Complying with the

Act 2018.

Defend your network from data breaches, and ensure your customers' personal information remains secure.

In this CCPA handbook, you'll learn about:

  • The impact the CCPA will have on both consumers and businesses.
  • The rights of consumers under the CCPA.
  • The penalties and fines applicable for organizations that do not comply.
  • The measures organizations need to take to comply with the CCPA.
  • Please enter your business email
  • By clicking 'Download ebook', you agree to processing of personal data according to the Privacy Policy.

On January 1, 2020,

the California Consumer Privacy Act (CCPA) will come into effect. This regulation stresses several action points that organizations need to take to defend themselves from data breaches and protect their consumers from identity theft.

The CCPA will require organizations to develop clear privacy notices for consumers, grant consumers' requests to be forgotten, and give them the right to opt in or opt out of the sale of personal information.

The CCPA puts the consumer in control of their personal data. In addition to this, it requires organizations to prove that they have the right data protection security controls in place to avoid liability in case of a data breach.

How Log360 can help you comply with the CCPA.

Log360 is a one-stop solution for all your log management and network security needs. You'll be able to audit Active Directory changes, network device logs, Microsoft Exchange Server, Microsoft Exchange Online, Azure Active Directory, and your public cloud infrastructure all from a single console to gain complete control over your network.

With Log360, you can:

  • Collect and analyze logs from multiple sources.
  • Correlate different logs to understand how certain events unfolded.
  • Monitor application servers including IIS web servers, Microsoft SQL servers, and Oracle databases.
  • Audit network devices like firewalls, routers, and switches.
  • Keep track of all NTFS permission changes on files.
  • Receive instant alerts upon suspicious folder access.
  • Keep a comprehensive audit trail of every modification to file shares.
  • View actionable reports on every change in Active Directory and permission escalations.