Deadline for GDPR Compliance is
May 25, 2018.
Is your business ready?

Security | Access Control | Encryption | Reporting | Deployment

enforcement date:
May 25, 2018

General Data Protection Regulation
(GDPR)

replaces existing regulation

Privacy by Design

Up to €20m or 4%
non-compliance fines

 

mismanaged data transfers represent
a significant breach risk

Key Facts

GDPR-key-fact-protect-personal-data

GDPR is about protecting personal data

GDPR-key-fact-no-email

Sending personal data over regular email is not GDPR Compliant

GDPR-key-fact-no-FTP

Using FTP to send personal data is not GDPR Compliant

GDPR-key-fact-72-hour-reporting

Breaches must be reported within 72 hours to the data protection authorities

GDPR-key-fact-have-GDPR-plan

Have a GDPR plan by reviewing your data transfer methods

GDPR-key-fact-appoint-Data-Protection-officer

Appoint a Data Protection Officer

GDPR-key-fact-measure-secure-data

Demonstrate that measures have been taken to secure data

5 Steps to Compliance with GDPR

Number-1-in-blue-dot60

Conformity and compliance with the GDPR requirements

Number-2-in-blue-dot60

Access control and authorization of usage

Number-3-in-blue-dot60

Encryption

Number-4-in-blue-dot60

Robust reporting and auditing

Number-5-in-blue-dot60

Flexible deployment options

Thru Security & Compliance Features

file-transfer-security

File Transfer Security

Thru offers the most comprehensive way to send, manage and organize enterprise information by providing multiple access points to the Thru system.

file-storage-security

File Storage Security

All content stored in Thru is secured with Vormetric TDE (AES 256-bit) data encryption, for data at rest. Every file is antivirus scanned and housed on dedicated servers and enterprise EMC storage. Thru provides separation of customer metadata and storage and complete site isolation with separate databases.

data-storage-security

Data Center Security

Thru is deployed on a multi-tier network architecture and hosted in Rackspace data centers, which comply with multiple certifications like SSAE 16 and ISAE 3402, ISO 27001 (International) and Microsoft Gold Certification.

network-security

Network Security

To ensure that servers are fully protected from harmful traffic and cyber attack, Thru’s network security features prevent unauthorized access with firewall and intrusion detection/protection devices that are actively monitored 24/7.

mobile-security

Mobile Security

With Thru, enterprises can streamline mobile device management and bring your own device (BYOD) by using Thru’s native apps for iOS and Android smartphones and tablets.

audit-and-analysis

Audit and Analysis

Thru gives administrators full visibility into an enterprise’s entire file system with powerful auditing and tracking features.

compliance-and-certifications

Compliance and Certifications

Thru ensures you are compliant in all your transactions. With Thru, you can have the peace of mind that you are complying with the necessary certifications and regulations as well as supporting safe data handling and data retention policies.

authentication

Authentication

Thru requires explicit authentication for all applications (web application, email and business add-ins, FTP servers and mobile apps) that access the Thru.