Ensure GDPR Compliance

Moving to the cloud can introduce compliance risks with regulations like GDPR. The iboss cloud allows admin created GDPR zones to ensure the cloud scans and stores data within regulated regions.

Regulations are mandating organizations implement cloud policies to protect user privacy and meet other regional laws. When moving to a cloud gateway platform, ensuring regional compliance is critical to avoid breaking laws and receiving hefty fines. Cloud gateways scan user Internet data to deliver protection from malware and prevent data loss. Since these gateways exist in the cloud and sensitive user data traverses them, it is important that the gateways remain within region in order to meet regulatory constraints.

The iboss cloud allows administrators to create zones to ensure data is scanned within regulated regions when users enter those regions. In addition, the log event data that is generated by the cloud can be sent to reporting databases that reside within admin controlled zones as well. This ensures regulatory requirements are met while leveraging the elasticity and power of a cloud based gateway platform.

Admin controlled zones ensure data is scanned within GDPR regulated regions

Cloud gateways are not only responsible for protecting user Internet access, but also generate the log events that represent cloud activity, malware and DLP alerts. The log events are critical to understanding user cloud activity and identifying infected devices and high risk users.

Regulations, such as GDPR, require that data is stored within a country or region when a user activity generates log events from within particular regions. In addition, regulations may require anonymizing data to ensure user privacy.

Anonymize user log events generated by the cloud to ensure privacy regulations are met

iboss cloud - log anonymization

Anonymization of logs allows administrators to randomize user identity within logs when it is required for users in particular regions. The anonymization can be configured so that different aspects of the log event are anonymized including username and group. In addition, super administrators can be configured to have the ability to decipher the anonymized user information when required.

Containerized cloud architecture ensures data control and separation

The iboss cloud is built on the concept of containerized reporting nodes which are located within iboss cloud. The containerized reporting nodes are discrete and exist within specific regions and zones. An administrator can configure multiple containerized reporting nodes to service the organization so that log events generated by users in Europe, for example, stay within Europe while data generated from other regions are redirected to reporting nodes in those regions. This ensures data that is generated within a regulated region, remains within that region.

iboss cloud - Geo-Location and Branch Office Internet Breakouts
Buy Now

The iboss cloud can secure user Internet access on any device, from any location, in the cloud. Best of all, you can start using it immediately to protect your users instantly.

What you get
  • In the cloud Internet security
  • Advanced Internet malware protection that follows users
  • Advanced cloud and SaaS controls
  • Web filtering and compliance controls
  • Internet security for in-office users without appliances
  • Branch office Internet security without data backhaul
  • And a lot more...
Contact Us

Get in touch with a technical specialist
for a live demo.

North America Sales:
877-742-6832 X1
Contact local distributor or:
sales@iboss.com

International Sales:
858-568-7051 X1
Contact local distributor or:
sales@iboss.com

EMEIA Sales:
+44 20 3884 0360
Contact local distributor or:
emeia@iboss.com