Cyber ReliantCyber ReliantCyber ReliantCyber Reliant
  • TECHNOLOGY
    • Our Technology
    • Certifications
  • COMPANY
    • Company Profile
    • Board Members
  • Case Scenario
  • Data Sheet

Cyber Reliant Supports EU General Data Protection Regulation (GDPR)

    Home resource Cyber Reliant Supports EU General Data Protection Regulation (GDPR)
    Trivalent GDPR Solutions

    Cyber Reliant Supports EU General Data Protection Regulation (GDPR)

    By Carla Baldwin | | Comments are Closed | 6 June, 2018 | 0

    Background

    The General Data Protection Regulation (GDPR) is a new regulation that was implemented in the European Union (EU) on May 25th, 2018. It focuses on data protection and privacy for all individuals within the EU and the European Economic Area (EEA). The GDPR defines requirements for the processing of personally identifiable information (PII) of EU individuals by businesses.

    Security Recommendations

    The GDPR explains that business processes must use the highest possible privacy settings by default. It requires private data to be saved through pseudonymization, which is an obfuscation technique where data cannot be attributed to a specific individual without the use of additional information. This can be done using encryption and/or tokenization.

    Possession does NOT equal Access


    Organizations who employ EU citizens in order to meet GDPR mandates must treat their employee data in the same manner as consumer PII. To do so, they require the appropriate policy controls, processes, and technology to ensure the privacy of employee data generated on their networks and systems. Cyber Reliant Data Protection ensures only authorized users gain access to the data through our unique process of encrypting and randomized shredding. The Cyber Reliant security architecture is certified by the NSA to secure Top Secret data on Android, and Cyber Reliant utilizes the same methods across other platforms, like Windows, Linux, and iOS.

    Endpoint

    Cyber Reliant Data Protection is designed from the ground up to secure end-user data independently of other security solutions like Endpoint Protection, Endpoint Detection and Response, Host based Firewall, etc. In this way, even if a bad actor bypasses these security countermeasures, or the endpoint is accessible by legit IT administrators, only the data owner and those users they have given permission will gain access to the data. This can be as granular as individual files or whole directories.

    Data In-Transit

    Cyber Reliant has developed patent pending technology to secure transmitted data by using multi-channel so each data shred has its own transmission session. The receiving end only requires a certain number of shreds out of the total to recombine the full content, so if some shreds are dropped or hijacked data integrity is not compromised. This solution has been optimized for voluminous transactional data, like financial transaction processing.

    Cloud

    File Hosting – Since Cyber Reliant does not store content as discrete files but instead breaks them up into randomized shreds, these shreds can be dispersed across cloud storage providers, like Box, Dropbox, and OneDrive, where the data owner and whoever they authorize will gain access to recombine the shreds.

    AWS Cloud Infrastructure – Cyber Reliant can be integrated with AWS S3 or Glacier buckets transparently protecting any sensitive data stored or processed by AWS supported cloud applications.

    DOWNLOAD CASE SCENARIO
    No tags.

    Recent

    • Cyber Reliant Data Defender Plugin
    • Cyber Reliant Supports EU General Data Protection Regulation (GDPR)
    • Cyber Reliant Provides Next Generation Data Protection on Rugged Devices
    • Cyber Reliant Mobile Data Defender SDK
    • Cyber Reliant Secure Apps

    Browse Resources

    • Case Scenario
    • Data Sheet
    Download the CYBER RELIANT EDGEGUARD Datasheet

    Have Questions

    Get in touch.

    180 Admiral Cochrane Drive, STE 310
    Annapolis, Maryland 21401
    CONTACT@CYBERRELIANT.COM

    Cyber Reliant Icon

    • Company
    • Careers
    • Privacy Policy
    • Terms of Use
    © Cyber Reliant Corp. All Rights Reserved
    • Home
    • Technology
      • Certifications
    • Company
      • Board Members
    • Case Scenario
    • Data Sheet
    Cyber Reliant
    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok