Softcat work with a range of partners that can provide solutions to help you move towards GDPR compliance.

Learn More




AlienVault and GDPR

Purchasing and managing several point security solutions to prepare for GDPR compliance is costly and complex for resource-constrained security teams.

AlienVault's Unified Security Management (USMTM) eases and accelerates GDPR compliance readiness by combining multiple essential security capabilities you need to demonstrate compliance into one unified, affordable solution. AlienVault USM delivers asset discovery and inventory, vulnerability assessment, intrusion detection, behavioural monitoring, SIEM, log management, and integrated threat intelligence—all in a single pane of glass.

Within one solution for security monitoring and compliance management across your cloud and on-premises infrastructure, AlienVault USM helps you to prepare to meet GDPR compliance requirements quickly, easily, and affordably.

With AlienVault USM, you can:

  • Demonstrate that you regularly test, assess, and evaluate security practices with built-in asset discovery and vulnerability assessment capabilities
  • Prepare for forensic investigation with log retention and management
  • Monitor your critical systems and services with network intrusion detection (NIDS), host intrusion detection (HIDS), and cloud intrusion detection (CIDS)
  • Stay in line with security best practices through threat intelligence updates continuously built into the product by security experts

AlienVault supports us with...


Starting on Day One, AlienVault USM supports GDPR compliance readiness by helping you detect data breaches, monitor data security, and document your compliance readiness. With complete security visibility from a single, unified solution, you can identify vulnerabilities before they affect personal data and easily monitor your environments for potential intrusions.

Related resources...

[AlienVault] Detecting threats in a world of mega breaches



Barracuda and GDPR

The imminent implementation of GDPR presents challenges to organizations of all sizes. But these challenges also represent an opportunity to evaluate and improve your strategies for securing data in all forms and across all your network surfaces.

Barracuda solutions can help ease your GDPR compliance by securing personal and business data, preventing data breaches, and providing powerful reporting features that allow you to deliver breach notifications when required.

  • Secure personal data with state-of-the-art technology

Barracuda provides integrated security solutions that employ state-of-the-art security and data protection across multiple threat vectors. The solutions can be deployed across on-premises, private, and public cloud environments, to protect your data with consistent security policies that are centrally managed from a single pane of glass.

  • Prevent data breaches and data loss

Barracuda provides solutions that are able to inspect outbound network traffic for signs of malicious activity. They prevent spyware, keyloggers, and other malware from transmitting sensitive data outside the network. They are designed specifically for highly distributed, cloud-connected networks, to help you prevent breaches even as your hybrid infrastructure evolves and changes.

  • Providing breach notifications

Barracuda user-friendly security solutions provide detailed logs, reports, and dashboards that include information about users, IP addresses, geography, websites, applications, threats, severity, audit logs and more. This makes it straightforward to create detailed and required notifications if a breach occurs.

Barracuda supports us with...


Barracuda NextGen Firewalls are purpose-built for highly distributed and cloud-connected environments.

Barracuda Web Application Firewalls identify and remediate your website and web application vulnerabilities using comprehensive reverse-proxy-based protection.


Barracuda Backup creates secure, redundant, real-time, 256-bit AES encrypted backup of your offsite replicated data.

Barracuda Message Archiver is a cloud-connected email archiving solution that captures and securely stores an unmodified copy of every message at the time it is sent or received.

Related resources...



BlackBerry and GDPR

BlackBerry has a portfolio of tools and services that can help organisations manage their way through GDPR compliance.

  • BlackBerry Enterprise Mobility Suite provides a flexible approach to services that offer security and productivity while helping maintain compliance with GDPR. As an organisation's needs evolve the Enterprise Mobility Suite provides the ability to add more capabilities as needed.
  • BlackBerry Workspaces gives your organisation visibility and control of corporate, customer, and personal data to comply with GDPR.
  • BlackBerry provides a full range of cyber-security consulting services and can help you plan, deploy and manage your GDPR project.

BlackBerry supports us with...


BlackBerry Workspaces allows you to have full control of files shared internally and externally. You decide who gets access, for what purposes and for how long and it also allows you to dynamically revoke access to affected files at all time.
BlackBerry UEM allows you to manage and control the mobile endpoints used in your company. You can secure data access and storage on the endpoint. You can remotely delete affected endpoints to make sure no PII is compromised.

Related resources...

