added value distribution - hermitage solutions€¦ · information security – enisa (2018; 2017)...

2
ACCESS CONTROL AND AUTHENTICATION CENTRIFY ONELOGIN ARCON EKRAN SYSTEM ACCELLION YUBICO LOGS AND MONITORING DEVO TRIPWIRE MOBILE, PORTABLE DEVICES SOPHOS FAMOC CENTRIFY SPYRUS PROTECTION OF SERVERS, DATABASES ARCON HYTRUST NETWORK AND COMMUNICATION SECURITY SOPHOS UNTANGLE CLAVISTER CLEARSWIFT CRYPTSHARE ACCELLION BACKUPS DISUK HYTRUST ISTORAGE IRONKEY WORKSTATION PROTECTION SOPHOS YUBICO F-SECURE SOFTWARE SECURITY CSA DATA REMOVAL COSOSYS SEALPATH EGOSECURE YUBICO TECHNICAL DATA SECURITY MEASURES CYBER SECURITY SOLUTIONS ADDED VALUE DISTRIBUTION SPYRUS SOPHOS PHYSICAL ACCESS GDPR

Upload: others

Post on 26-Apr-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ADDED VALUE DISTRIBUTION - Hermitage Solutions€¦ · information security – ENISA (2018; 2017) and information security management standards ISO27k (2016). GDPR ACCESS CONTROL

ACCESS CONTROL AND

AUTHENTICATION

CENTRIFY

ONELOGIN

ARCON

EKRAN SYSTEM

ACCELLIONYUBICO

LOGS AND MONITORING

DEVO TRIPWIRE

MOBILE, PORTABLE DEVICES

SOPHOSFAMOC

CENTRIFY

SPYRUS

PROTECTION OF SERVERS, DATABASES

ARCON

HYTRUST

NETWORK AND COMMUNICATION

SECURITY

SOPHOS

UNTANGLE

CLAVISTERCLEARSWIFT

CRYPTSHARE

ACCELLION

BACKUPS

DISUK

HYTRUSTISTORAGE

IRONKEY

WORKSTATION PROTECTION

SOPHOS

YUBICO

F-SECURESOFTWARE SECURITY

CSA

DATA REMOVAL

COSOSYS

SEALPATH

EGOSECURE

YUBICO

TECHNICAL DATA SECURITY MEASURES

CYBER SECURITY SOLUTIONSADDED VALUE DISTRIBUTION

SPYRUS

SOPHOS

PHYSICAL ACCESS

GDPR

Page 2: ADDED VALUE DISTRIBUTION - Hermitage Solutions€¦ · information security – ENISA (2018; 2017) and information security management standards ISO27k (2016). GDPR ACCESS CONTROL

R E Q U I R E M E N T S O LU T I O N

10 MINIMUM REQUIREMENTS FOR APPROPRIATE TECHNICAL DATA SECURITY MEASURES

Source: GDPR Implementation Guidelines published by The State Data Protection Inspectorate of Lithuania which are based on recommendations of the EU agency for network and information security – ENISA (2018; 2017) and information security management standards ISO27k (2016).

GDPR

ACCESS CONTROL AND AUTHENTICATION

PROTECTION OF SERVERS, DATABASES

WORKSTATION PROTECTION

NETWORK AND COMMUNICATION SECURITY

BACKUPS

MOBILE, PORTABLE DEVICES

SOFTWARE SECURITY

DATA REMOVAL

PHYSICAL ACCESS

LOGS AND MONITORING