Why Log360 for GDPR?

Most of the GDPR's requirements talk about not only getting proper consent from individuals, but also notifying these individuals on how their data is being handled as well as what rights they have over this collected data. However, there are also specific requirements concerning the security operations center (SOC). Apart from ensuring lawful and transparent data collection, businesses also need to establish technical measures to safeguard data from attacks and threats. This is the primary objective of the SOC. To meet this requirement, you need to deploy security information and event management (SIEM) solution.

ManageEngine Log360 is a comprehensive SIEM solution, that will help you meet the IT security requirements of the GDPR with its predefined audit report template. The solution also comes with the threat intelligence, forensic analysis, incident detection and management capabilities, that will help you protect personal data and stay GDPR compliant.

Explore Log360 and see for yourself how it helps meet the GDPR compliance requirements. We also assist you with a free e-book that decrypts GDPR’s IT security articles and gives you information on how Log360 helps you to meet those.

Why wait? Go ahead, download Log360, and explore it with a 45-day extended complimentary license. Need expert’s assistance in tuning the solution to fit your environment? Do not hesitate we’re a form away!

Congratulations!

Your 45-days free Log360 complimentary license will be sent to your inbox.

Explore Log360 for free

with 45-days complimentary license.

MktgRefURL  
ME-Source  
ProductSource  
LS-Souce  
  • Please enter business email only.
    Please enter business email address
  •  
    By clicking 'Send license', you agree to processing of personal data according to the Privacy Policy.
  •  

How Log360 helps you meet GDPR requirements

IT Security requirements of GDPR and Log360 features mapping

Article 5 1 (f)

"..in a manner that ensures appropriate security of the personal data, including protection against unauthorized or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures (‘integrity and confidentiality’)."

What it means

To prevent unauthorized processing, set up security configurations and monitor the changes to these configurations to detect unauthorized or unlawful access and processes.

Audit all the operations performed on personal data to ensure the processes carried out in a legitimate manner.

Article 25 (2)

In particular, such measures shall ensure that by default personal data are not made accessible without the individual’s intervention to an indefinite number of natural persons.

What it means

Ensure that personal data access is granted only for selected users and is not made accessible to everyone.

Monitor the privileged user group that has permissions to access and process personal data.Changes to this group should be tracked and analyzed to avoid unauthorized access to personal data.

Article 32 1 (b)

ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;

What it means

Regularly audit the systems (or servers) that store and applications (databases) that process personal data.

Get notified in real-time upon any unauthorized access attempts, permission changes, privilege escalations, or unexpected shutdowns of servers and applications that could result in potential threats affecting their confidentiality or integrity.

Article 33 (1)

In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it,..

What it means

Data breaches, if any should be detected and reported to supervisory authorities within 72 hours.

Article 33 3 (d)

describe the measures taken or proposed to be taken by the controller to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects.

What it means

Elaborate the efforts taken to mitigate the attacks and its adverse effects.

Thank you!

Your copy of the e-book is on its way to your mailbox.

Learn how Log360 helps you meet these requirements.

MktgRefURL  
ME-Source  
ProductSource  
LS-Souce  
  • Please enter business email address
  •  
    By clicking 'Get e-book', you agree to processing of personal data according to the Privacy Policy.
  •  
meet-gdpr-it-security-requirements-book
Demo Request
展开