[BlackBerry] Practical GDPR - What it means for you and your business



Blancco and GDPR

For 20 years, Blancco has offered solutions that support compliance with data protection regulations such as the EU GDPR. Blancco Data Eraser solutions allow organizations to securely remove personal data on a variety of IT assets, from laptops to servers, to satisfy both data minimization and 'right to erasure' requests.

Blancco supports us with...


  • Achieve compliance with the 'Right to Erasure'
  • Permanently erase data on all storage devices
  • Guarantee data is unrecoverable


  • Centralised management and reporting
  • Enforcement of data removal policies
  • A tamper-proof erasure audit trail

Related resources...

[Blancco] Meeting the 'Right to Erasure'



Check Point and GDPR

The European Union's General Data Protection Regulation ("GDPR") is a game changer for data protection. Its broad scope applies to any organization worldwide that handles any EU citizen's private information. It imposes an extensive list of protections on that data, limitations on how it is used, and customer notifications and consent in a wide range of situations. Crucially, GDPR mandates significant penalties for non-compliance. GDPR takes effect in mid-2018, which means organizations need to start planning their strategy for compliance now. Check Point solutions enable organizations to take immediate steps towards compliance with minimal impact to applications and operations.

Check Point supports us with...


Until GDPR implementation guidelines and certification standards are better established, organizations can leverage existing methodologies that are based on a risk-based approach. Check Point's Software Defined Protection (SDP) is such a model. The SDP architecture uses a three-tiered security approach that partitions the security infrastructure into three interconnected layers.



Cisco and GDPR

Cisco has a unique position with a strong world-wide presence in business consulting, technology, data processing, cloud computing, analytics, collaboration, cyber security?and technical and advanced services. Hence, Cisco has an immense opportunity to make a huge impact, by taking to market services and solutions, through selected partnerships, which will allow organisations reach compliance by the May 2018 deadline.

Cisco Security Technology solutions can help the customer to raise his security level, protect its data against leakage, and detect attempts to access the data without the necessary authorisation level.

Cisco supports us with...


Address GDPR regulatory requirements, Cisco can help you:

  • Assess applicability of your organisation's data, partners and entities to GDPR compliance
  • Understand the current state of your compliance programme and the steps to create an ?effective privacy programme which meets the requirements of GDPR
  • Perform a review of your GDPR compliance programme to adjust for changes in business services, new markets, adoption of technologies, use of partners and changed regulations
  • Identify other privacy obligations anticipated by your business plans


Speaking to customers about these real-world security problems can be challenging. Cisco has come up with solutions that address these business security challenges across the attack continuum. Cisco is the only vendor who can address security risks from the network, to the endpoint, and to/from the cloud.

  • Stop threats at the edge
  • Protect users wherever they are
  • Control who gets onto your network
  • Find and contain security issues fast


The average amount of time to detect a breach in a business is between 100-200 days. At Cisco, we bring that down to 9 hours across the globe. This, coupled with our Stealthwatch technology, which helps quarantines breaches, will help businesses identify what has happened and how best to stem the damage – both now and in the future.


Develop a GDPR compliant Privacy and Data Protection programme to support the specific needs of your organisation and the mandated regulations.

  • Perform an evaluation of GDPR requirements and obligations
  • Understand specific business needs, information lifecycle, growth plans and use of technology
  • Perform a PIA to establish the personal data that is being collected, why it is being collected and how it will be used, secured, shared and stored
  • Assess existing programme against a custom set of relevant process maturity goals
  • Development of a comprehensive privacy programme roadmap to meet both the needs of the business and GDPR compliance requirements

Related resources...



Clearswift and GDPR

Clearswift's real-time monitoring and adaptive security technology can transform your existing IT environment into a compliance machine. We can not only help get you out of the GDPR starting blocks with our data discovery solution, our unique Adaptive Data Loss Prevention (A-DLP) technology will protect your critical data as it flows across email, the web and your cloud collaboration applications to ensure you comply with the GDPR.

Whether its sensitive data hidden inside the network or shared across cloud, Clearswift will automatically detect it and secure it - without complexity or disruption to communication flow. Clearswift will give you control and visibility of your organisation's critical information with technology recognised on Gartner's Magic Quadrant for Data Loss Prevention (DLP), to protect your organisation from data loss risks and breaches.

Clearswift supports us with...


