Webcast: A Solution Architect’s View on GDPR Preparation. Watch Now >
Data protection in the age of the GDPR
The General Data Protection Regulation (GDPR) is legislation designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens’ data privacy, and to reshape the way organizations across the region approach data privacy.
Preparing for GDPR requirements: Data protection by design

Cover attack surfaces and vectors
Protect devices, cloud services and storage, databases, and apps. Manage privileges and access.

Boost security operations capability
Establish triage workflows and define response actions. Optimize your security teams with advanced management, reporting, and automation.

Fortify the entire defense lifecycle
Protect, detect, correct, and adapt. Drive continuous improvement at each step.

Implement a data discovery and classification program
Involve a cross-functional team of business data owners, security operations, and data security professionals.
Preparing for the GDPR
Pervasive Data Protection
Any good data security program must have the capability to protect, detect, and correct against accidental data loss or malicious theft attempts. Encryption and data loss prevention (DLP) technologies are fundamental to preventing accidental data loss incidents. In the SOC, SIEM combined with advanced user behavior analytics are the key enablers to identify and investigate insider threats.
Learn More >Intelligent Security Operations
Many SOCs lack capabilities for data breach detection and response. A critical part of GDPR requirements is being able to report breaches within 72 hours from awareness, so it’s essential to develop data breach playbooks within security operations. Additionally, orchestration technologies can help bridge gaps and speed up incident response.
Learn More >Dynamic Endpoint Threat Defense
Malware infections and exploits of application vulnerabilities are key attack vectors that lead to data exfiltration. Advanced threat defenses at the endpoint and network can harden the attack surfaces against known and unknown malware. In the SOC, leverage threat intelligence from multiple sources to proactively hunt for attackers.
Learn More >Data Center & Cloud Defense
Software-as-a-service (SaaS) and cloud-hosted applications present particular challenges for GDPR preparations. However, many organizations use separate cloud and enterprise security solutions, which can create gaps in visibility and protection. A unified security system allows you to extend protection, detection, and correction capabilities to cloud environments easily.
Learn More >McAfee Professional Services
Our Foundstone consultants are seasoned experts and can provide GDPR-readiness reviews and services to help you design security programs and enforceable policies.
Learn More >Learn more about the GDPR

GDPR and Your Data Protection Transformation
Learn how McAfee technologies and services advance your data security lifecycle and support GDPR readiness.
Navigating the General Data Protection Regulation
It outlines the key facts and figures, the questions organizations should ask to help assess their stage of readiness, and a comprehensive toolkit to help develop the capabilities needed to become GDPR-ready.
Address GDPR Compliance with Pervasive Data Protection
Learn how McAfee data protection solutions can help your organization discover, classify, and protect personal data wherever it resides.
Read our blogs about the GDPR
How Can We Help You?
Contact us to learn about professional services, solution implementation, technical specifications, and more.
Contact Us