CorreLog has released an executive summary along with an 8-page whitepaper simplifying the EU’s new General Data Protection Regulation (GDPR), discussing its origin and the changes it will bring, as well as an overview of the best practices for data security compliance.
Naples, FL, January 25, 2018 – CorreLog, Inc., the leader in multi-platform IT security event log management, today announced the issuance of its guidelines in both whitepaper and executive summary on the upcoming GDPR, highlighting the main points and the best practices for achieving compliance. The GDPR will go into effect May 25, 2018 and will establish a stricter data security regulation for EU citizens’ data privacy, impacting organizations across the globe.
CorreLog’s summarized guidelines provide readers with the history of the GDPR, what changes it will bring, and best practice Security Information and Event Management (SIEM) to prepare for compliance. The whitepaper discusses the importance of having a security policy that provides real-time alerts across all threat vectors and how to increase security measures for enterprise mobility management including event logging and correlation. Real-time alerts should come from both mainframe and Windows/UNIX systems for best-practice GDPR and other compliance standards.
“With the GDPR just around the corner, organizations need to be ready with the best SIEM practices, today.” said George Faucher, founder and CEO of CorreLog. “CxOs who are struggling with enterprise-wide visibility to user activity will find answers in this whitepaper and executive summary with the best guidelines to help your organization prepare for the GDPR compliance.”
Executive Summary: ‘Introduction to the GDPR Regulation’
CorreLog has condensed the 88-page GDPR into a two-page executive summary for CXOs seeking to better understand GDPR compliance. This executive summary includes:
- An introduction to the GDPR
- An overview of the most important things to watch out for
- 5 tips to help you prepare for the GDPR
To get this executive summary contact CorreLog at CorreLog.com
Whitepaper Overview: ‘Impact from the New GDPR: The Countdown to May 2018 has begun.’
This paper explains why GDPR will change the playing field for maintaining security and compliance; what GDPR means for data management; and offer some tips to help maintain GDPR compliance. It also includes:
- What is the GDPR and why does it matter to me in the U.S.A.?
- What are the main items in the regulation that will affect your organization?
- How disruptive will the regulation be to non-EU organizations?
- How do I prepare for this regulation?
Download this whitepaper here.
CorreLog has designed agent-based solution to collect and forward IBM® z/OS events to organizations’ existing distributed SIEMs for real-time security visibility, including audit trails for compliance with the GPDR and other data security standards. These solutions monitor z/OS events with little impact to systems resources, and roll-up all z/OS events and audits in real-time, into a single IT Security Operations Center (SOC) via distributed SIEM.
For more information about these solutions as they pertain to the GDPR compliance, download the CorreLog GDPR whitepaper here. For more information on CorreLog products for security and compliance visit CorreLog.com
Since 2007, CorreLog, Inc. has been committed to delivering software solutions for Security and Compliance auditing professionals who need more advanced network/system security and improved adherence to PCI DSS, HIPAA, SOX, FISMA, GDPR, ISO 27001, IRS Pub. 1075, NERC and other industry standards for protecting data. Our solutions are designed to be complementary to clients’ existing IT investments.
CorreLog specializes in providing the most comprehensive Security & Compliance software at the industry’s lowest Total Cost of Ownership. Our solutions help secure data across both mainframe and distributed operating systems, and provide alerts with notifications in real-time to security and network operations resources. CorreLog has worked with companies across Fortune 500 to SMB class who all benefit from our ease of installation and highly interoperable approach to building software that is simple to use and master out of the box. Our customers are up and running with monitoring and alerts within just a few hours, versus weeks or even months with competing enterprise vendor solutions. Our software agent monitoring technology spans from Windows, Linux, UNIX, Mac, SAP, and databases all the way up to the largest mainframes with running IBM® z/OS®, Linux on z Systems, IBM® Db2, IBM® IMS™, and IBM® z/VM.
CorreLog has installed software and framework components used successfully by hundreds of commercial and government organizations worldwide. Our core solutions provide visibility on privileged-user activity, data integrity, FIM and application activity that may hold evidence of cyber threat, and in real time, we notify security personnel with alerts in accordance with compliance standards. For more information on CorreLog, please visit CorreLog.com.
Copyright © 2017, CorreLog, Inc. All rights reserved.
All trademarks and registered trademarks used herein are the properties of their respective owners.
Tony Perri, CorreLog Marketing & PR
Office: (239) 514-3331, xt. 406