//GDPR compliance

GDPR features

The increased data security requirements of the General Data Protection Regulation means businesses have to protect data from unlawful processing and loss or destruction. 

If you’re struggling with how to ensure and maintain compliance, you’re not alone. But there’s good news, meeting the GDPR’s strict requirements is a lot easier with LogPoint’s “out-of-the-box” GDPR features for compliance monitoring and reporting.

LogPoint allows you to quickly detect unusual behavior in networks and applications to prevent misuse and data breaches with GDPR compliance monitoring. With static rules to detect the knowns, machine learning and advanced analytics to detect “as-is” and unusual activity in the network, it’s much easier to maintain compliance.

With LogPoint, you can:

  • Spot and track unauthorized network or systems access
  • Identify unusual patterns or rogue employee actions on an individual level
  • Empower your security team with analytics
  • Enrich and route logs with sensitive data to secure repositories

File Integrity Monitoring (FIM) is a compliance cornerstone. LogPoint’s native FIM features alert you whenever a new directory or file is created, deleted, renamed or altered in its content, so you can maintain an overview of your sensitive assets. Download our brochure to learn more:

Contact LogPoint

Get in touch with us and learn why leading brands choose LogPoint:

LogPoint SIEM detects Unauthorized Access

Spotting and tracking unauthorized network or systems access

LogPoint enables you to detect any suspicious and/or unauthorized network behavior such as connection attempts on closed ports, blocked internal connections, connections made to known-bad destinations, requests initiated from untrusted zones, suspicious system access and many more.

Example

Threats in higher privilege systems

Query

label=Connection label=Allow source_address IN PRIVILIGE_SYSTEMS | process ti(source_address)|search et_ip_address=* | rename et_category as category | chart count() by ip_address, category order by count() desc

LogPoint monitors International Data Transfers

Monitoring international data transfers

LogPoint’s intuitive visualization helps to plot data points for connection requests across the geopolitical boundaries. With an overview of top destination and source countries along with top inbound/outbound connections, LogPoint provides any organization with a detailed overview of cross-border data flow, ensuring lawful data transfer complying with the GDPR.

Example

Trend of outbound data transfer by geo location

Query

source_address=* destination_address=* | process geoip(destination_address) as country | timechart sum(sent_datasize) as OutboundData by country

LogPoint monitors International Data Transfers

GDPR report

LogPoint’s GDPR reports provide critical insight into how your network is actually performing. The reports support GDPR compliance reporting by helping to explain critical data flows and transactions on data, while providing the means to evaluate observed baselines and known-bad behavior from LogPoint GDPR compliance monitoring features. With this accurate, real-time view of the network, you can focus on areas that are non-compliant and plan for the future (or “to-be”) architecture by defining a transition plan. If you want to learn more about the GDPR and how it will affect your organization, take a look at our section on GDPR: When, Why and Who?

All LogPoint reports relate directly to the GDPR compliance reporting requirements as well as the ISO/IEC 27000 International Standard. The information will help ensure confidentiality, integrity and availability of your systems by monitoring your assets containing Personally Identifiable Information (PII) and allowing for business investigation into data loss.

LogPoint currently offers the following out-of-the-box GDPR compliance reports:

LogPoint GDPR File system and database activities and file access reports

File system and database activities and file access reports

Provide an overview of user access to files and data transfers to removable devices.

LogPoint GDPR Account management and data modification reports

Account management and data modification reports

Provide an overview of access management and user account rectification and erasure activities.

LogPoint GDPR General access reports

General access reports

Provide an overview of activity on the network including connections and access attempts.

LogPoint GDPR International connection reports

International connection reports

Provide an overview of cross-border data flow, ensuring your transfers are lawful.

LogPoint GDPR Policies reports

Policies reports

Provide an overview of your company’s policy changes, uncovering potentially damaging changes to the security structure of your system.

LogPoint GDPR Network access reports

Network access reports

Provide an overview of unsuccessful attempts to connect to your network to help identify potential threats.

LogPoint GDPR User privilege escalation reports

User privilege escalation reports

Provide an overview of user access to files as well as data transfers to removable devices.

LogPoint GDPR Mobile device activities reports

Mobile device activities reports

Provide an overview of your users’ mobile device usage and resource access attempts.

LogPoint GDPR Network security reports

Network security reports

Provide an overview of advanced persistent threats in your network and allows for investigation into data loss.