Partners

Softcat work with a range of partners that can provide solutions to help you move towards GDPR compliance.

Learn More

Close

Open

Close

AlienVault and GDPR

Purchasing and managing several point security solutions to prepare for GDPR compliance is costly and complex for resource-constrained security teams.

AlienVault's Unified Security Management (USMTM) eases and accelerates GDPR compliance readiness by combining multiple essential security capabilities you need to demonstrate compliance into one unified, affordable solution. AlienVault USM delivers asset discovery and inventory, vulnerability assessment, intrusion detection, behavioural monitoring, SIEM, log management, and integrated threat intelligence—all in a single pane of glass.

Within one solution for security monitoring and compliance management across your cloud and on-premises infrastructure, AlienVault USM helps you to prepare to meet GDPR compliance requirements quickly, easily, and affordably.

With AlienVault USM, you can:

  • Demonstrate that you regularly test, assess, and evaluate security practices with built-in asset discovery and vulnerability assessment capabilities
  • Prepare for forensic investigation with log retention and management
  • Monitor your critical systems and services with network intrusion detection (NIDS), host intrusion detection (HIDS), and cloud intrusion detection (CIDS)
  • Stay in line with security best practices through threat intelligence updates continuously built into the product by security experts


AlienVault supports us with...

 

Starting on Day One, AlienVault USM supports GDPR compliance readiness by helping you detect data breaches, monitor data security, and document your compliance readiness. With complete security visibility from a single, unified solution, you can identify vulnerabilities before they affect personal data and easily monitor your environments for potential intrusions.


Related resources...

[AlienVault] Detecting threats in a world of mega breaches

Open

Close

Barracuda and GDPR

Barracuda solutions help your GDPR compliance by securing personal and business data, preventing data breaches, and providing powerful reporting features that allow you to deliver breach notifications when required.

Our integrated security solutions can be deployed across on-premises, private, and public cloud environments and are able to inspect outbound network traffic for signs of malicious activity.


Barracuda supports us with...

 

  • NextGen Firewalls built for distributed, cloud-connected environments
  • Web Application Firewalls identify and remediate vulnerabilities

 

  • Secure, redundant, real-time encrypted backup of offsite replicated data
  • Message Archiver captures and securely stores copies of messages

Related resources...

Open

Close

BlackBerry and GDPR

BlackBerry® works with your organisation to deliver quantifiable value through GDPR readiness, rather than making compliance the sole objective. In addition to improving data handling processes and business workflows to satisfy regulatory requirements, BlackBerry can help you convert the value from stored information into analytical and/or marketing insights and revenues.


BlackBerry supports us with...

 

BlackBerry software gives you:

  • Visibility of All Endpoints Connecting to Data
  • Identity and Access Management (IAM)
  • Secure file synchronization and sharing service with DRM
  • Deep data protection on email and collaboration

Related resources...

[BlackBerry] Practical GDPR - What it means for you and your business

Open

Close

Blancco and GDPR

For 20 years, Blancco has offered solutions that support compliance with data protection regulations such as the EU GDPR. Blancco Data Eraser solutions allow organizations to securely remove personal data on a variety of IT assets, from laptops to servers, to satisfy both data minimization and 'right to erasure' requests.


Blancco supports us with...

 

  • Achieve compliance with the 'Right to Erasure'
  • Permanently erase data on all storage devices
  • Guarantee data is unrecoverable

 

  • Centralised management and reporting
  • Enforcement of data removal policies
  • A tamper-proof erasure audit trail

Related resources...

[Blancco] Meeting the 'Right to Erasure'

Open

Close

Check Point and GDPR

Check Point solutions enable organizations to take immediate steps towards compliance with minimal impact to applications and operations.


Check Point supports us with...

 

Software Defined Protection architecture


Open

Close

Cisco and GDPR

Cisco Security Technology solutions can help the customer to raise his security level, protect its data against leakage, and detect attempts to access the data without the necessary authorisation level.


Cisco supports us with...

