Double benefit in terms of security and compliance
Protect personal and sensitive data of your organisation from unauthorised access and dispose of up-to-date audit reports, complying with GDPR stringent security requirements.
Today the protection of sensitive data is increasingly detached from a strategy based on the defense of the corporate physical perimeter, to gradually approach a new line of protection based on Digital Identity and Access Management.
Therefore, the main question to which the organizations find themselves to answer is no longer “where” the data is physically located but “who” has access to these resources.
Monokee guarantees to track user access to the company data, ensuring that everyone has the correct level of authorization, reducing the risk of unlawful and/or unauthorized processing.
IAM and GDPR: connections, implications and opportuniuties.
An effective IAM solution like Monokee ensures that only the right people have access to personal data, including employee and customer identities.
Download the ebook to discover how IAM helps solve GDPR compliance.
CONFIDENTIALITY | INTEGRITY | AVAILABILITY | ACCURACY | COMPLIANCE
Personal data management and access control
Monokee ensures the protection of identity and access to devices and resources during the whole users lifecycle, relying on specific access policies and multi-factor authentication technologies.
Moreover, it enables a quick management of access rights, granting and withdrawing access privileges (Access Recertification) through native and Identity Federation protocols.
Security of processing (from art. 5 to art. 32 of GDPR)
According to article 32 of GDPR, Data controller and Data processor “shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk”.
Monokee reduces the risk of data loss, data breaches and unauthorised access. At the same time, in case of data breach, it ensures a timely detection of personal data violations.
Monokee in compliance with the principles of Data Protection
Privacy by Design
Monokee considers privacy principles throughout the whole engineering process, following a risk-based approach.
Monokee enables to demonstrate that risk evaluations, as well as technical and organisational measures, are the result of considered choices that can be documented.
Monokee provides a centralised control over accesses and authorisations, by establishing periods of time and quantity of information to which grant the access.
Segregation of Duties
Monokee allows to share applications, documents and safenotes with users, without communicating login credentials.
Monokee ensures that users are provided with the correct (minimum) level of access privileges, according to their role.