The GDPR, short for the General Data Protection and Regulation, is a set of regulations developed to protect individuals' personal data from misuse. Active within the European Union (EU) and the European Economic Area, the GDPR has revolutionized the way organizations and companies handle customer data. The GDPR is a mandatory compliance regulation that all organizations operating in the EU have to follow.
ManageEngine Firewall Analyzer comes equipped with out-of-the-box compliance support for a host of security mandates, including the GDPR. Firewall Analyzer supports multiple firewall vendors and can generate a compliance report for all of them to help you comply with the GDPR.
Rules | Description | How Firewall Analyzer meets this requirement |
---|---|---|
Art.5.1.e | Personal data shall be kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed; personal data may be stored for longer periods insofar as the personal data will be processed solely for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes in accordance with Article 89(1) subject to implementation of the appropriate technical and organizational measures required by this Regulation in order to safeguard the rights and freedoms of the data subject (Storage limitation). | Firewall Analyzer can retain databases and archive your raw logs for more than 90 days. |
Art.32.1.a | Implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, including the pseudonymization and encryption of personal data. | Firewall Analyzer has the capability to encrypt raw logs to prevent unauthorized access. |
Art.32.1.b | Implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, including the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services. | With Firewall Analyzer's Audit Log report, you can get information on logical access attempts and commands executed to network devices. |
Art.32.1.c | Implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, including the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident. | Firewall Analyzer can retain databases and archive your raw logs for more than 90 days. |
Art.32.1.d | Implement a process for regularly testing, assessing, and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing. | Firewall Analyzer provides you a detailed report on all configuration change records over a period of time, which serves as proper documentation of all changes made to firewall policies. |
Firewall Analyzer assists you in complying with a host of regulatory mandates. Visit ourFirewall compliance management software page for more details about other firewall security standards compliance.
Featured links
Manage your firewall rules for optimum performance. Anomaly free, properly ordered rules make your firewall secured. Audit the firewall security and manage the rule/config changes to strengthen the security.
Get a slew of security and traffic reports to asses the network security posture. Analyze the reports and take measures to prevent future security incidents. Monitor the Internet usage of enterprise users.
Unlock the wealth of network security information hidden in the firewall logs. Analyze the logs to find the security threats faced by the network. Also, get the Internet traffic pattern for capacity planning.
With live bandwidth monitoring, you can identify the abnormal sudden shhot up of bandwidth use. Take remedial measures to contain the sudden surge in bandwidth consumption.
Take instant remedial actions, when you get notified in real-time for network security incidents. Check and restrict Internet usage if banwidth exceeds specified threshold.
MSSPs can host multiple tenants, with exclusive segmented and secured access to their respective data. Scalable to address their needs. Manages firewalls deployed around the globe.