 

  • Perform a review of your data compliance programme
  • Create an effective privacy programme

 

  • Stop threats at the edge
  • Protect users wherever they are
  • Control who gets onto your network
  • Find and contain security issues fast

 

  • Stealthwatch quarantines breaches and identifies what happened

Open

Close

Clearswift and GDPR

Our Adaptive Data Loss Prevention (A-DLP) technology will protect critical data as it flows across email, the web and cloud collaboration applications to ensure you comply with the data regulations.

Clearswift automatically detects and secure hidden, sensitive and shared data without disruption to communication flow. This control and visibility of critical information protect your organisation from data loss risks and breaches.


Clearswift supports us with...

 

  • A-DLP edits out PII content automatically, in real-time

 

  • Full reporting on a specific set of data
  • Securely relocate data to a central repository

Related resources...

Open

Close

Commvault and GDPR

Commvault software provides compliance tools that enable profiling, search, discovery and management of data, whether on-premises or in hybrid and multi-cloud environments. Our software helps you assess and manage your exposure by proactively dealing with personal data in your datacentre, on laptops and in locations such as O365.


Commvault supports us with...

 

Commvault governance software:

  • Profile and heatmap data
  • On-premises and O365
  • Assess data breach exposure

 

Commvault compliance software:

  • eDiscovery for email & files
  • Secure/archive/delete data
  • Laptop data loss prevention

Open

Close

CyberCrowd and GDPR

Cybercrowd provides ongoing regulatory guidance and support as Data Protection Officer and Data Protection Manager as-a-Service. We also offer GDPR awareness, readiness and auditing consultancy for businesses of all sizes, as well as data-mapping, security posture reviews, plus design and implementation of compliance frameworks.


CyberCrowd supports us with...

 

  • Awareness and Readiness
  • Security Posture Reviews
  • Auditing

·       Awareness and Readiness

·       Security Posture Reviews

Auditing 

 

  • Data Protection Manager as-a-Service
  • Data Protection Officer as-a-Service
  • Ongoing Support Packages

 

  • Data-mapping
  • Framework Design
  • Framework Implementation

Related resources...

Open

Close

Cylance and GDPR

Cylance is the first company to apply artificial intelligence, algorithmic science and machine learning to predictively secure endpoints and servers. In the GDPR context, stopping the attack stops the breach; eliminating the high-cost, resource-heavy incident response, investigation and clean-up activities required by legacy detect and response options.


Cylance supports us with...

 

  • Predict attacks with AI & machine learning
  • Prevent malware execution with CylancePROTECT
  • Protect against threats with CylanceOPTICS

Open

Close

Druva and GDPR

Druva enables organisations to achieve GDPR compliance through secure backup and proactive compliance capabilities as a service across endpoints, servers and cloud applications.

Druva maximises insight across all sources of critical data with deep analytics, search, and erasure capabilities. Druva removes the data silos that encumber businesses by delivering a unified view of data.


Druva supports us with...

 

  • All data is encrypted using TLS 1.2 and AES-256
  • Information is secure and only accessible by owner organisations

 

  • Information governance framework manages data from cradle to grave
  • Manage and preserve information across all enterprise sources

Related resources...

[Druva] Inevitability: Cyber Breach & GDPR

Open

Close

Egress and GDPR

Egress is an intelligent data security platform that allows the user to share data securely and comply with GDPR regulations. Companies can understand, secure and control the data they process and share, significantly reducing the risk of a data breach whilst driving operational efficiencies by using policies and Government-certified encryption.


Egress supports us with...

 

  • End-to-end government-certified email security
  • Prevents accidental sends to wrong recipient
  • Collaborate securely with third parties

 

  • Revoke and restrict access to shared data
  • Reporting and auditing features
  • Assisting to meet demands such as SAR & FOI

Related resources...

[Egress] Email, GDPR and personal data

Open

Close

F5 and GDPR

The threats to information security are data leakage, violation of integrity, denial of service and unauthorised use of information. F5 Networks provides solutions for all aspects of a comprehensive data security strategy, including strong encryption, web application protection, mitigation of denial of service attacks and high availability and resilience from site or cloud outages.


F5 supports us with...

 

F5 provides platforms and hosted cloud services to ensure apps are encrypted and protected from cyber threats


Related resources...

