Alon Rosenthal, Founder and CEO

Slides:



Advertisements
Similar presentations
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
Advertisements

Chapter 5 Database Application Security Models
SaaS, PaaS & TaaS By: Raza Usmani
ORACLE DATABASE SECURITY
LOGO Business Intelligence System Mr. Natapong Wongprommoon Solution Architect G-ABLE Company Limited
Microsoft SharePoint Server 2010 for the Microsoft ASP.NET Developer Yaroslav Pentsarskyy
Data-centric security at Blue Talon
Data-centric security of Blutalon
How Prepared are Nordic CIOs for GDPR Compliance?
GDPR Impact.
Maciej Pęciak Robert Dąbroś
Accountability & Structured Privacy Management
AuraPortal Cloud Helps Empower Organizations to Organize and Control Their Business Processes via Applications on the Microsoft Azure Cloud Platform MICROSOFT.
The Revolutionary Benefits Of Blockchain
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Smart Building Solution
Meemim's Microsoft Azure-Hosted Knowledge Management Platform Simplifies the Sharing of Information with Colleagues, Clients or the Public MICROSOFT AZURE.
DocFusion 365 Intelligent Template Designer and Document Generation Engine on Azure Enables Your Team to Increase Productivity MICROSOFT AZURE APP BUILDER.
Built on Microsoft Azure, 11Ants Retail Analytics Customer Science Solution Delivers Real Growth Opportunities to Retailers with Loyalty Programs MICROSOFT.
Integrating Enterprise Applications Into SharePoint® Portal Server
92% of the world’s data was created in the past 2 years
Partner Logo Veropath Offers a Next-Gen Expense Management SaaS Technology Solution, Built Specifically to Harness Big Data Analytics Capabilities in Azure.
New Heights by Guiding Them into the Cloud
Microsoft 365 Get help with regulatory compliance
Azure-Powered beaconsmind Suite Connects with CRM and POS Systems and Offers Dashboards with Data Insights to Boost Sales and Customer Loyalty MICROSOFT.
Free Cloud Management Portal for Microsoft Azure Empowers Enterprise Users to Govern Their Cloud Spending and Optimize Cloud Usage and Planning MICROSOFT.
Smart Building Solution
Microsoft
Azure-Powered Augmented Reality Storytelling Platform for Kids Makes Learning Adaptive, Fun “Azure and its associated storage, content delivery, and virtual.
Bare Metal Server Backup Solution
KEY CHANGES TO THE DATA PROTECTION LANDSCAPE
Veeam Backup Repository
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
12: :00     Welcome   13: :55     Terumo and Flexso will share insights on the successful implementation of SuccessFactors Compensation module.
Enterprise Cloud SERVICE MANAGEMENT OPERATIONS MANAGEMENT
Nina Barakzai November 2017
Incentive Marketing Association And the GDPR
H3 Solutions and the Azure Government Cloud Team Up to Power Contextual Intelligence Platform – Where Big Data Meets Business Productivity MICROSOFT AZURE.
Bob Siegel President Privacy Ref, Inc.
GDPR - Individual’s Rights
6 Principles of the GDPR and SQL Provision
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
Azure’s Scalability, Array of Services in Cloud
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
The Only Digital Asset Management System on Microsoft Azure, MediaValet Is Uniquely Equipped to Meet Any Company’s Needs MICROSOFT AZURE ISV PROFILE: MEDIAVALET.
DeFacto Planning on the Powerful Microsoft Azure Platform Puts the Power of Intelligent and Timely Planning at Any Business Manager’s Fingertips Partner.
Searchable. Secure. Simple.
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
NAV In The Cloud: Exploring Options for a Cloud-based Deployment
Keep Your Digital Media Assets Safe and Save Time by Choosing ImageVault to be Your Digital Asset Management Solution, Hosted in Microsoft Azure Partner.
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
INTRODUCTION TO BY-ANAS (MCA ) 12/25/2018Anas | MCA | N.I.E.T. Greater Noida1.
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Last.Backend is a Continuous Delivery Platform for Developers and Dev Teams, Allowing Them to Manage and Deploy Applications Easier and Faster MICROSOFT.
The General Data Protection Regulation: Are You Ready?
The title: The implementation of Data Protection
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Test data preparation for GDPR compliance
GDPR PERSONDATAFORORDNINGEN I PRAKSIS
Data Mapping & Data Subject Rights
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
General Data Protection Regulation “11 months in”
Make it real: Help your customers comply with the GDPR
Microsoft Data Insights Summit
OU BATTLECARD: Oracle Data Integrator
GDPR is here – are you ready?
OU BATTLECARD: Oracle WebCenter Training
OU BATTLECARD: WebLogic Server 12c
Presentation transcript:

Alon Rosenthal, Founder and CEO GDPR. It’s coming soon and includes a mountain of personal data protection requirements. Articles such as “right to be forgotten”, consent, security by design, restriction of processing would make the toughest IT architect sweat. Why? Because they require massive code-changes to business applications, processes and databases.

GDPR Main Compliance Requirements Article # |Article Name Article # |Article Name Processing of Personal Data Restriction of processing 5 18 Lawfulness of Processing Right to Data Portability 6 20 Conditions for Consent Right to Object 7 21 Conditions of Child's Consent Protection by Design & Default 8 25 Processing Special categories Records of Processing Activities 9 30 GDPR. It’s coming soon and includes a mountain of personal data protection requirements. Articles such as “right to be forgotten”, consent, security by design, restriction of processing would make the toughest IT architect sweat. Why? Because they require massive code-changes to business applications, processes and databases. Processing of Criminal Records Security of Processing 10 32 Right of Access Notification of Data Breach 15 33 Right to be Forgotten Communication of Data Breach 17 34

Existing Approaches End-Users Applications Databases Billing Finance Reporting Tools CRM ERP e-Commerce Applications Billing Finance Front-office HR-App Databases My journey started 15 years ago, when I founded my first company, inventing dynamic masking to protect DBA access by building a database proxy, and getting bored DBAs fired. It was useless for controlling business applications, as the user and request context was never proliferated from the end-user to the database…(you can blame connection pools, microservices, caching) After 10 years my first company was acquired by a big American company that has built its entire offering based on our company. But my journey did not end.

