Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk //

Compliance

3/1/2019
12:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

TrueVault Launches TrueVault Atlas To Automate Aspects of GDPR Compliance

New solutionautomates the day-to-day compliance tasks of GDPR and the upcoming California Consumer Privacy Act (CCPA).

San Francisco, Calif.– TrueVault, a data security company focused on helping businesses protect personal data, today launched TrueVault Atlas, a solution designed to introduce efficiency and give businesses confidence by automating critical GDPR tasks, such as fulfilling data subject requests and detecting data processing anomalies.

In an interview with Jason Wang, founder & CEO/CPO, he said, "Companies are just drowning with the the burden of the manual effort that's required to just meet these day to day requirements." He explained, "You know, we have companies that get several hundred requests a week to thousands of requests a week, and they're just trying to keep up." Those requests can be everything from an inquiry about the data a company holds on an individual to a demand that all personal data held by the company be erased.

TrueVault Atlas automates all aspects of data subject request processing. It has the intelligence and capability to link personal data across internal and external systems and recognize personal data in natural language. TrueVault Atlas is able to find stray payment information in Salesforce; locate personal data, such as names and phone numbers in any Google Drive document; and link personal data spanning multiple systems to the right data subject. Building on top of its powerful indexing engine, TrueVault Atlas also automates data deletion and data export procedures so companies can confidently respond to GDPR’s Data Subject Erasure Requests and Data Subject Access Requests.

TrueVault Atlas automatically detects and alerts when anomalies in data processing practices are discovered. TrueVault Atlas continuously scans all systems to find any data processing policy violations (e.g., bank transfer information sent via email), anomalies (e.g., payment information in Salesforce instead of Stripe), or inconsistencies with past actions (e.g., an erased data subject reappears due to an erroneous database restore). For businesses that use TrueVault Atlas, anomaly detection is continuous and automatic.

Personio is one of the first companies to preview TrueVault Atlas. "After seeing TrueVault Atlas in action, I believe it has high potential in improving our GDPR process and make it more efficient with its automated request handling and anomaly detection capabilities," said Arseniy Vershinin, CTO at Personio.

Key features of TrueVault Atlas include:

  • Data Subject Profile: A complete picture of every data subject, including all name and email aliases. Never miss or incorrectly identify a data subject again.
  • Automatic Personal Data Discovery: Locate personal data in internal systems and in external SaaS; in structured databases and in natural language text.
  • Data Inventory: A real-time summary of all personal data types in use across all systems in the organization. Spot irregularities instantly.
  • Automatic Compliance Checks: Easily create rules in TrueVault Atlas and monitor whether the protocol is being followed. Get notified of any deviations from the rules in real-time.
  • Anomaly Detection and Warning: Continuously check for statistical anomalies in data processing or anomalies from past actions. Complete situational awareness without any manual audits.
  • Automatic Request Handling: Automated handling of Data Subject Erasure Requests and Data Subject Access Requests to ensure consistency and compliance, and saving companies up to 20 minutes per request.

TrueVault has a track record of helping companies protect personal data. Originally focused on healthcare data and HIPAA compliance, in 2018 the company expanded its scope to cover GDPR and other personal data regulations with its new products.

"We recognized that growing companies were having a particularly hard time with GDPR compliance because they were forced to focus on compliance when their priority should be growth," said Wang. "TrueVault Atlas is designed specifically to automate the day-to-day tasks of GDPR at those growth-stage companies, to improve efficiency and make sure they are always in compliance."

For more information on TrueVault Atlas, visit https://www.truevault.com/.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20203
PUBLISHED: 2021-02-25
An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS s...
CVE-2021-3406
PUBLISHED: 2021-02-25
A flaw was found in keylime 5.8.1 and older. The issue in the Keylime agent and registrar code invalidates the cryptographic chain of trust from the Endorsement Key certificate to agent attestations.
CVE-2021-20327
PUBLISHED: 2021-02-25
A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node....
CVE-2021-20328
PUBLISHED: 2021-02-25
Specific versions of the Java driver that support client-side field level encryption (CSFLE) fail to perform correct host name verification on the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in inte...
CVE-2020-27543
PUBLISHED: 2021-02-25
The restify-paginate package 0.0.5 for Node.js allows remote attackers to cause a Denial-of-Service by omitting the HTTP Host header. A Restify-based web service would crash with an uncaught exception.