodes. Then we’ll look at how File Fabric™ from Storage Made Easy™ complements this secure storage infrastructure.

Continue reading “Webinar: Military Grade Cloud Storage Security for Enterprises and Service Providers”

Facebooktwittergoogle_plusredditpinterestlinkedinmailby feather