Support
 
Support Get Quote
 
 
 
 

GDPR's compliance requirements

Meet the GDPR's compliance requirements 

If your enterprise is located in the EU or handles EU citizens' personal data, you'll need to comply with one of the most far-reaching regulatory mandates of recent times, the General Data Protection and Regulation (GDPR).

The GDPR comes into effect on May 25, 2018, and it marks a welcomed change to how enterprises handle individuals' digital privacy. With less than a year to go, it's high time that enterprises reform their data privacy policies and security strategies to meet the GDPR's stringent requirements. After all, this compliance mandate governs the security of personal data at all its various stages—at rest, in use, and in transit. It also outlines that enterprises must get explicit consent before collecting individuals' personal data and insists that enterprises deploy technical measures to:

  • Audit data access and flow across their entire network. 
  • Detect data breaches within 72 hours of their occurrence.
  • Conduct proper post-breach activities such as generating an incident report or automatically remediating a breach.

Using EventLog Analyzer to comply with the GDPR's requirements

EventLog Analyzer, our comprehensive log management and auditing solution, can help your enterprise meet the GDPR's data security requirements with ease. When it comes to the GDPR's requirements for detecting and responding to breaches, EventLog Analyzer has the reporting and search features you need. With predefined GDPR report templates, EventLog Analyzer helps security administrators and data protection officers audit all activities happening on systems that store personal data and changes to the personal data itself. It can also help your enterprise submit review reports to supervisory authorities. 

Auditing personal data access and user activities

Usually, personal data—such as names, email addresses, contact details, and the like—is stored in databases for easy access and processing. To ensure that this confidential data is stored and processed securely, you need to audit all operations involving personal data, including user accesses. 

EventLog Analyzer makes auditing easier with predefined report templates that provide information on:

  • User logons, logoffs, and failed logons, as well as logon/logoff activity trends and the reason for failed logons.
  • Executed select, insert, delete, and update queries.
  • Changes to database tables and schemas.
  • Triggers and stored procedures that have been created, dropped, or altered.

Auditing and keeping track of the above-mentioned security events helps you detect any anomalies as soon as possible so you can quickly mitigate a breach.

EventLog Analyzer's predefined report templates address the following GDPR article(s): Article 5 (1.f), 32 (1.b and 1.d), and 33 (3)

Check out our exclusive GDPR zone to know more on this compliance. 

Promptly detect and remediate breaches with EventLog Analyzer 

The GDPR requirement that talks about detecting and reporting data breaches—"'Notification of personal data breach to supervisory authority without undue delay, where feasible, not later than 72 hours after having become aware of it"—reiterates the fact that it's not always possible to prevent data breaches. And when they do occur, what's required is prompt detection and response. 

EventLog Analyzer can detect data breaches and attacks instantly with its real-time correlation engine and event response system. With over 20 predefined correlation rules, EventLog Analyzer can identify any form of attack, including ransomware, denial of service (DoS), brute force, SQL injection, and a lot more. 

Predefined correlation rules for detecting 

  • Ransomware attacks 
  • Repeated SQL injection attempts in databases
  • Possible worm activity 
  • Malicious URL requests 
  • Multiple file permission changes  
  • Brute force attack and a lot more.

EventLog Analyzer also includes a custom correlation rule builder that helps you create rules that detect specific attack patterns, notifying you in real time if a sophisticated attack occurs. EventLog Analyzer's custom script option automates breach remediation.

Additionally, EventLog Analyzer's correlation engine integrates with its built-in incident management system (which is capable of raising tickets in a help desk console for every detected incident), adding accountability to incident resolution.

Learn more

Conducting forensic analysis and generating incident reports

The GDPR outlines that enterprises that handle or process personal data should conduct a proper incident analysis after a data breach and provide information on the impact of that  breach. 

EventLog Analyzer helps you meet this requirement with its high-speed log search engine, which can effectively conduct forensic analysis and drill-down to the exact log entry that contains information about a data breach. It also provides out-of-the-box reports that highlight information such as who did what changes to personal data, when, and from where. These details help in identifying a breach's impact and its likely consequences, and in mitigating breaches of similar types in future.

Learn more
EventLog Analyzer's log search engine and reports address the following GDPR article(s): Article 33 (1 and 3)
Customer Speaks
  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
     
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
     
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
     
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • I love the alerts feature of the product. We are able to send immediate alerts based on pretty much anything we can think of. We send alerts when certain accounts login, or when groups are changed, etc. That has been very helpful. Also the automatic archive of the log files has been very helpful and has taken the worry out of keeping old logs. The “Ask Me” function is very nice as well. It is great to have some natural language queries built in where you can just click a button and get an answer.
     
    Jim Earnshaw
    Senior Computer Specialist
    Department of Chemistry
    University of Washington
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
     
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

EventLog Analyzer Trusted By

A Single Pane of Glass for Comprehensive Threat Management