Securing PII data (or other sensitive data) automatically will be key to achieving and maintaining compliance. Doing so without impacting the ability to communicate freely will be essential to retain an organisations productivity whilst complying with the GDPR. Clearswift's A-DLP solution surgically edits out PII content automatically and in real-time, achieving the otherwise elusive balance between security and productivity.


Being able to respond to a 'Right to be Forgotten' request is a critical element to GDPR. The same Clearswift technology that helped to scope your PII data, can also deliver full reporting on a specific set of data. It can also securely relocate data to a central repository – fully audited.

Related resources...



Commvault and GDPR

Commvault software provides compliance tools that enable profiling, search, discovery and management of data, whether on-premises or in hybrid and multi-cloud environments. Our software helps you assess and manage your exposure by proactively dealing with personal data in your datacentre, on laptops and in locations such as O365.

Commvault supports us with...


Commvault governance software:

  • Profile and heatmap data
  • On-premises and O365
  • Assess data breach exposure


Commvault compliance software:

  • eDiscovery for email & files
  • Secure/archive/delete data
  • Laptop data loss prevention



CyberCrowd and GDPR

Cybercrowd provides ongoing regulatory guidance and support as Data Protection Officer and Data Protection Manager as-a-Service. We also offer GDPR awareness, readiness and auditing consultancy for businesses of all sizes, as well as data-mapping, security posture reviews, plus design and implementation of compliance frameworks.

CyberCrowd supports us with...


  • Awareness and Readiness
  • Security Posture Reviews
  • Auditing

·       Awareness and Readiness

·       Security Posture Reviews



  • Data Protection Manager as-a-Service
  • Data Protection Officer as-a-Service
  • Ongoing Support Packages


  • Data-mapping
  • Framework Design
  • Framework Implementation

Related resources...



Cylance and GDPR

Cylance is the first company to apply artificial intelligence, algorithmic science and machine learning to predictively secure endpoints and servers. In the GDPR context, stopping the attack stops the breach; eliminating the high-cost, resource-heavy incident response, investigation and clean-up activities required by legacy detect and response options.

Cylance supports us with...


  • Predict attacks with AI & machine learning
  • Prevent malware execution with CylancePROTECT
  • Protect against threats with CylanceOPTICS



Druva and GDPR

Druva enables organisations in their journey to achieving GDPR compliance through the Public Cloud. Druva delivers secure backup and proactive compliance capabilities as a service across endpoints, servers and cloud applications (Office 365, Google Docs and Box).  As GDPR requires organisations to have complete control of EU citizen information no matter where it lives, Druva maximises insight across all sources of critical data with deep analytics, search, and erasure capabilities.  Druva removes the data silos that encumber businesses by delivering a unified view over data--  from the datacentre to the mobile edge to cloud applications.  Using the public cloud, Druva allows organisations to comply with GDPR, as well as other compliance regulations, whilst modernising their data protection strategy on demand and at the scale required to securely assess, manage, and process information in the Zettabyte Era.

Druva supports us with...


Druva Cloud Data Protection implements security and data privacy as core design principles by default.  All data-in-flight and data-at-rest is encrypted using state of the art TLS 1.2 and AES-256.  With zero vendor or third party access, organisations can be assured that their information is secure and only accessible by them.


Druva Cloud Data Protection provides a complete information governance framework that manages data from cradle to grave.  With robust search and legal hold capabilities, Druva Cloud Data Protection can manage and preserve information across all enterprise data sources.

Related resources...

[Druva] Inevitability: Cyber Breach & GDPR



Egress and GDPR

Data is often most vulnerable at the point it is shared. This could be the result of an email being sent to the wrong recipient, or data being shared via a third-party collaboration website. GDPR will require organisations to be able to demonstrate they have put in place the necessary technology and training to protect shared information. This should include policies that can automatically apply encryption, so that regardless of a breach, the underlying data remains secured.

Switch Threat Protection prevents emails from being send to the wrong recipient, using machine learning and big data analytics.

Switch Secure Email and File Transfer enables end users and their third-party recipients to easily and securely exchange sensitive data. Uniquely, business retains control of how data is accessed, even after sharing.

Switch Secure Workspace is a secure online environment for sharing files and collaborating with multiple users in real-time.

Switch Email and Document Classifier enables end-users to mark the sensitivity of files and ensure they are handled securely.

Switch Secure Vault indexes, archives and enables search through both encrypted and clear text email content, proving governance professionals the ability to rapidly conduct search and e-discovery to demonstrate compliance.

