ADDED VALUE DISTRIBUTION - Hermitage Solutions€¦ · information security – ENISA (2018; 2017)...

Post on 26-Apr-2020

1 views 0 download

Transcript of ADDED VALUE DISTRIBUTION - Hermitage Solutions€¦ · information security – ENISA (2018; 2017)...

ACCESS CONTROL AND

AUTHENTICATION

CENTRIFY

ONELOGIN

ARCON

EKRAN SYSTEM

ACCELLIONYUBICO

LOGS AND MONITORING

DEVO TRIPWIRE

MOBILE, PORTABLE DEVICES

SOPHOSFAMOC

CENTRIFY

SPYRUS

PROTECTION OF SERVERS, DATABASES

ARCON

HYTRUST

NETWORK AND COMMUNICATION

SECURITY

SOPHOS

UNTANGLE

CLAVISTERCLEARSWIFT

CRYPTSHARE

ACCELLION

BACKUPS

DISUK

HYTRUSTISTORAGE

IRONKEY

WORKSTATION PROTECTION

SOPHOS

YUBICO

F-SECURESOFTWARE SECURITY

CSA

DATA REMOVAL

COSOSYS

SEALPATH

EGOSECURE

YUBICO

TECHNICAL DATA SECURITY MEASURES

CYBER SECURITY SOLUTIONSADDED VALUE DISTRIBUTION

SPYRUS

SOPHOS

PHYSICAL ACCESS

GDPR

R E Q U I R E M E N T S O LU T I O N

10 MINIMUM REQUIREMENTS FOR APPROPRIATE TECHNICAL DATA SECURITY MEASURES

Source: GDPR Implementation Guidelines published by The State Data Protection Inspectorate of Lithuania which are based on recommendations of the EU agency for network and information security – ENISA (2018; 2017) and information security management standards ISO27k (2016).

GDPR

ACCESS CONTROL AND AUTHENTICATION

PROTECTION OF SERVERS, DATABASES

WORKSTATION PROTECTION

NETWORK AND COMMUNICATION SECURITY

BACKUPS

MOBILE, PORTABLE DEVICES

SOFTWARE SECURITY

DATA REMOVAL

PHYSICAL ACCESS

LOGS AND MONITORING