EgoSecure & GDPR

EgoSecure for GDPR Data Compliance
Contact us for more information, a demo, or a trial …

The General Data Protection Regulation (GDPR), will apply in the United Kingdom from 25 May 2018.The government has confirmed that the UK’s decision to leave the EU will not affect the commencement of the GDPR  – be ready with EgoSecure.

Articles 5, 25 & 32 of GDPR – Principles relating to processing of personal data: EgoSecure Access Control and Application Control makes sure that no one can get unauthorised access to applications, devices or specific file types
Article 32 of GDPR
 – Prevent attacks with data encryption: EgoSecure protects your data storage devices by implementing Cloud Encryption, Device Encryption, Folder Encryption, HDD Encryption, Mail Encryption, Network Folder Encryption, etc…
Article 34 of GDPR – Monitoring of unencrypted data breaches: EgoSecure monitors data transfer using the Audit function. A report of unencrypted file transfers is predefined within the platform.
Article 32 and 25 GDPR – Privileged user access control: EgoSecure Access Control and Application Control ensures that no-one can get unauthorised access to applications, devices or defined file types.
Article 30 and 33 of GDPR – Audit data and monitoring: EgoSecure Audit and Insight modules monitor data transfers in real time. Identifying specific behaviors and automatically sending alerts to your designated authority.

EgoSecure Data Protection is a complete solution to fulfill the requirements of GDPR by monitoring and securing data at your organisations endpoints, and providing full configuration, control and reporting.

EgoSecure and GDPR compliance

EgoSecure is entirely configurable allowing you to implement only the modules you need.

INTELLACT
Analyses information from Insight and automatically activates protective measures based on pre-defined rules. It can make comparisons with benchmarks, automatically detecting anomalies and critical situations triggering the appropriate, automated response to protect your data.

CORPORATE ANALYSIS
INSIGHT ANALYSIS
To make sure that protective measures are implemented optimally, the INSIGHT module first determines each user’s overall safety situation in the corporate network. The results of this analysis are processed according to management requirements and the results displayed in easy to interpret graphs and tables highlighting potential security issues. INSIGHT provides the facts providing an overall picture of your data security.

INSIGHT AUDIT
Audit makes the data flow visible in detail, showing potential weaknesses in security settings. It allows the determination of forensic information. The ability to generate this information is an important contribution to IT compliance and complies with laws and industry regulations.

ACCESS CONTROL
DEVICE MANAGEMENT
Device management allows a clear definition of who can use which devices (e.g. USB sticks, CDs, TV tuner) or interfaces (e.g. WLAN, Firewire, USB) and to what extent. Preconfigure rules ensure access to these devices is not abused and there is no risk of data loss or leakage. It also prevents malware attacking the corporate network via these interfaces. Device Management offers effective protection against “attackers from inside”.

CLOUD ACCESS CONTROL
The use of the cloud has many advantages as data can be accessed from anywhere. Sensitive data should not be saved in the cloud and some data types may not even be allowed by law to be saved. Cloud Access Control governs which employee is authorised to use which cloud services and to what extent.

CONNECTION ACCESS CONTROL
Data transfers are possible through many channels – Bluetooth, WiFi, modem, etc. With the EgoSecure solution you can take control via which routes data leaves the company. Connection Access Control manages which employees have access to which data transmission devices.

CONTENT ANALYSIS & FILTER
Analysing content, and filtering secret information from data that leaves the company, as well as blocking unacceptable information within incoming data are also components of an integrated, overall security concept. Content Analysis & Filter provides granular and reliable protection for corporate data communications without affecting users workflows and desired data transfers.

ANTIVIRUS
An antivirus solution provides proven protection against anonymous attackers from the Internet. It is important to ensure a high detection rate to be able to respond very quickly to new viruses and Trojans. EGOSECURE DATA PROTECTION provides an integrated antivirus solution utilising one of the leading solutions in the market.

APPLICATION CONTROL
Application Control defines which user is allowed to start which programs and can be configured to prevent games or unlicensed software products being used and avoiding liability risks and economic damage. It is also possible to block many viruses before antivirus solutions have detected them.

