Our software fully supports the GDPR process with Regulation (EU) 2016/679 articles built in, providing the DPO with a ready-made suite of tools to model business processes, define what sensitive data exists and where it is, and perform multi-phase Data Privacy Impact Assessments. Click here to read more


  • Fastest route to GDPR compliance
  • First reports within four weeks
  • Aim to be compliant within 6 months
  • Demonstrate compliance easily
  • Most comprehensive tool (consent rules, SARs, breach notification, Article 30 report, etc)

Get ready for General Data Protection Regulation (GDPR)
with the No.1 software toolkit

    Comprehensive view of where Personal Identifiable Data resides in your organisation - Scored readiness evaluation and graphical illustration of compliance gaps - Roadmap for compliance with recommendations for immediate action - Insights to start building a robust data protection framework and inform your future technology choices - Helps meet the regulation requirements at a reduced cost, and potentially huge fines mitigated, not to mention reputational damage averted - Snapshot of legal landscape and your potential exposure - Easy, fast breach reporting - Vendor risk management for audits

An introduction to GDPR

What is the fuss about?

Are you ready for it? The regulation comes into force in May 2018 and it’s going to be huge to borrow a trumped up term. The Regulation will increase the complexity of cyber security greatly. It’s a European Regulation, therefore legally binding, and will apply to most organisations worldwide that hold any personal data on any EU citizen. Brexit doesn’t change anything – we already know that the UK Government will implement the regulation. If you control or process data that includes the personal information of any EU citizen, then the regulation is likely to apply to your organisation. The exceptions are where organisations have an exemption – these apply in state security scenarios rather than for business size or purpose reasons. Outsourcing a process does not absolve you of responsibility for data you control.

Is GDPR the same as the Data Protection Act?

No. This is a considerable step up. The DPA was introduced before we had social media or digital business, and at a time when hacking was a computer geek’s hobby rather than a cyber criminal’s occupation. The term ‘identity theft’ didn’t exist and we didn’t live our lives online. GDPR goes well beyond data protection controls. It places data protection obligations on organisations supported by severe fines for failure (up to the greater of €20m or 4% of turnover) and mandatory data breach reporting. It gives consumers greater control over their data, including the right to correct it, to have it deleted or to withdraw consents previously given, all within relatively short timescales.

Will it be a problem for me?

This is quite possibly the biggest legislative change in any of our careers. Therefore, we would urge you to begin this process now. Most organisations with 250+ staff will need to appoint a Data Protection Officer. In order to meet the timelines of the regulation we would suggest early appointment of your DPO is critical so they can coordinate the overall plan of action.

The larger and more diverse the organisation, the more complex and challenging this activity becomes. And because risk is at the heart of the regulation (the standard mentions risk some 75 times) we believe that it is best managed by your risk management system. Proteus®GDPReady™ helps organisations become and remain compliant with the regulations, providing a roadmap for compliance with recommendations for immediate action.

Proteus-Cyber's Proteus®GDPReady™ software can help you:
  • Perform enterprise wide online audits against the
  • Guides you through the process with an integrated project plan
  • Easily survey the business for processes using personal data
  • Maintain a process/data mapping register (Article 30)
  • Model your business processes
  • Report your levels of compliance against the regulation
  • Breach notification (Article 33)
  • Identify non compliances and manage them with project plans
  • Perform data privacy impact assessments (PIAa/DPIAs)
  • Perform risk assessments against business processes with pre defined threats and vulnerabilities
  • Maintain a register of assets, what data is on them and levels of data protection
  • Cross reference your documents and controls against your business processes
  • Graphically view your data flows across international borders
  • Audit your data processors and make sure those suppliers are protecting your data properly
  • Educate your staff with online privacy Awareness Training and create a security culture within your business
  • Processor risk management for audits
GDPR features GDPR Geodata GDPR what to do

What do I need to do? GDPR what to do

GDPR timeline GDPR timeline

Latest Security News

Here's the latest security news from around the internet

Retweeted ICO (@ICOnews): The Crown Prosecution Service (CPS) has been fined £325,000 after they lost unencrypted DVD recordings of victim interviews:

2018-05-17 23:07

Retweeted ICO (@ICOnews): The GDPR contains explicit provisions about documenting your processing activities. We have updated the section on documentation in our guide to the GDPR. #ukbizlunch

2018-05-17 12:11

Retweeted Graham Cluley (@gcluley): r/t Four-million Facebook users' data wide open for anyone to download for years

2018-05-16 23:34

Dutch Tax Authority not fully #GDPRcompliant as the deadline approaches.

