– GDPR is about protecting personal data
– Sending personal data over regular email is not GDPR Compliant
– Using FTP to send personal data is not GDPR Compliant
– Breaches must be reported within 72 hours to the data protection authorities
– Have a GDPR plan by reviewing your data transfer methods
– Appoint a Data Protection Officer
– Demonstrate that measures have been taken to secure data
5 Steps to Compliance with GDPR
Conformity and compliance with the GDPR requirements
Access control and authorization of usage
Robust reporting and auditing
Flexible deployment options
Security & Compliance Features
File Transfer Security
We offer the most comprehensive way to send, manage and organize enterprise information by providing multiple access points to the our system.
Data Center Security
Our platform is deployed on a multi-tier network architecture and hosted in Rackspace data centers, which comply with multiple certifications like SSAE 16 and ISAE 3402, ISO 27001 (International) and Microsoft Gold Certification.
Enterprises can streamline mobile device management and bring your own device (BYOD) by using our native app for iOS smartphones and tablets.
Thru requires explicit authentication for all applications (web application, email and business integrations, FTP servers and mobile apps) that access our platform.
File Storage Security
All content stored in our platform is secured with Vormetric TDE (AES 256-bit) data encryption, for data at rest. Every file is antivirus scanned and housed on dedicated servers and enterprise EMC storage. Thru provides separation of customer metadata and storage and complete site isolation with separate databases.
To ensure that servers are fully protected from harmful traffic and cyber attack, our network security features prevent unauthorized access with firewall and intrusion detection/protection devices that are actively monitored 24/7.
Audit and Analysis
We give administrators full visibility into an enterprise’s entire file system with powerful auditing and tracking features.