Open

Close

Forcepoint and GDPR

There are three core use-cases where Forcepoint technologies such as Forcepoint DLP and Forcepoint CASB help organisations with GDPR compliance:

  • The need to inventory personal data
  • The need to map, manage & control the flow of personal data
  • The need to respond to personal data breaches in a timely manner


Forcepoint supports us with...

 

  • Monitor data flows
  • Detect data breaches
  • Prevent data/PII loss

Open

Close

HP Inc and GDPR

The world's most secure printers offer three key technologies designed to thwart attacker's efforts.

HP Sure Start validates the integrity of the BIOS at every boot cycle.

Whitelisting helps ensure that only authentic, known-good HP code is loaded into the memory.

Run-time intrusion detection helps protect devices while they are operational and connected to the network, checking for anomalies.


HP Inc supports us with...

 

  • Printers detect and prevent attacks in real time
  • Only authenticated users and devices access your print network
  • Reduce unclaimed print jobs and deter tampering or fraud
  • HP JetAdvantage Security Manager and HP Secure MPS

Related resources...

Open

Close

Informatica and GDPR

Informatica helps organisations with:

  • Informatica [email protected] discovers, assesses, analyses, and visually maps in-scope sensitive data
  • Informatica Axon defines and governs in-scope data
  • Informatica Enterprise Data Catalog provides a machine learning-based engine


Informatica supports us with...

 

Informatica [email protected]

  • Discovers
  • Assesses
  • Analyses
  • Visually maps in-scope sensitive data wherever it resides

 

Informatica Enterprise Data Catalog

  • Scans, catalogues and indexes data assets for enterprise-wide discovery

Informatica Axon

  • Defines
  • Governs in-scope data

Related resources...

[Informatica] GDPR and Data Management - Driving value from compliance

Open

Close

Ipswitch and GDPR

MOVEit is a Secure Managed File Transfer solution that ensures all external data sharing processes are secure and in compliance with data protection regulations like GDPR. Features include:

  • Enhanced Security and Compliance
  • Flexible Deployment and Access Options
  • Minimize the Risk of Data Loss


Ipswitch supports us with...

 

MOVEit provides:

  • Secure file transfer & collaboration
  • Compliant
  • Workflow automation
  • On-premises or in the cloud

Related resources...

[Ipswitch] File Transfers: The Achilles Heel of GDPR Compliance?

Open

Close

Ivanti and GDPR

Ivanti helps you implement your General Data Protection Regulation (GDPR) strategy solutions to assess risk, enforce policies, secure data, respond to incidents and requests, and prove compliance. Ivanti unifies IT and security operations, enabling the measurement of risk across the organisation to assist in implementing a comprehensive GDPR compliance plan. 


Ivanti supports us with...

 

  • Timely patching of applications and OS
  • Ability to change user or app privileges dynamically

 

  • Streamline implementation and processes and policies
  • Automate manual processes in a workflow

Related resources...

Open

Close

McAfee and GDPR

  • Global events affect data migration plans
  • Privacy sells: Data protection delivers commercial advantage
  • GDPR readiness: Organisations take 11 days on average to report a breach
  • Where is my data? Most organisations are "unsure" where their data is stored
  • Only 2% or business leaders say they know the full extent of laws that apply to their organisations.


McAfee supports us with...

 

McAfee solutions help protect against:

  • Malware infection, accidental loss & malicious theft
  • Cloud-related risks
  • Application & database exploitation

Related resources...

Open

Close

Mimecast and GDPR

Mimecast's integrated cloud suite eases GDPR compliance and improves email cyber resilience in the cloud. Mimecast Cloud Archiving offers comprehensive search, e-discovery and compliance support for GDPR Subject access, rectification, portability requests and consent withdrawal. A single, intuitive console makes it easy for IT administrators to configure all Mimecast services, with all access logged to help audit compliance with GDPR policy.


Mimecast supports us with...

