Blockchain-inspired secure audit trail
All your logs, documents and data - protected by blockchain technology.
Our blockchain-based solutions ensure that no one can tamper the audit trail and sensitive data without your knowledge.
Outsource your IT and business risk and achieve regulatory compliance. Protect the sensitive information and audit trail your organisation stores
Real-time detailed analysis of everything that happens, as well as AI-driven fraud detection will help you improve your information security
Achieve high cost efficiency and decrease development time with our easy and straightforward RESTful API as well as ready-to-use plugins
Security Information and Event Management (SIEM) systems are vital to each organisation. They transform simple event logs from various applications to detailed, in-depth behaviour analysis thanks to advanced visualizations and analytics and sometimes machine learning and AI. They contain a palette of aspects covering the most crucial information security issues. The final goal is achieving full Read more about SIEM Solutions and Data Protection Compliance[…]
What is California Consumer Privacy Act (CCPA) California Consumer Privacy Act (CCPA) is a privacy act which becomes effective at the beginning of 2020. The act aims to help California residents to regain control over their personal data, giving them the rights to: Know what data a business collected on them Right to object to Read more about How will CCPA change the business landscape?[…]
What is HIPAA HIPAA stands for Health Insurance Portability and Accountability Act. HIPAA provides data privacy and security measures for safeguarding medical information such as biometric data, patient health history, etc. It was signed into law in the year 1996, by President Bill Clinton. The act contains five titles covering: Prevention of group health plans Read more about HIPAA IT Compliance Guide: Main Things You Need to Consider[…]
A Cyber Protection Developers Conference organized by Acronis was held yesterday at the Sofia University (Bulgaria). Driven by the rising need of increasing cybersecurity and data protection measures, Acronis dedicated the conference to resolving issues such as improving the overall security of products and unlocking IT potential. How to unlock the IT potention of Bulgaria? Read more about Best Practices of Developing Secure Software (Acronis Cyber Protection Conference)[…]
The past year saw the acceleration of two already important information security trends: the ever-increasing threat of data breaches a rising consumer and regulatory oversight on corporate data processing. Indeed, the year was not a good one for privacy – high profile data breaches range from the Marriott Hotels (500 million people), through marketing firm’s Read more about Privacy by Design in Practice[…]
Data integrity, or the certainty that data has not been modified, is important in many cases – from communication protocols, through low-level data storage systems, to business-critical databases. Due to our reliance on the data we have, we need to guarantee it hasn’t been tampered with before we use it to take any decision. Unfortunately, Read more about 3 Reasons Not To Ignore Data Integrity[…]
We are happy to announce that you can now use SentinelDB, our GDPR-compliant datastore, in your Heroku deployments. The SentinelDB addon can be found here. We are keen on providing multiple options for easy integration of SentinelDB and thus ensuring full data protection for cloud applications. If your application is running on Heroku and you Read more about Try SentinelDB In Your Heroku Deployment[…]
Data breaches happen practically every day. Personal, including financial and medical data leak to cyber criminals as well as intelligence agencies. Some notable breaches include the Equifax breach, where dozens of personal data fields were leaked, and the recently announced Marriott breach, where passports, credit cards and locations of people at a given time were Read more about Preventing Various Types of Data Breaches[…]
Data breaches are happening practically every day. Reputations are damaged, customers are unhappy and regulators are more and more demanding. Data protection is no longer just a hassle that the legal department has to handle – it must be an integral part of each software system. That’s why we leveraged our in-depth experience with GDPR Read more about Releasing SentinelDB, the Privacy By Design Database[…]
When audit logs are concerned, there are many ways to generate and collect them. Ideally, audit logs are generated in code, depending on the business logic of each application and sent for secure storage to another service, like SentinelTrails. However, refactoring a system to include dedicated audit log functionality may not be feasible, as there Read more about Flexible Log Collection: Configuring The LogSentinel Agent[…]