Icons_data_transparency

Data transparency

Gain visibility into where sensitive data
resides and take action when needed
Icons_right_to_be_forgotten

Right to be forgotten

Discover and delete unstructured data from both primary and secondary storage

Secure by design

Privacy-focused data protection
with multiple certifications

Data protection & visibility designed with compliance in mind

  • Gain comprehensive and secure backup, recovery and archival across servers, endpoints and cloud applications
  • Minimize risks with full data visibility, access and compliance monitoring across data sources
  • Easily search, collect, preserve, archive or delete data to support legal and GDPR compliance needs
Icons_secure_by_design

Security by design

Organizations are expected to fully assess and then implement measures to ensure a level of security which is tailored to the risk of holding and processing personal data.
Icons2_consent

Consent

The data subject’s consent must be a freely given, informed, specific, and unambiguous indication of the data subject’s wishes. Explicit consent is required at the point of processing of sensitive data.
Icons2_data-breach-notification

Data breach notification

Controllers must notify the supervisory authority of a personal data breach in 72 hours or depending on severity without “undue delay.”
Icons2_right-to-object-processing

Right to object processing

Data subjects have the right to object to processing unless the controller can show compelling legitimate grounds for processing.
Icons_right_to_be_forgotten

Right to be forgotten

A.K.A. Right to Erasure. Data subjects have the right to request the controller to erase his/her personal data without undue delay.
Icons2_data-protection-officers

Data protection officers

Processors and controllers must appoint a data protection officer to monitor personal data processing.

Data visibility & control for compliance alignment

diagram_Druva-GDPR

GDPR aligned data protection

  • Security: Protect data in transit and at rest with industry standard AES-256 encryption
  • Visibility: Know where your data lives across endpoints, mobile devices, servers, and cloud applications
  • Retention: Retain and defensibly delete data to comply with GDPR’s “right to be forgotten”
  • Governance: Complete monitoring, auditing and reporting for all user and administrative actions on data within the organization
  • Erasure: Enforce the “right to be forgotten” by sanitizing data anywhere in the organization
compliance-logos-gdpr

SaaS aligned to today’s demanding compliance requirements

Druva is committed to data privacy, security and operational transparency as to our data practices and processes. As the leader in Data Management as a Service, keeping abreast and aligning to regulations such as GDPR, HIPAA, ITAR, FedRAMP and others are critical to meeting the requirements of our global customers.
Ready to get started?
Go direct: 1-800-375-0160
Compliance-Monitoring-v3

Fueling business success with data governance

IDG recommends the fundamental data governance best practices for your enterprise

GDPR-Compliance-v2

A practical guide for GDPR compliance

Understand the requirements of GDPR and see how it can affect your organization

GDPR-Compliance-v3

Thoughts from Mr. Backup: What can you do to comply with GDPR?

Druva’s Chief Technologist recaps the importance of GDPR and how the cloud can help