 

  • Targeted Threat Protection defends against phishing, ransomware, impersonation
  • Content Control and DLP protects against the loss of IP and sensitive data
  • Secure Messaging easily secures sensitive communications and files

-        Targeted Threat Protection defends against spear-phishing, ransomware, impersonation

-        Content Control and DLP protects against the leakage of IP and sensitive data

-        Secure Messaging easily secures sensitive communications and files 

 

  • Personal data from emails and network shares is retrieved in seconds
  • Compliance teams can filter, tag and annotate search results

Open

Close

Snow and GDPR

Snow GDPR Risk Assessment provides complete visibility of all devices, users and applications across on-premises, cloud and mobile, augmented with GDPR-specific risk assessment to build an effective GDPR plan and response.


Snow supports us with...

 

  • Identify who is responsible for a data breach and enable preventative measures

Related resources...

Open

Close

Sophos and GDPR

Stop hacking and malware, protect against ransomware, and have solutions in place that protect data on lost or stolen devices. Sophos provides easy-to-deploy solutions managed by the unified, easy-to-use, and cloud-based Sophos Central admin interface, for example, Sophos Intercept X, Sophos Endpoint Protection, Sophos Central Device Encryption and Sophos Mobile.


Sophos supports us with...

 

  • Protection against ransomware
  • Secure lost/stolen devices
  • Easy-to-deploy solutions

Open

Close

Symantec and GDPR

Symantec can give you better visibility and control over:

  • Information (Symantec Data Loss Prevention)
  • Information and Communications Technology
  • Users– Symantec Data Loss Prevention & Cloud Access Security Broker (CASB)
  • Cloud applications – CASB


Symantec supports us with...

 

  • Secure data on-premises and in the cloud using DLP prevent controls
  • Secure your network from malicious outsiders with NextGen Endpoint Protection, ATP and Bluecoat Web Protection

Open

Close

Thales and GDPR

Thales security are specialists in encryption solutions, protecting your data wherever it may be, whether it's in motion, in use, or at rest. We provide data security solutions that help companies protect their information, whether internal, in the cloud, through a managed service, and even data moving out of the environment. 


Thales supports us with...

 

  • Encrypt both structured and unstructured data
  • Vormetric Solution – Offers file-based transparent encryption
  • Provides the kind of 'state of the art' data protection GDPR specifies

Related resources...

News
Avoiding the Security Pitfalls…
Tuesday, September 19, 2017
Networking & security
[Thales] Data Security Best Practices for GDPR and beyond

Open

Close

Trend Micro and GDPR

Protect your Hybrid Cloud
Centralised protection for physical, virtual, cloud, multi-cloud, container, and hybrid environments.

Protect your Network
Sophisticated detection engines with advanced capabilities and the ability to leverage the latest threat information.

Protect your Users
Act against attacks on the endpoint with a combination of multiple security techniques combined with the latest threat information.


Trend Micro supports us with...

 

  • Data Loss Prevention
  • Encryption (Endpoint / Email)
  • Intrusion Prevention (Vulnerability and Threat Protection)

Open

Close

Tripwire and GDPR

Tripwire makes demonstrating compliance with GDPR easy by continuously monitoring compliance of systems against standards such as ISO27001 and providing audit-ready reporting. These fundamental controls help prove the appropriate security measures are active and in-place, while allowing organisations to map controls to a level of risk, as required by GDPR.


Tripwire supports us with...

 

Tripwire provides the ability to:

  • Measure and manage risk
  • Identify unknown assets
  • Investigate and remediate changes

Related resources...

Open

Close

Varonis and GDPR

Varonis helps companies meet GDPR compliance requirements: automatically identify and classify GDPR data, establish access controls and data protection policies, and build a unified data security strategy to protect customer data. With over 150 GDPR specific patterns, Varonis makes it easy to automatically find and classify GDPR affected data.


Varonis supports us with...

 

  • Automatically discover and classify GDPR data
  • Establish data retention policies
  • Protect & restrict access to sensitive data

 

  • Report on GDPR affected data
  • Detect breach activity and policy violation
  • Alert on suspicious activity and potential data leaks

Get in touch

Get in touch if you would like to learn more about GDPR, and how your organisation can benefit from business level advice or technical solutions. The personal information provided will be used to contact you about Softcat’s GDPR services.

By submitting this form, you consent to be contacted about products and services from members of Softcat. Softcat is committed to safeguarding your privacy. If you want more information on how we collect and use your personal data, please read our privacy policy page.