ENCRYPTION
REMOVABLE DEVICE ENCRYPTION
Mobile data media such as USB sticks get increasingly smaller and powerful. Unfortunately this means there is a greater risk of them being lost or stolen. Removable Device Encryption ensures that the data cannot be used by unauthorized parties. Password-based encryption and decryption can be performed on any Windows computer, with full transparency for authorized users. Encryption is file-based, multiple types of encryption is available and can be used simultaneously on one medium.

FULL DISK ENCRYPTION
Full Disk Encryption provides comprehensive protection of all devices and encrypts the complete hard disk or partitions at the sector level. The solution also provides on-demand pre-boot authentication to authenticate users before the operating system is started. Automatic detection of new hard disks in the integrated encryption chip, lightning-fast initial encryption and the centralized management ensure the seamless integration with existing IT infrastructures.

PRE-BOOT AUTHENTICATION
Pre-Boot Authentication ensures that registration at Windows and related encryptions, such as the disk encryption, cannot be manipulated and circumvented by converting the hard drives, starting of USB / CD or the replacement of the operating system. The registration to the corresponding terminal will thereby take place immediately after the BIOS loading process, but before the start of the operating system. Besides passwords also many smart cards are supported as login security. Enterprise features such as help desk, self-initialization and more, are also available. Login screens can be customized for each customer.

FOLDER ENCRYPTION
Folder Encryption protects data on lost notebooks or hard drives and also individually defined sensitive data on systems that can be accessed by several users. For instance, highly sensitive management data can be protected against access by employees with special privileges, such as IT staff.

CLOUD/NETWORK ENCRYPTION
Cloud and Network Encryption can be used to encrypt folders in the cloud or on any network. Encryption keys remain within the company and are never stored in the cloud – a clear advantage over encryption solutions provided by cloud storage providers themselves.

PERMANENT ENCRYPTION
Permanent Encryption encrypts files, no matter on which data carriers they are stored. These encrypted data packets also remain encrypted during the transfer to other data carriers. Thus, an encrypted file can be copied into an e-mail attachment or uploaded to a web-based cloud while being permanently encrypted. On external computers and mobile devices, the file can be opened by entering a password or by using a PKI token.

ANDROID/IOS ENCRYPTION
The transparent “on-the-fly“ encryption for iOS and Android devices offers file-based protection on internal storages and memory cards and cloud accounts of mobile devices via app. Files are decrypted by entering a password.

MAIL ENCRYPTION
Mail Encryption ensures the safe exchange of e-mails; no software needs to be installed for this purpose on the receiving or transmitting system. Encrypted e-mails with an electronic signature can be sent and read within the user‘s familiar environment. It is also easy to encrypt and transport very large e-mails.

MANAGEMENT
MOBILE DEVICE MANAGEMENT
The increasing degree of adoption of mobile devices such as tablets or smartphones must also be reflected in corporate security architectures. Mobile Device Management ensures the intelligent integration of mobile devices, including support of Android and iOS operating systems.

INVENTORY
INVENTORY reports which hardware and software products are installed on client computers in the corporate network. Functionality in INVENTORY allows you to monitor and analyse changes, and send alerts if something changes. Hardware status can also be displayed and reliably indicate any potential problems.

PASSWORD MANAGER
Employees no longer have to write down their passwords and logins on Post-It’s or in files – this task is now taken over by the secure Password Manager.

SECURE ERASE
Secure Erase ensures deleted files cannot be restored, no matter if they are located on the internal hard disk or on an external storage medium. Users can choose among multiple deletion methods with the option to securely delete documents immediately or to destroy all deleted files irrevocably based on a specific schedule.

GREEN-IT
Intelligent power management ensures efficient device operations by only consuming energy when the computer is actually used. Green-IT helps reduce IT operational costs while also contributing to the company’s environmental balance and ensuring a fast ROI for the EGOSECURE DATA PROTECTION implementation.

Contact us for more information ...