Home Desktop Citrix: General Data on Global Endpoints (GDPR)

Citrix: General Data on Global Endpoints (GDPR)

0
Citrix: General Data on Global Endpoints (GDPR)
0

General Data Privacy Regulation (GDPR), the new European privacy law aimed at safeguarding personal data, takes effect in the spring of 2018 and applies to companies, anywhere in the world, that do business with customers in Europe.

This article is the first in a series that will address the upcoming GDPR deadline — May 25, 2018 — and how Citrix can help secure personal data on mobile endpoints.

The need for global communication makes accounting for personal data on global endpoints a significant consideration for organizations that must comply with GDPR. Citrix XenMobile is a market leading Unified Endpoint Management (UEM) component of the Citrix Secure Digital Workspace. This blog will give an overview of GDPR summarizing pertinent terms and concepts, and outline some of the key challenges that mobility presents to organizations that must comply with GDPR. In subsequent installments, we will do a deep dive into the ways XenMobile can solve each of those challenges and protect personal data on mobile endpoints.

Commonalities that Help Break Down the 99 Articles of GDPR
GDPR is described in chapters and “articles”, or subsections that describe specific requirements, not to be confused with “articles” found in periodicals. There are 99 articles, yet there is commonality among several, including those pertaining to:

  • Locate – there are several articles within the General Data Protection Regulation (GDPR) that pertain to where personal data is obtained, where and how it’s used. They focus on activities such as identifying locations where personal data is stored, categorize types of personal data, and catalog of processing activities how and where personal data is obtained and used.
  • Manage – another set of articles pertain to governance, input, and processing of personal data. They focus on activities, such as restricting processing of personal data to a defined scope, the discontinuation, and erasure of personal data as requested, and outline requirements for a data protection officer to oversee a governance program.
  • Monitor – some articles pertain to monitoring the use and export of personal data. They focus on activities such as tracking, and recording personal data processing, transfer of data in and out of the EU.
  • Secure – and another batch of articles pertain to securing personal data throughout its enterprise life. They focus on activities such as data protection and privacy by design and default, confidentiality, integrity, and availability (CIA) of personal data including securing personal data through encryption, and the need to detect, and respond to data breaches.

Read the entire article here, General Data on Global Endpoints

Via the fine folks at Citrix Systems, Inc.

Categories:
Citrix Systems Citrix (NASDAQ:CTXS) aims to power a world where people, organizations and things are securely connected and accessible to make the extraordinary possible. Its technology makes the world’s apps and data secure and easy to access, empowering people to work anywhere and at any time. Citrix provides a complete and integrated portfolio of Workspace-as-a-Service, application delivery, virtualization, mobility, network delivery and file sharing solutions that enables IT to ensure critical systems are securely available to users via the cloud or on-premise and across any device or platform. With annual revenue in 2015 of $3.28 billion, Citrix solutions are in use by more than 400,000 organizations and over 100 million users globally. Learn more at www.citrix.com.

Featured Resources:

Related Articles:

| LATEST FEATURED RESOURCES

White Papers

    Application Lifecycle Management with Stratusphere UX – White Paper

    Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users […]

    Downloads

      Download Commvault VM Backup and Recovery: end-to-end VM backup, recovery and cloud management

      Commvault’s ability to provide end-to-end VM backup, recovery and cloud management creates a significantly better way to build, protect and optimize VMs throughout their lifecycle. Our best-in-class software for VM backup, recovery and cloud management delivers a number of significant benefits, including: VM recovery with live recovery options; backup to and in the cloud; custom-fit […]

      On-Demand Webinars

        What’s Going on in EUC Printing – A Technical Deep Dive!

        The IGEL Community and ThinPrint invite you to watch the following technical deep dive webinar. The agenda is to technically bring you up to speed on what’s going on in the EUC Printing space today along with a deep dive into new methods, technologies, printing scenarios and a discussion on why printing still matters. You […]

        Latest Videos

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win big $$, visit ITBaller.com for more info!

          Visit Our Sponsors

          Close