GDPR Essentials

Description

This video offers a brief overview of what GDPR (General Data Protection Regulation) is and how it translates into actual measures for companies. Find out what type of data GDPR was designed to protect, who it applies to, what the first steps you should take to ensure compliance are and how Data Loss Prevention can help you realize them.

Transcript

Hello, My name is Cristina and today will speak about GDPR Essentials.

DEU (General Data Protection Regulation) or GDPR for short is a regulation that is meant to strengthen and unify data protection for EU citizens. It is the most important change in data privacy regulation in Europe in the last 20 years making it a big statement about individuals’ private data. Contrary to many people believe, GDPR does not apply only to European-based companies. It also applies to EU and non-EU companies that collect and process European citizens' data.

But, how is the GDPR translate into actual measures for your organization? First of all, a company wild awareness campaign should be performed so decision-makers and other team players know what their next step should be. Use meetings, newsletters, or workshops to educate your employees. Secondly, don`t wait until the last minute to actually make the necessary changes. Start an audit immediately to identify what Personal Identifiable Information you collect and process, where it came from, where resides and who you share it with and you will get a clear image of your vulnerabilities. In all your actions make sure European citizens' private data is protected against loss, leakage or corruption, and that you are able to prove that consent has been obtained for that data. You must also be able to provide a copy of people`s private records in electronic format and delete their records upon request. Keep in mind that the GDPR only states that data privacy should be ensured with no specifics about the platform whether Windows, macOS or Linux and so on. Or the exit channels: email, file crowd sharing or removable devices and alike.

Therefore, for any data security tool, you choose to implement make sure it covers your entire infrastructure or endpoints: mobile devices and exit points. Solutions that tackle data loss prevention, data classification, encryption or mobile device management can help you restrict the transfer of private data and encrypt or delete it in case of device loss or theft, ensuring that no third party can access it. But take into account that in the end technology represents just a small part of why GDPR compliance entails. Read more details about GDPR in our whitepaper or check out our infographic for a brief overview, and if you are ready to start your journey to compliance check yo see how our solution can help you. You can find details in the video description.

Thank you for watching and see you next time.

Other data security videos

How eDiscovery Works?

eDiscovery scans and identifies the confidential information in organizations’ endpoints and allows Administrators to take remediation actions like encrypting or deleting data at rest. It…

How Enforced Encryption Works?

Enforced Encryption allows IT Administrators to extend their Device Control policy and make sure all confidential data transferred to USB storage devices is automatically encrypted.…

How Content Aware Protection Works?

Content-aware data loss prevention is a data loss-prevention measure that involves awareness of the context or content that is being protected. This module enables the…

How Device Control Works?

See how you can lockdown, control and monitor USB and peripheral ports to stop data theft and data loss. Our Device Control protects against data…

GDPR Essentials

This video offers a brief overview of what GDPR (General Data Protection Regulation) is and how it translates into actual measures for companies. Find out…

How Endpoint Protector DLP can secure your data on Linux endpoints

See how you can setup Data Loss Prevention policies on Linux endpoints, what exit points Endpoint Protector covers, and what type of sensitive data it…

How to use USB Enforced Encryption from Endpoint Protector DLP suite

The cross-platform USB Flash Enforced Encryption is the module within Endpoint Protector Data Loss Prevention that boosts the security of data copied on USB storage…

Setup a Content Aware Protection (CAP) Policy in Endpoint Protector

Learn how to setup a Content Aware Protection Policy in Endpoint Protector. Prevent confidential information from leaving the endpoint through USB and peripheral ports, printers,…

How to set up rights in Endpoint Protector

In this tutorial, we walk you through and show you how to set up rights in Endpoint Protector. Get a quick insight into Device Rights,…

How to use the Offline Temporary Password (OTP) feature in Endpoint Protector

Learn how to authorize the use of blocked devices (USB Flash Drives, CD/DVD, external HDDs, etc.) with the Offline Temporary Password (OTP) feature when computers…

Mobile Device Management (MDM) for iOS and Android with Endpoint Protector

Secure your mobile iOS and Android devices with Endpoint Protector Mobile Device Management (MDM) and keep a close eye on where devices are going with…

Content Aware Protection to prevent sensitive data leakage through all possible exit points

Content Aware Protection is a module in Endpoint Protector that offers detailed control over sensitive data leaving the company's network.

Endpoint Protector Virtual Appliance for Device Control and DLP

Our virtual appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices.

Endpoint Protector Hardware Appliance for Device Control

Our appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices.

Endpoint Protector for Device Control explained in plain English

With Endpoint Protector you have full control, manageability and transparency of what is happening with USB and peripheral ports on your Windows, Macs, and Linux computers.

Device Control, USB Lockdown, and Control for Mac OS X

Controlling the use of USB, FireWire, Thunderbolt, SD Card Reader, Bluetooth, etc on your Mac is vital to protect your data.

Endpoint Protector Basic - Data Protection for Small Offices or Home Use

Manage and control the use of portable devices with Endpoint Protector Basic, the perfect stand-alone solution for Windows and Mac.

EasyLock - Cross-platform encryption for Windows, Mac OS X, and Linux

Strong military-grade encryption algorithms and an intuitive drag and drop interface, helping anyone turn any portable storage device into a data safe.

My Endpoint Protector explained in plain English - DLP | MDM

Manage portable storage devices, control what data is leaving your network through emails, messengers and other cloud applications and even manage the mobile device fleet.…