The Guarantor's Privacy Statement of November 27, 2008The Guarantor for Personal Data Protection has determined that from February 28, 2009 (extended to December 15, 2009) all private and public companies must record and store System Administrator access data on the systems they manage, In order to facilitate the "verification of their activity by those who own the databases and computer systems" (Official Gazette 300, 24 December 2008). Become a Reseller
What it means?
Each company, having identified the systems (network devices, databases, security systems, and complex software systems) that contain the most critical data and appointed directors, must have a Log Management that traces operator access to the devices and applications they manage. This system will have to keep the data safely for a minimum of six months and will be available for consultation by the company and the authorities.
The Log Management service supports throughout the technical and organizational process small, medium and large companies in compliance with the disposition of the Personal Data Protection Guarantor.
How to get in good shape
Thanks to the Log Management service, any company can choose the most appropriate technology solution to suit all Security to the provisions of the Privacy Guard. But not only. The Secure Online Desktop staff can support you in all the technical/organizational activities required to put your business in line with the Guarantor's requirements. Below is a list of the main activities we can offer you:
- detection of systems to monitor;
- uniquely identifying system administrators and creating users connected to the physical person;
- analysis and dimensioning of servers and network devices to be monitored;
- legal and technical-organizational advice on the Order;
- the possible implementation of a Strong Authentication system that gives the company and administrator greater security as it is guaranteed that the credentials used to access a system actually match the physical person.
GDPR - GENERAL DATA PROTECTION REGULATION
SOAR (Security Orchestration, Automation and Response) technology helps coordinate, execute and automate activities… https://t.co/iPXj1btncq
La tecnologia SOAR (Security Orchestration, Automation and Response) aiuta a coordinare, eseguire e automatizzare l… https://t.co/g7DzYmLwNb
IT systems produce large quantities of log files, very useful tools for guaranteeing data security and application… https://t.co/3OwGBzeOOo
I sistemi IT producono grandi quantita' di log file, strumenti utilissimi per garantire la sicurezza dei dati e la… https://t.co/8UeOMdnjlo
An increasing number of companies leverage SOAR to improve the effectiveness of their cybersecurity operations. In… https://t.co/8LLufPj3ip