2018-05-16 15:06

A recent survey has revealed nearly 60% of organisations view the EU’s #GDPR positively, rather than as a #compliance problem. Get #GDPReady now, our comprehensive tool fully supports the #GDPR process @

2018-05-16 14:54

#Cybersecurity spend to exceed US$1tn in 5 years to 2021: losses to hit US$6tn

2018-05-16 14:41

41% of #cybersecurity apps contain high-risk open source #vulnerabilities

2018-05-16 14:33

Our s/w fully aids the #GDPR process with Reg (EU) 2016/679 articles built in, giving the DPO a ready-made suite of tools to model business processes, define what sensitive data exists and where, and perform multi-phase Data Privacy Impact Assessments.

2018-05-16 12:33

New research shows hyper-connectivity is heightening #cyberrisks at airports, and they are ill equipped to deal with major #cyberattacks

2018-05-16 12:24

A report by the US Department of Homeland Security would suggest that the US national #cyber defence strategy is moving to one similar to that used in the UK

2018-05-16 12:10

Despite potentially huge fines under #GDPR, a recent survey found over 50% of SME's are more worried about damage to their reputation! Get #GDPReady now with us @Proteus_Cyber

2018-05-16 11:10

Massive #databreach of Rail Europes servers lasted nearly 3 months before the firm was alerted to a possible #breach by one of its banks.

2018-05-16 10:21

Latest Press Releases

Proteus-Cyber Launches First comprehensive software toolkit for GDPR

Proteus-Cyber Ltd, specialists in Integrated Risk Management software, are excited to release Proteus®GDPReady™. They believe this to be the first GDPR software toolkit on the market that fully supports the GDPR process and helps DPOs to get and keep their organisations GDPR compliant.

Link to article

More and more extra great features

Proteus®GRCyber™ is the most comprehensive integrated Governance, Risk and Compliance product on the market.

Connect to anything

Integrated GRC

Proteus®GRCyber™ allows you to integrate your existing cyber security systems into a single, integrated, web based, multi-agent cyber protection system. With this capability you can systematically and regularly test each and every control applicable to your business.

What you have

Network Discovery

We collect every IP packet your network produces. With this information we can build a network chart of your infrastructure and highlight insecure or unmanaged assets. Additionally, you can use our relationship browser to view the modelling of business processes to assets, controls, documentation and incidents.

Delegation and Workflow

Enterprise Compliance

In the multi-user versions of our product you can link to your active directory and delegate controls around the organisation so that each control is answered by the person responsible for it. This process is more time efficient and accurate in collecting responses, policies and procedures.

Local Standards

Authoring your own standards

You can author your own standards into our compliance engine. These can be bespoke standards or your implementation of an international standard. Furthermore, you can model the relationships between your controls and your ISMS.


Please contact one of our country partners to find out more about or to purchase Proteus®GRCyber™

Our Team

With many years of experience in the business, our team knows how to support our customers

GDPR executive Chris Greenslade

Chris Greenslade

Chris is the Sales Director, founding partner and owner of Proteus-Cyber Ltd. Passionate about customer satisfaction, Chris would like to discuss with you how Proteus®GRCyber™ could help your business become secure and more profitable.

GDPR executive John Clelland

John Clelland

John is the Managing Director, founding partner and owner of Proteus-Cyber Ltd. He is an expert in encryption and security systems with over 25 years’ experience architecting specialist IT systems.

GDPR executive Craig Mason

Craig Mason

Craig is the Proteus®GRCyber™ software architect, founding partner and owner. His knowledge of cross-platform architectures and large scale web-based applications has particular relevance to the Proteus®GRCyber™ development program he has led.

Contact Us

If you would like to know more about Proteus-Cyber and our services please feel free to contact us:
Proteus-Cyber Ltd.
Registered in the UK and Wales 07239733.
VAT registered GB 991 1452 13
20-22 Wenlock Road
N1 7GU
United Kingdom
P: +44 (0)208 123 7708
© 2017 Proteus-Cyber Limited
‘Proteus’ is a registered trademark. All rights reserved.

Proteus-Cyber is passionate about helping companies use their existing infrastructure in conjunction with Proteus®GRCyber™ to create a single, integrated, web based, multi-agent cyber protection system to secure their businesses in the current climate of insecurity. or follow us on social platform

GDPR zoomcharts

© 2017 Proteus-Cyber Ltd.