Data Center Cloud Defense

General Data Protection Regulation (GDPR) Readiness

Learn about essential capabilities you need to be GDPR-ready

Download Guide

December 12 Webcast: A Solution Architect’s View on GDPR Preparation. Register Now >

Data protection in the age of the GDPR

The General Data Protection Regulation (GDPR) is legislation designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens’ data privacy, and to reshape the way organizations across the region approach data privacy.

The GDPR comes into force beginning May 2018, but it’s likely to be on your radar already. You may even be midway through the changes that will align your organization with the new data protection regulation. In doing so, you’re giving your business a competitive advantage. From a security team’s point of view, GDPR is an opportunity. Meeting the GDPR requirements means putting in place processes and technologies that have long made sense. Seize that opportunity.

Beyond GDPR

Will data privacy make businesses more competitive?

Preparing for GDPR requirements: Data protection by design

Cover attack surfaces and vectors

Protect devices, cloud services and storage, databases, and apps. Manage privileges and access.

Boost security operations capability

Establish triage workflows and define response actions. Optimize your security teams with advanced management, reporting, and automation.

Fortify the entire defense lifecycle

Protect, detect, correct, and adapt. Drive continuous improvement at each step.

Implement a data discovery and classification program

Involve a cross-functional team of business data owners, security operations, and data security professionals.

Preparing for the GDPR

Pervasive Data Protection

Any good data security program must have the capability to protect, detect, and correct against accidental data loss or malicious theft attempts. Encryption and data loss prevention (DLP) technologies are fundamental to preventing accidental data loss incidents. In the SOC, SIEM combined with advanced user behavior analytics are the key enablers to identify and investigate insider threats.

Learn More >

Intelligent Security Operations

Many SOCs lack capabilities for data breach detection and response. A critical part of GDPR requirements is being able to report breaches within 72 hours from awareness, so it’s essential to develop data breach playbooks within security operations. Additionally, orchestration technologies can help bridge gaps and speed up incident response.

Learn More >

Dynamic Endpoint Threat Defense

Malware infections and exploits of application vulnerabilities are key attack vectors that lead to data exfiltration. Advanced threat defenses at the endpoint and network can harden the attack surfaces against known and unknown malware. In the SOC, leverage threat intelligence from multiple sources to proactively hunt for attackers.

Learn More >

Data Center & Cloud Defense

Software-as-a-service (SaaS) and cloud-hosted applications present particular challenges for GDPR preparations. However, many organizations use separate cloud and enterprise security solutions, which can create gaps in visibility and protection. A unified security system allows you to extend protection, detection, and correction capabilities to cloud environments easily.

Learn More >

McAfee Professional Services

Our Foundstone consultants are seasoned experts and can provide GDPR-readiness reviews and services to help you design security programs and enforceable policies.

Learn More >

Read our blogs about the GDPR

How Can We Help You?

Contact us to learn about professional services, solution implementation, technical specifications, and more.

Contact Us
Back to top