Protection,
Partners in privacy
click banners to find out more about our partners
The complete Data Breach management tool.
With Gorilla Data Breach you can assess, manage and report personal data breaches in your organization. All assisted, fast and certified.
What we offer:
- Assessment: Gorilla Data Breach guides you through the assessment of the incident in order to determine whether it is a personal data breach, what type of breach and how it should be handled.
- Management: Gorilla Data Breach applies assisted processes to manage the report consistently and efficiently in accordance with Article 33 of European Regulation 16/679.
- Communication: Gorilla Data Breach generates the log and creates the documents to communicate the violation to the Guarantor when necessary, documenting the process and managing follow-ups.
- Training: The “Officers” must know what and how to report possible violations.
STORAGE NetApp
Data Thrivers – Data Fabric
NetApp provides software, hardware and services to help its customers manage data, whether on-premise or in the cloud. Data is a company’s greatest competitive advantage. It’s time to manage it at its best.
What we offer:
- All-Flash, allow us to evolve traditional infrastructures while maintaining control over costs.
- HCI, NetApp’s hyper-conference for creating private clouds, where predefined performance, scalability, and automation are integrated into a single system.
- Data Fabric, NetApp’s ecosystem of native NetApp protocols allows you to have data always available wherever it is onsite, in the cloud, or in the private cloud.
- Solutions for all workloads, Cold Data and Longterm Data.
- Disaster Recovery and Business Continuity Systems
CYBERSECURITY EVOLVED
Traditional security systems cannot keep up with the new generation of malware. With the help of our partners we have developed a security model, based on Big Data and AI, that helps companies anticipate, prevent, recognize, respond and manage cyber threats. For each reality we can provide the best defensive strategy, according to the real needs.
What we offer:
- Endpoint security (antivirus, antimalware, EDR, patch management, mobile control…)
- E-mail & Web security
- Syncronized Security
- Data Control per la sicurezza dei dati sensibili
- Crypting dei dati
- Security management, Monitoring Analysis & Response
CYBERSECURITY EVOLVED
Traditional security systems cannot keep up with the new generation of malware. With the help of our partners we have developed a security model, based on Big Data and AI, that helps companies anticipate, prevent, recognize, respond and manage cyber threats. For each reality we can provide the best defensive strategy, according to the real needs.
What we offer:
- Endpoint security (antivirus, antimalware, EDR, patch management, mobile control…)
- E-mail & Web security
- Syncronized Security
- Data Control for the safety of sensitive data
- Data Crypting
- Security management, Monitoring Analysis & Response
COLLABORATION CISCO
Collaboration takes on a new value, removing barriers between people and making information available, wherever you are and whenever you want. In-house collaboration is the best answer to creating more efficient work environments and increasing productivity in your organization.
All in one device for team collaboration to send messages, organize meetings and make voice and video calls. You can stay in touch between meetings and share virtual meeting spaces, messaging, file sharing and even video calls.
What we offer:
- Unified Communications systems (IP telephony, messaging, e-mail, chat and instant messaging)
- Collaboration systems for Contact Center
- Smart working – the best place to work
- Development consulting and analysis
- Installation and training services
- Hardware and Software Maintenance Gendata is a company owned by Gencom in the offer of CISCO Collaboration services.
PRIVACYLAB GDPR
The new EU Regulation 216/679 provides that anyone processing personal data of customers, suppliers, employees, partners and others, is obliged to take appropriate security measures to minimize the risks of destruction, loss, unauthorized access or processing of personal data not known or not in accordance with the purpose of collection:
- Respect the rights of individuals (art.5 and 6, 13-22)
- Identify the risk and carry out an impact assessment (Art. 35)
- Drawing up data processing registers (art.30)
- Ensuring data security and Data Breach management (art. 33 and 34)
- Appointing a Data Protection Officer (DPO)
Cosa offriamo:
- Privacy, Audit and RPD/DPO consulting service
- E-Learning – processor training system with evaluation system
- GDPR PrivacyLab GDPR compliance management software tool
Every software developed and marketed by Startdigit® is designed from the ground up with the concept of “Privacy First” in mind: maintaining the privacy and confidentiality of this valuable information within the company perimeter.
The goal has always been to help decentralize large data clusters to the Internet and provide solutions that give back control to users.
With Startdigit, companies and individuals can rest assured that your data is 100% yours and the privacy of your customers and suppliers is respected.
The relationship is between customer and supplier, with no unnecessary intermediaries intervening.
A clear philosophy: maintain control and ownership of your data without ceding it to anyone else. On-premises and without intermediaries.