The EU General Data Protection Regulation (GDPR) will come into effect on May 25, 2018. The legislation is of global interest as it impacts any company doing business with European citizens – regardless of where the company is based. For the many companies that must comply with the new legislation, the best way to prepare is to implement a solid data protection strategy and process — that includes encryption — in order to be most efficient.

How to Comply with the New EU Data Protection Regulation - Bespoke DP Audit This check covers the key areas of personal data security in the proposed EU Data Protection Regulation. It is provided to help companies identify anticipated areas of non-compliance in advance of the Regulation coming into force.


  • GASS - Compliance Tool
  • ASCEMA - Data Integrity
  • PROSA - Privacy By Design
  • Safeguard - Encryption, Data Protection
  • Firewalls - control personal data

Identify and Authenticate Systems

  • enforce authentication services like one-time passwords (OTPs) to web admin, User Portal, and more.
  • enforce specific end user policies, such as for DLP, device control, and more.
  • enforce encryption and password policy
  • Restrict Access to Personal Data

  • granular, policy-based control over users, apps, web, and content to limit access to personal data based on business need-to-know.
  • Role-based management separates authorization levels and detailed logging of all access attempts
  • filler image

    Track, Monitor Data Access

  • Access user-activity snapshot and real-time alerting
  • Exercise control over remote access authentication and user monitoring, with logging of all access attempts.
  • manage all authentication and access monitoring from clients for access to the payment card environment, with logging of all access attempts.
  • detailed log events of all malicious activities on mobile devices for help identifying suspicious activity trying to access personal data.
  • alert users to apps that try to access the internet and various data sources.
  • provides detailed logging of all access attempts.

  • Training

    On-site OR Remote Information Security, Data Protection, Quality Management and Innovation Management Training


    Remote on-line support for our clients compliance and/or innovation projects. Forums through Linkedin and Twitter


    with the latest innovative technology and our partners support for system design and architect meeting security and compliance requirements


    Organising Events on Cyber Security, Privacy and Trust, Data Protection and Blockchain giving exposure to new regulations and innovation

    Innovation in Application..

    Serving our clients and partners, innovating to protect against future threats


    filler image