General Data Protection Regulation
GDPR breaches inflict financial and reputational damage
Since the introduction of the General Data Protection Regulation (GDPR), businesses need to ensure that any personal data stored on EU citizens is kept safe. GDPR protects the data of over 510 million people. It extends to EU citizens residing anywhere in the world and anyone who resides in or visits any of the EU’s 28 member countries. Breaches can lead to sanctions of up to €20 million or 4% of global annual turnover, whichever is the greater. Companies need to disclose data breaches to regulators, within 72 hours of their occurrence. This has the potential to inflict huge damage to both brand reputation and company valuation.
GDPR AND MOBILE SECURITY
A lot of IT departments are primarily focusing on protecting the data within their organization. But there is nothing unusual about an employee using their smartphone or tablet to access sensitive customer or company data. GDPR obliges businesses to demonstrate that they are implementing all reasonable efforts to protect mobile devices, both in terms of physical access to the device, and when the device is accessing online data. Mobile security is longer a nice to have, it is a necessity.
"Compliance is not a choice and ignorance is not a defence. By 2020, 40% of organizations will be in violation of GDPR."
VISIBILITY INTO YOUR NETWORK TRAFFIC ASSISTS GDPR COMPLIANCE
Visibility of your mobile data traffic is a key contributor to GDPR compliance. Asavie helps you understand what sites your employees are accessing so you can adjust and modify their usage policy dynamically to block malicious websites. By categorizing web content into trusted and untrusted domains we can automatically prevent accidental breaches by unintentional user behaviour. This provides a safer internet experience and denies hackers the opportunity to exploit vulnerabilities to steal personal data. Ultimately these insights enable organizations to manage their employees’ mobile experience and reduce the potential for data breaches.
With Asavie companies are secure in the knowledge that they are protected when employees use their mobile devices on cellular and Wi-Fi.
Network Layer Security
We protect data on the mobile network against vulnerabilities before they can affect the device and compromise data. Our private network-based service protects all devices across cellular and Wi-Fi networks and reduces the attack surface for hackers. Asavie stops malware before it can communicate with criminal servers. By making it a more secure environment to access and review private data, Asavie offers businesses an important capability for mobile data protection as part their GDPR compliance strategy.
We protect confidential and personal data on corporate devices by enforcing the application of usage policies for individuals and groups. We minimize the danger of malware or zero-day attacks by blocking malicious and unclassified domains. This ability to secure data through the entire lifecycle as it transits the network is a key enabler for GDPR compliance.
Asavie Moda physically protects the device with Password enforcement, Locate, Lock and Wipe functionalities on mobile devices like smartphones, tablets, laptops, routers and MiFis. This capability ensures that sensitive personal data is not compromised in the event of a lost or stolen device. As per GDPR, organizations that experience a data breach of personal data will have to notify data authorities within just 72 hours after discovery. It is crucial therefore to be able to act immediately since both accidental and unlawful breaches are equally penalizable.
Assurance that Asavie has implemented security best practices on your behalf
Asavie ISO certified means we manage information security based on the ISO 27001 framework so you have confidence in Asavie to worry about your secure connectivity needs. The ISO 27001 standard helps organizations to establish, maintain and continually improve an Information Security Management System (ISMS). The information security management system preserves the confidentiality, integrity and availability of information by applying a risk management process.