Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320

5 Essential Steps To EU GDPR

Despite the GDPR being marked as a clearer to understand regulation, it’s still a mine field of legal and compliance requirements, interpretations and uncertainty. The purpose of this blog series is to help you understand the fundamental requirements of GDPR by peeling back the layers of legality, bureaucracy and spin.

Read More

5 Essential Steps To EU GDPR - Part 2: GDPR, the Data Access Governance Project

In part one we looked at the questions organisations must address when dealing with DSARs (Data Subject Access Request). Simple questions, but in reality, tricky or virtually impossible to answer depending on the size and complexity of your data infrastructure. Saying that, they’re actually the core premise of Data and Access Governance.

Read More

5 Essential Steps to EU GDPR – Part 3: Engage the Right People

This is arguably the most important element in achieving GDPR compliance. No organisation can do everything independently. Even software vendors must engage with outside agencies on this one. We’re going to discuss ‘the right people’ as two categories; Internal and External. If ever there was an all hands requirement in a project, this is it.

Read More

5 Essential Steps to EU GDPR – Part 4: STEALTHbits Technologies, a logical fit for EU GDPR

In part three we discussed how no one person, organisation or vendor has ‘the’ silver bullet to GDPR compliance. What you need is an array of tools and people to address the many challenges ahead.

Read More

Optimising Your Data Governance Strategy For EU GDPR

Here are some strategies savvy organizations are implementing to detect and prevent the sort of breaches that can cost up to 4% of gross revenue under GDPR.

Read More

5 Steps For Adopting Privileged Local Account Auditing Best Practices

STEALTHbits has over a decade of experience helping customers understand how administrative access has been granted to their desktop and server infrastructure, and who effectively has these highly privileged access rights. This blog outlines a 5-step process you can follow to bring your systems back under centralized control. It also highlights key reports that provide even deeper insight into critical system-level configurations and conditions that attackers exploit in almost every breach scenario.

Read More

StealthINTERCEPT v4.0 has arrived!

Active Directory (AD), File Systems, and Exchange are giant figures on any organisation’s threat surface. However, most organisations lack visibility and control over changes and activities taking place in these environments, resulting in major security and operational risks. StealthINTERCEPT provides crystal clear visibility into and control over the changes and activities that violate your security and operational policies, strengthening your organisation’s security from the core and eliminating unnecessary risks.

Read More