GDPR / DSGVO / RGPD / AVG COMPLIANCE ACCESS CONTROL SYSTEM

Integrity, availability, and confidentiality made simpler.

GDPR COMPLIANCE

Data security measures for GDPR Article 32 compliance.

Advanced proximity-based identification and authentication solution utilizing hardware and software tokens. The user must be physically present to access a workstation - greatly limiting the attack vector. Robust auditing with military-grade encryption.

Audit logs of physical access stored indefinitely

Admin privileges with elevated permissions

Shows compliance auditors that changes can be traced

Instant deprovisioning to protect data and save time

custard_technical_msp_security_desktop_network

"Most screens auto-lock...but that's easily long enough for somebody to glance through your emails or copy your data somewhere else which with the introduction of GDPR in May could prove a legislative nightmare and risk for your company.

It's a simple idea, extremely effective and greatly improves workstation security in your business and employees love it as most importantly it is easy to use. GateKeeper allows for very complex passwords to be set on servers as no one needs to remember them."

Rob Butterworth
Custard Technical Services

GateKeeper Enterprise GDPR Compliance Summary

Resilience in access control. GateKeeper fits the needs of organizations seeking to meet GDPR compliance requirements in Article 32. GateKeeper easily connects to syslog servers and integrates with enterprise security architecture.

GDPR Technical Requirements

Article 32 Compliance Description: Data security measures should, at a minimum, allow:

  1. Pseudonymizing or encrypting personal data.
  2. Maintaining ongoing confidentiality, integrity, availability, access, and resilience of processing systems and services.
  3. Restoring the availability of and access to personal data, in the event of a physical or technical security breach.
  4. Testing and evaluating the effectiveness of technical and organization measures.
RequirementDescriptionArticle NumberGateKeeper Response
Change ManagementMonitors, logs, and reports changes. Shows compliance auditors that changes to the actions can be traced.32GateKeeper is a proximity-based secure identification and authentication solution using a physical token. A user must be physically present to access a workstation. Audit logs of physical access using GateKeeper are stored indefinitely on the GateKeeper Enterprise server. Additionally, GateKeeper Enterprise provides robust auditing capabilities that identifies when an individual user was in proximity to a workstation and successfully locked/unlocked it. These audit logs are retained indefinitely. GateKeeper can connect to a syslog server and integrate with an enterprise security architecture. Authorized admins have the ability to export audit logs to further enable audit review, analysis, and reporting processes.
Data MaskingAnonymizes data via encryption/hashing, generalization, perturbation, etc. Pseudonymizes data by replacing sensitive data with realistic fictional data that maintains operational and statistical accuracy.32GateKeeper uses military-grade AES-256 encryption to store and transmit passwords, PIN logins are obscured, and all authentication information is obscured.
User Rights ManagementIdentifies excessive, inappropriate, and unused privileges.32GateKeeper Enterprise provides proximity-based authentication and authorization to workstations. Using GateKeeper Enterprise, an organization can granularly assign access permissions to individuals/groups on a per workstation basis. This helps enforce the concept of least privilege on a system level.
User TrackingMaps end user to the system or data accessed.32GateKeeper Enterprise provides robust auditing capabilities that identify when an individual user was in proximity to a workstation and successfully locked/unlocked it. These audit logs are retained indefinitely.
Capterra Best Value for Authentication Jun-20
Capterra Ease of Use for Authentication Jun-20

See GateKeeper Enterprise advanced MFA in action.

Take a self-guided tour of how you can evolve from passwords. Then you're really saving time with automation.

Enterprise 2FA and password manager. One key for all your passwords. Experience fully automated login and security. Faster MFA, auto-OTP, password manager, and worry-free workflow with proximity-based privileged access management for Windows 11, 10, 8, 7, VPNs, desktop applications, and websites.

Download the free Android app.

Proximity-based MFA login

Active Directory integration with admin console

Automatic lock for all workstations

Continuous authentication password manager

Automatic OTP on websites for 2FA

Wireless login for desktops, VPNs, web, and software

or call 240-547-5446