Meet the GDPR's compliance requirements
If your enterprise is located in the EU or handles EU citizens' personal data, you'll need to comply with one of the most far-reaching regulatory mandates of recent times, the General Data Protection and Regulation (GDPR).
The GDPR comes into effect on May 25, 2018, and it marks a welcomed change to how enterprises handle individuals' digital privacy. With less than a year to go, it's high time that enterprises reform their data privacy policies and security strategies to meet the GDPR's stringent requirements. After all, this compliance mandate governs the security of personal data at all its various stages—at rest, in use, and in transit. It also outlines that enterprises must get explicit consent before collecting individuals' personal data and insists that enterprises deploy technical measures to:
- Audit data access and flow across their entire network.
- Detect data breaches within 72 hours of their occurrence.
- Conduct proper post-breach activities such as generating an incident report or automatically remediating a breach.
Using EventLog Analyzer to comply with the GDPR's requirements
EventLog Analyzer, our comprehensive log management and auditing solution, can help your enterprise meet the GDPR's data security requirements with ease. When it comes to the GDPR's requirements for detecting and responding to breaches, EventLog Analyzer has the reporting and search features you need. With predefined GDPR report templates, EventLog Analyzer helps security administrators and data protection officers audit all activities happening on systems that store personal data and changes to the personal data itself. It can also help your enterprise submit review reports to supervisory authorities.
Auditing personal data access and user activities
Usually, personal data—such as names, email addresses, contact details, and the like—is stored in databases for easy access and processing. To ensure that this confidential data is stored and processed securely, you need to audit all operations involving personal data, including user accesses.
EventLog Analyzer makes auditing easier with predefined report templates that provide information on:
- User logons, logoffs, and failed logons, as well as logon/logoff activity trends and the reason for failed logons.
- Executed select, insert, delete, and update queries.
- Changes to database tables and schemas.
- Triggers and stored procedures that have been created, dropped, or altered.
Auditing and keeping track of the above-mentioned security events helps you detect any anomalies as soon as possible so you can quickly mitigate a breach.
EventLog Analyzer's predefined report templates address the following GDPR article(s): Article 5 (1.f), 32 (1.b and 1.d), and 33 (3)
Promptly detect and remediate breaches with EventLog Analyzer
The GDPR requirement that talks about detecting and reporting data breaches—"'Notification of personal data breach to supervisory authority without undue delay, where feasible, not later than 72 hours after having become aware of it"—reiterates the fact that it's not always possible to prevent data breaches. And when they do occur, what's required is prompt detection and response.
EventLog Analyzer can detect data breaches and attacks instantly with its real-time correlation engine and event response system. With over 20 predefined correlation rules, EventLog Analyzer can identify any form of attack, including ransomware, denial of service (DoS), brute force, SQL injection, and a lot more.
Predefined correlation rules for detecting
- Ransomware attacks
- Repeated SQL injection attempts in databases
- Possible worm activity
- Malicious URL requests
- Multiple file permission changes
- Brute force attack and a lot more.
EventLog Analyzer also includes a custom correlation rule builder that helps you create rules that detect specific attack patterns, notifying you in real time if a sophisticated attack occurs. EventLog Analyzer's custom script option automates breach remediation.
Additionally, EventLog Analyzer's correlation engine integrates with its built-in incident management system (which is capable of raising tickets in a help desk console for every detected incident), adding accountability to incident resolution. Learn more
Conducting forensic analysis and generating incident reports
The GDPR outlines that enterprises that handle or process personal data should conduct a proper incident analysis after a data breach and provide information on the impact of that breach.
EventLog Analyzer helps you meet this requirement with its high-speed log search engine, which can effectively conduct forensic analysis and drill-down to the exact log entry that contains information about a data breach. It also provides out-of-the-box reports that highlight information such as who did what changes to personal data, when, and from where. These details help in identifying a breach's impact and its likely consequences, and in mitigating breaches of similar types in future. Learn more
EventLog Analyzer's log search engine and reports address the following GDPR article(s): Article 33 (1 and 3)
Keep calm and prepare for GDPR.
Get our 'Security admin's survival
guide to the GDPR.'