Egress supports us with...


Egress is the leading provider of data security services designed to protect shared information throughout its lifecycle. Offering Public Sector and Enterprise customers a portfolio of complementary services, the Egress Switch platform enables end-users to share and collaborate securely, reducing the risk of loss and maintaining compliance.


Egress gives businesses the auditing and reporting features they require to implement secure messaging solutions while maintaining GDPR compliance. We help organisations ascertain whether they could respond to a breach within 72 hours, and to manage other demands, such as Freedom of Information requests or Subject Access Requests.

Related resources...

[Egress] Email, GDPR and personal data



F5 and GDPR

Data encryption is a key component in maintaining secure systems and complying with GDPR. The regulation, however, calls out other areas of information governance to which you must adhere in order to be compliant. The fundamental threats to information security are data leakage, violation of integrity, denial of service and authorised use of information and these are addressed in Article 32 of the regulation. It specifically calls out confidentiality, integrity, availability and resilience as components you must provide in order to deliver data protection.

F5 Networks provides solutions for all aspects of a comprehensive data security strategy, including strong encryption, web application protection from cyber hacks, mitigation of denial of service attacks and high availability and resilience from site or cloud outages.

F5 supports us with...


To be secure, your applications must have strong access control, provide strong encryption and be always available. F5 provides platforms and hosted cloud services to ensure that your apps are encrypted, tightly controlled and protected from outages, cyber threats and denial of service attacks.

Related resources...



Forcepoint and GDPR

There are three core use-cases where Forcepoint technologies such as Forcepoint DLP and Forcepoint CASB help organisations with GDPR compliance:

  • The need to inventory personal data
  • The need to map, manage & control the flow of personal data
  • The need to respond to personal data breaches in a timely manner

Forcepoint supports us with...


  • Monitor data flows
  • Detect data breaches
  • Prevent data/PII loss

Related resources...

[Forcepoint] How to identify and protect your data



HP Inc and GDPR

The World’s most secure printers.

Protect, detect and recover with the latest generation of HP Enterprise printing devices that are unique in the marketplace. They offer three key technologies together designed to thwart attackers efforts and self-heal. These features automatically trigger a reboot in the event of an attack or anomaly.

HP Sure Start– validates the integrity of the BIOS at every boot cycle, if a compromised version is discovered, the device restarts using a safe @golden [email protected] of the BIOS.

Whitelisting – helps ensure that only authentic, known-good HP code that has not been tampered with is loaded into the memory. If an anomaly is detected, the device reboots to secure, offline state. It then sends a notice to IT to reload the firmware.

Run-time intrusion detection– helps protect devices while they are operational and connected to the network. This feature checks for anomalies during complex firmware and memory operations. In the event of an intrusion, the device automatically reboots.

HP can help you to define the right policies to put in place to improve the security of your printing environment and with the World’s most secure printers can ensure that you are selecting best in class technology to protect your data in readiness for GDPR compliance.

HP Inc supports us with...


Protect the Device and your network with printers that can detect and prevent attacks in real time.

Protect the Data with HP software solutions that help ensure only authenticated users and devices access your print network and keep your data encrypted.

Protect the Document with security solutions to reduce unclaimed print jobs and deter tampering or fraud.

Manage printing securely with HP JetAdvantage Security Manager and HP Secure MPS

Related resources...



Informatica and GDPR

Informatica helps organisations with:

  • Informatica [email protected] discovers, assesses, analyses, and visually maps in-scope sensitive data
  • Informatica Axon defines and governs in-scope data
  • Informatica Enterprise Data Catalog provides a machine learning-based engine

Informatica supports us with...


Informatica [email protected]

  • Discovers
  • Assesses
  • Analyses
  • Visually maps in-scope sensitive data wherever it resides


Informatica Enterprise Data Catalog

  • Scans, catalogues and indexes data assets for enterprise-wide discovery

Informatica Axon

  • Defines
  • Governs in-scope data

Related resources...

[Informatica] GDPR and Data Management - Driving value from compliance



Ipswitch and GDPR

MOVEit is a Secure Managed File Transfer solution that ensures all external data sharing processes are secure and in compliance with data protection regulations like GDPR. Features include:

  • Enhanced Security and Compliance
  • Flexible Deployment and Access Options
  • Minimize the Risk of Data Loss

Ipswitch supports us with...


