GLBA COMPLIANCE

Achieve GLBA Compliance with Advanced Security Solutions

The Gramm-Leach-Bliley Act (GLBA) states that all financial institutions doing business in the United States must implement appropriate information security controls to ensure the security and confidentiality of customer information, protect against unauthorized access to information, and prevent future threats.

Protecting Personal Financial Data Of US Citizens

Requiring Data Protection for All Organizations

The General Data Protection Regulation (GDPR) is intended to strengthen and unify data protection for all individuals in the European Union. It also affects non-EU companies that may hold personal data of EU citizens. Other jurisdictions are also implementing similar regulations to protect personal information.

Severe Non-Compliance Penalties

The penalty for is non-compliance is severe – fines of up to 4% of global turnover can be levied on a company for a personal data breach that contains EU citizen data – and organizations must be able to demonstrate compliance to the regulation.

Examples Of Addressed GDPR Compliance Requirements

Cygna Auditor primarily addresses topics in Chapter 2 (Principles) and Chapter 4 (Controller and processor) of the GDPR, though there may be other areas addressable depending upon your compliance implementation.

Check Box
Tier I

Objectives 2(4), 2 (6), 6 (3)

Check Box
Tier II

Procedures / A (Authentication and Access Controls)

Authentication (2) (4) (7)

Check Box
Tier II

Procedures / C (Host Security)

(7) (9)

Check Box
Tier II

Procedures / G (Application Security)

(1) (3) (7)

Check Box
Tier II

Procedures / M (Security Monitoring)

(1) (2) (5) (6) (7) (8) (9) (14) (18) (22)

Check Box
Tier II

Procedures / A (Authentication and Access Controls)

Access Rights Administration (1) (2)(4) (5) (6) (7)

Check Box
Tier II

Procedures / B (Network Security)

(8) (12) (19)

Check Box
Tier II

Procedures / D (User Equipment Security)

(3) (6)

Check Box
Tier II

Procedures / L (Data Security)

(2) (3)

Monitor Activity on Secured Systems

Cygna Auditor monitors all successful and failed data activity such as file or folder creation, access, updates, deletions, who made the changes and when they were made.

monitor-activity-secured-systems

Real-Time Notification of Sensitive Changes

Cygna Auditor's built-in and custom alerting notifies you of critical changes such as membership changes to privileged groups.

real-time-notification-of-sensitive-changes

Privileged Account Management

Cygna Auditor allows you to monitor all changes made by privileged accounts to ensure they adhere to regulatory and organizational policies for the protection and privacy of data as well as that they do not abuse their unrestricted access.

privileged-account-management

Request Your Personalized Demo

Our experienced engineers will fine-tune the demo based on your specific needs. You’ll find out how easy it can be to secure your sensitive data.

cta-demo