Proteus-Cyber are a UK company who are specialists in Data Privacy Regulation and own the award winning software Proteus®NextGen Data Privacy™, which deals with all aspects of the GDPR, CCPA and other privacy regulation and provides the DPO with a ready-made suite of tools to model business processes, define what sensitive data exists and where it is, and perform multi-phase Data Privacy Impact Assessments.
It is a comprehensive digital security application, that brings together all your security products under one security framework, systematically testing each and every control deployed, pro-actively preventing security breaches.
Research By: Cassandra Cooper, Info-Tech Research Group June 26, 2020
Proteus-Cyber, a leading vendor within the privacy program management space, has recently added new standout features to its current privacy software offering. The Threat Intelligence feature tracks and links directly to Common Vulnerabilities and Exposures (CVEs) discovered daily and can be integrated within the IT asset register of current Proteus-Cyber NextGen Data Privacy users.
This useful new feature bridges the gap between privacy processes and supporting controls and the potential cybersecurity threats that pose a significant barrier to ensuring data is adequately protected. The feature is available for free as a part of the vendor’s public website. The true benefit of the feature is the ability that current Proteus-Cyber users will have to directly identify which incumbent threats may leave them vulnerable based on their systems and current patching cadence. Users can sort through CVEs based on type, company, and application, and much like the vendor’s Privacy News Tracking feature, new updates and relevant threats are constantly added.
In addition to this feature, Proteus-Cyber has also segmented its privacy program management software into Express and Enterprise formats. The former intended for organisations that choose to focus on immediate resolution of potential points of exposure from a privacy perspective, while the latter benefits organisations choosing to take a proactive and comprehensive approach to privacy program management.
The complex world of data privacy is heavily linked to the cybersecurity realm, although discord often exists between the two owning parties. While privacy management is process oriented, an effective data privacy program necessitates robust supporting technical security controls. After all, a data privacy program intends to safeguard an organisation’s sensitive personal data, a feat that involves protection from external as well as internal breaches.
Proteus-Cyber’s Threat Intelligence integration identifies a gap that exists in connecting data privacy to its supporting security controls. IT leaders seeking a more comprehensive look into their data privacy program as well as the ability to identify threats that may expose the organisation to data privacy harm should evaluate NextGen Data Privacy, as the software solution moves beyond a “tick-box” approach to privacy management. Organisations that effectively integrate security controls to address gaps in data privacy to protect from real-world vulnerabilities are those well poised to move beyond compliance and effectively safeguard sensitive personal data from potential breach.