MOVEit provides:

  • Secure file transfer & collaboration
  • Compliant
  • Workflow automation
  • On-premises or in the cloud

Related resources...

[Ipswitch] File Transfers: The Achilles Heel of GDPR Compliance?



Ivanti and GDPR

Ivanti offers a range of security solutions to help you meet your multi-layered protection and automate and secure the digital workspace of today. Our solutions in both Service management and Endpoint security help organisations protect PII data and respond and comply to GDPR. The Ivanti Patch Management offerings will help your organisation ensure timely and automated patching of operating systems and applications (including all non-Microsoft applications).

With an increased number of mobile and cloud users, the digital workspace is more vulnerable than ever. To maintain compliance, organisations should augment their traditional security approaches with a people-centric approach to security and access management practices. This approach can help with GDPR compliance by implementing and enforcing data retention policies and not allowing data to be stored in multiple places. Ivanti can also verify the identity of those accessing the data, manage dynamic privileges, apply security controls based on context, protect against malware though whitelisting, and more.

Ivanti allows you to automate any manual processes and ensure data protection policies are enforced, leaving you with an audit-ready compliance plan. Leverage log reports for auditors to report on workspace changes, SLA details, as well as worker access and license usage data. Manage who has access to what data and monitor the actual use of app per worker, per app or per server.

By combining endpoint security with Service management, Ivanti customers can automate and comply with regulations without affecting user experience and get quick time to value in days, not months or years.

Ivanti supports us with...


The applications your people use to view documents, images, and email, and access customer data are all vulnerable to multiple exploits. Ivanti makes sure your security policy includes timely patching of applications (including non-Microsoft) and operating systems, with the ability to raise, lower or even eliminate privileges dynamically on a user, application, or task basis – keeping both users & organisation safe and productive.


Ivanti helps streamline the implementation and enforcement of most processes and policies. You determine your processes or policies, then utilise Ivanti to automate manual processes by building them into a workflow, ensuring the policy is enforces and leaving you with an automated and audit-ready compliance plan.

Related resources...



McAfee and GDPR

GDPR is a transformational opportunity for all organisations. It's designed to protect EU citizens data in an ever-connected world, for organisations this is perhaps an opportunity to look at how they are providing secure services to consumers and employees and how they may evolve these services in an ever more complex and resource-constrained environment.
It is a new regulation that affects the full data lifecycle from collection, processing, storage, usage and destruction. It requires organisations to implement appropriate measures to protect personal data (IP address) but is not prescriptive in the controls
From a security team's point of view, GDPR is an opportunity. Meeting the GDPR requirements means putting in place processes and technologies that are appropriate for the challenges we now face and also ensure we can provide transformation services to citizens, employees and customers. These 'challenges' include Device Proliferation, adoption of cloud services, DevOps and dealing with the ongoing skills shortage in Cyber and Data Protection.

McAfee technology can help alleviate these challenges and addresses a large number of the risk factors impacting data protection:

  • Poor Data Governance (knowing where your data is)
  • External Attackers
  • Internal Risks such as accidental or malicious insider activity.

McAfee supports us with...


Our solutions protect against malware infection, accidental loss and malicious theft, cloud-related risks and application/database exploitation. Speak to us about Endpoint Protection and Encryption, Data Loss Prevention, Web Gateway, and Application Control.


Related resources...



Mimecast and GDPR

Mimecast's integrated cloud suite eases the General Data Protection Regulation (GDPR) compliance and improves email cyber resilience in the cloud.

Mimecast Targeted Threat Protection protects the organisation against spam, viruses, malware, emerging threats and other challenges to ease compliance with GDPR regulations. Mimecast Content Control and DLP enforce security controls in real-time to prevent intentional or accidental leakage of personal or sensitive data and help mitigate GDPR risks. Mimecast Secure Messaging safeguards employee communication with encrypted email communications.

Mimecast Cloud Archiving offers comprehensive search, e-discovery and compliance support for GDPR Subject access, rectification, portability requests and consent withdrawal. Personal information from email archives, network shares and folders is retrieved in seconds, allowing compliance professionals to filter, tag and annotate search results for further review if needed.

A single, intuitive console makes it easy for IT administrators to configure all Mimecast services, with all access logged to help audit compliance with GDPR policy.

Mimecast supports us with...


Mimecast Targeted Threat Protection defends organisations from spear-phishing, ransomware, impersonation and helps mitigate GDPR fines.