Existing Approaches End-Users Applications Databases Billing Finance Reporting Tools CRM ERP e-Commerce Applications Billing Finance Front-office HR-App Databases My journey started 15 years ago, when I founded my first company, inventing dynamic masking to protect DBA access by building a database proxy, and getting bored DBAs fired. It was useless for controlling business applications, as the user and request context was never proliferated from the end-user to the database…(you can blame connection pools, microservices, caching) After 10 years my first company was acquired by a big American company that has built its entire offering based on our company. But my journey did not end.

Existing Approaches End-Users Applications Databases Billing Finance Reporting Tools CRM ERP e-Commerce Applications Billing Finance Front-office HR-App Databases My journey started 15 years ago, when I founded my first company, inventing dynamic masking to protect DBA access by building a database proxy, and getting bored DBAs fired. It was useless for controlling business applications, as the user and request context was never proliferated from the end-user to the database…(you can blame connection pools, microservices, caching) After 10 years my first company was acquired by a big American company that has built its entire offering based on our company. But my journey did not end.

SecuPi Central Management Server We Solve GDPR on All Applications, DW and Big Data It is Fast to Deploy, No DB Agents, No Code-Changes End-Users e-Commerce Reporting Tools CRM ERP Applications Billing Finance Front-office HR-App SecuPi Central Management Server Databases - CONFIDENTIAL - Discovery, data-flow mapping Dynamic Consent Controls User Behavior Analytics (UBA) Logical Deletion Monitoring & Auditing Physical Deletion/ Anonymization I started to plan my second platform, but now instead of controlling mere DBA access, I wanted much more - providing fine-grained visibility and control across entire personal data-flows and processes. These are the same data-flows and processes that when reading the 100 pages of GDPR – it is all about!! I was looking for a new view point that will allow me to solve the puzzle and build the platform. The answer was clear. In a digital world, where everything is an application – from CRM, billing, applications on cloud datawarehouses and big data - the application is the Archimedes point. I regrouped my team and set course to build an application overlay and this is what we have created - CONFIDENTIAL -

SecuPi Solves it by Simply Putting a Jar on Your Apps Application UI & Other Interfaces Data flow Discovery Monitoring Masking/encryption/tokenization User Request Data Request Application Server (Java/.Net) User Response Data Response Data Deletion Consent Controls Classification and Labeling Monitoring Data Sources Masking SecuPi Overlay installed on Application Servers Documents Encryption/ tokenization Discovery and Classification Monitoring Masking SecuPi Central Management Servers Logs Encryption/ tokenization

SecuPi Solves All Technical GDPR Articles Solution Capabilities Main Compliance Requirements Article # |Article Name | SecuPi Feature Article # |Article Name | SecuPi Feature Processing of Personal Data Restriction of processing 5 18 Lawfulness of Processing Right to Data Portability Discovery, data-flow mapping 6 20 Conditions for Consent Right to Object User Behavior Analytics (UBA) 7 21 Conditions of Child's Consent Protection by Design & Default Monitoring & Auditing 8 25 Dynamic Consent Controls Processing Special categories Records of Processing Activities 9 30 SecuPi broad platform capabilities, including Discovery & classify data, Identify data-flows, Real-time monitoring, Auditing & Behavior analytics and Apply Subject Rights (logical deletion, dynamic masking etc.,) provides the most comprehensive GDPR coverage, addressing the different articles. Logical Deletion Processing of Criminal Records Security of Processing 10 32 Physical Deletion / Anonymization Right of Access Notification of Data Breach 15 33 Right to be Forgotten Communication of Data Breach 17 34

GDPR “Right to be forgotten”, Restriction of Processing in a Siebel CRM Application By installing SecuPi on-prem or on-cloud, we put an overlay on the application servers. Within FEW HOURS, already certain personal data is anonymized, redacted, masked or blocked, allowing access on a need to know basis, applying consent controls and logical deletion,

Enterprise Compliance Get Your Top-Risk Applications GDPR Ready in Few Weeks It is Fast to Deploy, No DB Agents, No Code-Changes Compliance Ready! SQL-Plus Toad Enterprise Compliance Time e-Commerce Campaign Mng. And the best for last: our ability to put our overlay on the applications, enables to within less than few weeks get your dozens top-risk applications GDPR ready! Marketing CRM Wave-1 Wave-2 Wave-3

SecuPi Protects your Applications Going to Cloud I started to plan my second platform, but now instead of controlling mere DBA access, I wanted much more - providing fine-grained visibility and control across entire personal data-flows and processes. These are the same data-flows and processes that when reading the 100 pages of GDPR – it is all about!! I was looking for a new view point that will allow me to solve the puzzle and build the platform. The answer was clear. In a digital world, where everything is an application – from CRM, billing, applications on cloud datawarehouses and big data - the application is the Archimedes point. I regrouped my team and set course to build an application overlay and this is what we have created CRM ERP e-Commerce Reporting Tools Applications Billing Finance Front-office HR-App SecuPi Central Management Server

When to call SecuPi: GDPR or “Right to be forgotten” Database Activity Monitoring (DAM) Data Masking Encryption Reach out to: alon@secupi.com