LogRhythm, The Security Intelligence Company, today announced the release of its GDPR Compliance Module, the first fully-integrated security solution for achieving and validating GDPR compliance. For companies that collect and process personal data of European Union citizens, the LogRhythm GDPR Compliance Module offers a robust, pre-built suite of rules, alerts, and reports specifically mapped to GDPR Articles. By implementing LogRhythm’s GDPR Compliance Module, organisations can protect their customers’ personal data, avoid negative publicity, prevent loss of customer confidence and avoid fines.
All organisations doing business with companies or individuals within the EU fall under the scope of the GDPR and are subject to compliance with the new law. Non-compliance can result in significant penalties, including fines of up to €20 million or four percent of an offending organisation’s global annual revenue. Ensuring compliance with the GDPR promises to be a major operational and technological exercise for all subject organisations. Gartner predicts that by the end of 2018, less than 50 percent of companies affected by the GDPR will be in full compliance with its requirements.
“Given the breadth of the GDPR, no single solution provides automatic compliance with all aspects of the regulation. In fact, there are more people and process requirements to the regulation than technology,” said James Carder, chief information security officer and GDPR data protection officer at LogRhythm. “The LogRhythm GDPR Compliance Module offers a simplified approach towards meeting this new regulation by providing a fundamental security framework designed to help organisations address the technology requirements of the GDPR. This framework helps organisations reduce risk, avoid fines and preserve their ability to conduct business in and with the EU.”
The LogRhythm GDPR Compliance Module is the first solution on the market that offers an integrated approach towards demonstrating compliance with technology-focused GDPR articles. As with all of LogRhythm’s compliance modules, the GDPR Compliance Module is offered at no additional charge to LogRhythm customers. Organisations implementing the module can realise immediate benefits, thanks to the suite of pre-built content that delivers a more efficient and effective solution over manual processes and other technologies.
“It’s clear that LogRhythm has put in significant time and effort to actually address GDPR,” said Chris Kruk, Information Security Analyst at UK SBS. “The new investigation templates and other components dedicated to GDPR are very useful, and the GDPR reports provide a very good overview of the requirements of GDPR.”
A customised demo, and more information on how LogRhythm’s GDPR Compliance Module can benefit organisations, can be requested by visiting: www.logrhythm.com/schedule-online-demo
LogRhythm is the pioneer in Threat Lifecycle ManagementTM (TLM) technology, empowering organisations on six continents to rapidly detect, respond to and neutralise damaging cyberthreats. LogRhythm’s TLM platform unifies leading-edge data lake technology, artificial intelligence, security analytics and security automation and orchestration in a single end-to-end solution. LogRhythm serves as the foundation for the AI-enabled security operations centre, helping customers secure their cloud, physical and virtual infrastructures for both IT and OT environments. Among other accolades (https://logrhythm.com/about/awards-recognition/), LogRhythm is positioned as a Leader in Gartner’s SIEM Magic Quadrant.
Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.
Cybersecurity Insights - Attack
No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?
Cybersecurity Insights - People
Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.