Mimecast Content Control and DLP protects against the leakage of intellectual property and other sensitive data to ease compliance with GDPR regulations.

Mimecast Secure Messaging secures sensitive communications and files as easily as sending email.


Mimecast Cloud Archiving offers comprehensive search, e-discovery and compliance support for GDPR Subject access, rectification, portability requests and consent withdrawal. Personal information from email archives, network shares and folders is retrieved in seconds, allowing compliance professionals to filter, tag and annotate search results for further review if needed.

Related resources...



Snow and GDPR

Softcat's partnership with Snow Software is so intrinsic that we have integrated their SAM technologies into our own services, and it is the very first name we recommend when it comes to asset management. That's why we're so confident in their GDPR Risk Assessment solution.

Snow GDPR Risk Assessment provides complete visibility of all devices, users and applications across on-premises, cloud and mobile, augmented with GDPR-specific risk assessment to build an effective GDPR plan and response. Automated discovery provides a detailed accounting of which users have access to which applications and cloud services and how they are used.
Out-of-the-box reports assist with common GDPR use cases while powerful datasets enable you to export and manipulate data for any purpose.

Snow supports us with...


Knowing who has access to key software applications and data and who uses key applications will enable the tracing of users in the event of a security breach. A large proportion of security breaches are internal, either deliberate or through negligence. Deploying Snow's GDPR solution will help identify who is responsible for a data breach and in some cases, enable preventative measures.

Related resources...



Sophos and GDPR

The GDPR deadline is quickly approaching and the level of data protection and data security measures any company choose to implement will vary from business to business and in most cases will be dependent on the amount of risk that the company is prepared to face vs cost and effort.

Sophos recommends that all organisations should prepare for the GDPR by preventing the top reasons for data loss to as part of their data security strategy: stop hacking and malware, protect against ransomware, and have solutions in place that protect data on lost or stolen devices. A great place to start GDPR preparations is with easy-to-deploy solutions managed by the unified, easy-to-use, and cloud-based Sophos Central admin interface, for example, Sophos Intercept X, Sophos Endpoint Protection, Sophos Central Device Encryption and Sophos Mobile.

For additional risk mitigation, companies can increase their data security levels by stopping the threats at the network with Sophos XG Firewall, or protect themselves against the more difficult reasons for data loss, for example, human error and unintentional data leakage, with Sophos SafeGuard Encryption.

Sophos supports us with...


Keeps your endpoints secure from the latest malware and ransomware with Intercept X. 

Take this 60-second compliance test and identify the areas of non-compliance within your business. 

Related resources...

[Sophos] Data Breach Deadlines - The Impact of GDPR



Symantec and GDPR

So, your data is at risk and GDPR feels like a burden. Do you know how much personal, sensitive information you have in your on-premise environment, and how much is transacted in the cloud? Can you be certain you'll be able to react swiftly and in accordance with the GDPR's new requirements?

Symantec helps organisations cut through the complexity, support compliance and become better businesses through enhanced visibility and data protection.

Symantec can give you better visibility and control over:

  • Information – types of information collected, held and processed, data sensitivity, data processing and storage locations, data retention rules, access permissions and data-loss, misuse and breach consequences – Symantec Data Loss Prevention
  • Information and Communications Technology – the security of all systems (on premise, in the cloud & mobile), vulnerabilities, advanced threats, web access/browsing and current views with regard to compliance with standards – Symantec Threat Protection Stack
  • Users – Controlling user access, identifying risky users based on behaviour and leveraging that knowledge to control access, monitor and protect 'in use' information – Symantec Data Loss Prevention & Cloud Access Security Broker (CASB)
  • Cloud applications – what is being used, who is using them, risk profile of services and the types of information being stored - CASB

Symantec supports us with...


Protect: use policies to prevent employees and hackers from misusing or stealing data.

We can secure data on-premise and, in the cloud, using 'DLP prevent controls'. This, combined with our Threat Protection technologies such as Next Gen Endpoint Protection, Advanced Threat Protection and Bluecoat Web Protection, secures your network from malicious outsiders.

Related resources...



Thales and GDPR

Thales security are specialists in encryption solutions, protecting your data wherever it may be, whether it's in motion, in use, or at rest. We provide data security solutions that help companies protect their information, whether internal, in the cloud, through a managed service, and even data moving out of the environment. 

Thales supports us with...


