Support
 
Support Get Quote
 
 
 
 

Comply with the CCPA using EventLog Analyzer.

 
CCPA Overview

EventLog Analyzer is trusted by over
10000 customers

           

CCPA compliance made easy with EventLog Analyzer

The California Consumer Privacy Act (CCPA) is designed to give California residents more control over their personal information and to hold businesses accountable for protecting that information.

EventLog Analyzer can help businesses manage their CCPA compliance by providing real-time visibility into personal information usage, automating compliance processes, and generating reports and audit trails to demonstrate compliance to regulatory agencies.

Discover how EventLog Analyzer streamlines the process of CCPA compliance

  • Web server auditing
  • File integrity monitoring (FIM)
  • Removable disk auditing
  • Database auditing

Web server auditing

Seamlessly collect and analyze log data from various web servers, like Microsoft IIS and Apache. EventLog Analyzer ensures the confidentiality and integrity of personal information stored on your web servers. The logging tool sends automated alerts when suspicious activity, such as insider threats, account compromise, data exfiltration attempts, or unauthorized access, is detected. It also provides actionable insights and intuitive reports on web server errors, such as HTTP 502 bad gateway, HTTP forbidden, and HTTP unauthorized, to help you quickly troubleshoot server issues.

Web server auditing

File integrity monitoring (FIM)

EventLog Analyzer's FIM feature examines logs, creates an audit trail that records all actions made to files containing personal information, and sends out insert alerts on modifications, renames, creations, and deletions to help you meet CCPA requirements. You can view detailed information on who made the change, what was changed, when, and from where. You can also audit permission changes and failed attempts associated with any file actions.

File integrity monitoring (FIM)

Removable disk auditing

EventLog Analyzer audits USB device activities through Windows event logs and offers a thorough audit trail of all removable disk activity, including when disks are inserted or removed, when files are copied, and when disk properties are modified. This enables you to track and investigate suspicious or unauthorized removable disk activity. When removable devices, such as USB devices, are plugged into or taken out of the network, real-time notifications can be configured to immediately notify the administrator. The solution also has a predefined report that displays all USB and removable disk activities and detects data theft to prevent confidential data leaks.

Removable disk auditing

Database auditing

To ensure CCPA compliance, data security administrators must continuously monitor network activity and extract data access information. You can meet this requirement by automatically collecting and analyzing logs from database servers such as Microsoft SQL, Oracle, and MySQL with EventLog Analyzer. If any suspicious activity occurs in your database servers, such as unauthorized logons, DDL or DML queries executed on the database, password changes, permission changes, privilege escalation, or role changes, you will be notified immediately. The solution also helps identify various cyberattacks, like SQL injection attacks, ransomware attacks, denial-of-service attacks, and brute-force attacks.

Database auditing
CCPA requirements Reports by EventLog Analyzer

Section 1798.150.(a)

"Any consumer whose nonencrypted and nonredacted personal information, as defined in subparagraph (A) of paragraph (1) of subdivision (d) of Section 1798.81.5, or whose email address in combination with a password or security question and answer that would permit access to the account is subject to an unauthorized access and exfiltration, theft, or disclosure as a result of the business’s violation of the duty to implement and maintain reasonable security procedures and practices appropriate to the nature of the information to protect the personal information may institute a civil action"

  • SQL Server DDL Auditing
  • SQL Server DML Auditing
  • SQL Server Account Management
  • SQL Server Auditing
  • SQL Server Security
  • SQL Server Violation
  • SQL Server Advanced Auditing
  • SQL Server Permission Denied
  • Oracle DDL Changes
  • Oracle DML Changes
  • Oracle Account Management
  • Oracle Server Auditing
  • Oracle Security
  • MySQL Logon Events
  • MySQL General Statements
  • Printer Auditing
  • Windows Removable Disk Auditing
  • Unix Removable Disk Auditing
  • IIS Web Server Error
  • IIS Web Server Attack
  • Apache Web Server Error
  • Apache Web Server Attack
  • File Integrity Monitoring
  • Symantec DLP
  • Unix FTP Server
  • IIS FTP Server

Built-in support for IT compliances

PCI-DSS  FISMA  HIPAA  SOX  GLBA  ISO 27001:2013 

What else does EventLog Analyzer offer?

  •  

    Centralized log management

    Collect, store, and analyze logs from perimeter devices, network devices, endpoint security solutions, web servers, database platforms, and applications from a centralized dashboard.

    Learn more
  •  

    Log visualization

    Visualize log data collected from multiple sources and gain valuable insights into important network security events.

    Learn more
  •  

    Privileged user monitoring

    EventLog Analyzer constantly monitors privileged user activities and alerts you when suspicious activity is detected.

    Learn more
  •  

    Forensic log analysis

    Perform in-depth forensic log analysis to trace back attacks and determine the root cause of incidents.

    Learn more

Frequently asked questions

What is CCPA compliance?

The CCPA is a data privacy law that gives California residents the right to know what personal information about them is being collected and the power to prohibit the sale of such information. It also requires that businesses implement security measures to protect against unauthorized access, exfiltration, theft, or disclosure of consumers' personal data.

How is the CCPA different than the GDPR?

Both the GDPR and the CCPA are data privacy laws that have some similarities and differences. The GDPR applies to businesses that operate within the European Union (EU) or process the personal data of EU residents, while the CCPA applies to businesses that operate in California or process the personal data of California residents. The CCPA defines "consumer" as a California resident, and "personal information" as information that identifies, relates to, or describes a particular consumer or household. Unlike the CCPA, the GDPR imposes hefty fines for non-compliance.

What rights does California's CCPA provide to California consumers?

The CCPA provides several important rights to California consumers, including:

  • Right to know: California residents have the right to know what personal information is being collected about them, how it's being used, and who it's being shared with.
  • Right to deletion: The right to request that their personal information be deleted from a business's records.
  • Right to opt-out: The right to opt-out of the sale of their personal information to third parties.
  • Right to non-discrimination: The right to not be discriminated against for exercising their CCPA rights.
  • Right to access: The right to access the personal information that a business has collected about them in the past 12 months.
  • Right to data portability: The right to receive personal information in a readily usable format that allows them to transfer it to another entity.
  • Right to opt-in: Businesses must obtain affirmative consent from minors under the age of 16 to sell their personal information.

What is the CPRA and how does it differ from the CCPA?

The California Privacy Rights Act (CPRA) is a privacy law that builds upon the existing CCPA in California. It expands and strengthens the privacy rights of California residents by adding new provisions, such as the right to limit the use of sensitive personal information and the right to correct inaccurate personal information, and increases penalties for violations.The CRPA also creates a new regulatory agency, the California Privacy Protection Agency, to enforce the law.

Maintain CCPA compliance with confidence using EventLog Analyzer.

Get your free trial

Resources

Compliance guide

Explore  

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Infosys
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
A Single Pane of Glass for Comprehensive Log Management