  • Encrypt both structured and unstructured data
  • Vormetric Solution – Offers file-based transparent encryption
  • Provides the kind of 'state of the art' data protection GDPR specifies

Related resources...

[Thales] Data Security Best Practices for GDPR and beyond



Trend Micro and GDPR

Protect your Hybrid Cloud
Centralised protection for physical, virtual, cloud, multi-cloud, container, and hybrid environments.

Protect your Network
Sophisticated detection engines with advanced capabilities and the ability to leverage the latest threat information.

Protect your Users
Act against attacks on the endpoint with a combination of multiple security techniques combined with the latest threat information.

Trend Micro supports us with...


  • Data Loss Prevention
  • Encryption (Endpoint / Email)
  • Intrusion Prevention (Vulnerability and Threat Protection)



Tripwire and GDPR

Tripwire is a leading provider of founda¬tional controls for compliance, security and IT operations. Tripwire's comprehensive foundational security controls deliver capabilities that are essential to the stan¬dard of adequate protection, including automation and integration to enhance operational efficiency and maintain a high integrity state. Tripwire makes demonstrating compliance with GDPR easy by continuously assessing compliance of systems against these standards and providing audit-ready reporting. These fundamental controls help demonstrate the appropriate security measures are active and in-place, and allow organisations to map the controls to a level of risk, as required by GDPR.

Tripwire Enterprise is a security configuration management suite including policy management, integrity management and remediation capabilities. It can evaluate systems against a broad array of compliance standards to ensure systems are configured securely. Changes can be detected in real-time. Systems that fall out of compliance can be quickly remediated through automation and integrations.

Tripwire IP360 is an enterprise-class vulnerability management solution that accurately prioritizes risk, so you can take action on your most exposed assets.

Tripwire Log Center delivers complete, secure and reliable log collection. It focuses on events of interest by providing insights into relationships between suspicious events, system changes, weak configurations and vulnerabilities.

Tripwire supports us with...


Tripwire's integrated solutions provide the ability to measure and manage risk, ensuring confidentiality, integrity and availability. When applied to processing systems, Tripwire can monitor systems against security policies, identify and track vulnerabilities, and provide the ability to investigate activity through log data.

Related resources...



Varonis and GDPR

Varonis helps organisations of all sizes with GDPR projects: including data classification and discovery, data protection impact assessments, managing access control, remediating and enforcing a least privilege model, data retention procedures, and detecting and alerting on breach notifications and policy violations.

We capture more metadata about enterprise data and file systems than any other solution: so that you can identify compromised accounts, privilege escalations, GPO changes, and malware attacks like ransomware - and stop them before they lead to a data breach.

Varonis helps meet data classification and documentation requirements, and builds a framework for GDPR compliance:

  • Discover, identify, and classify GDPR personal data (NAS, SharePoint, Cloud, etc.)
  • Monitor and audit data access and permission changes, maintaining records of data processing activities in the file system
  • Delete global accesses and overexposed data so that personal data is protected
  • Apply the principles of Privacy by Design
    • Implement data retention policies to remove or minimise personal data that is no longer used
  • Support GDPR's consumer-oriented data rights
    • Right to erasure, right of correction
  • Automatically alert and capture information on suspicious activity and potential security incidents for breach reporting
  • Establish incident response and forensics procedures

We capture more metadata about enterprise data and file systems than any other solution: so that you can identify compromised accounts, privilege escalations, GPO changes, and malware attacks like ransomware - and stop them before they lead to a data breach.

Varonis supports us with...


Varonis discovers, identifies, and classifies GDPR-applicable personal data and sensitive data across platforms. Varonis helps automate and restrict access to sensitive data, and alerts on suspicious activity: detecting insider threats, ransomware and cyberattacks. Reduce risk, limits the scope of damage, and automate policy and process to maintain compliance with Varonis.


Varonis helps manage and track access and activity on sensitive and personal data, automates access controls to establish and maintain a least privilege model, and provides reporting and auditing to ensure accountability. Discover, classify, and manage GDPR affected data with Varonis.

Get in touch

Get in touch if you would like to learn more about GDPR, and how your organisation can benefit from business level advice or technical solutions. The personal information provided will be used to contact you about Softcat’s GDPR services.

By submitting this form, you consent to be contacted about products and services from members of Softcat. Softcat is committed to safeguarding your privacy. If you want more information on how we collect and use your personal data, please read our privacy policy page.