GDPR - CA Technologies
{{search ? 'Close':'Search'}}

EU General Data Protection Regulation

Are you ready? The clock is ticking for companies to be compliant with the GDPR. We can help.

Related Videos


What is the EU General Data Protection Regulation?


The European Union General Data Protection Regulation (GDPR) is a new regulation in Europe that will come into force on May 25th, 2018. Its objective is to further strengthen data protection for individuals and to harmonize the law in this area across the European Union. Enforcement of the directive will be backed by heavy fines. Organizations that deal with data on a Global scale will need to review their data lifecycle and put in place processes and technology to be compliant. 

Adoption of and adherence to GDPR obligations requires a thorough approach. CA can help with a complete set of targeted software solutions. 

Protect your data at every point in the application lifecycle through test data management.


Test data management (TDM) - the process of providing, distributing and managing test data for development teams - takes on more urgency as the GDPR deadline looms.

Solid TDM practices are key to overcoming compliance hurdles and avoiding huge fines. By using synthetic data, organizations will avoid the pitfalls associated with masking production data.

Find, classify and protect sensitive data to simply facilitate regulatory compliance.


Over 70 percent of data resides on the mainframe, making a manual audit seem impossible. That’s where CA Data Content Discovery comes in. CA Data Content Discovery finds, classifies and protects to give you more control of your sensitive data to help you achieve GDPR compliance and reduce risks.

Secure your data with a focus on Trusted Digital Identities and Breach Alerts.


The GDPR requires companies to notify all the supervisory authority of data breaches—whether malicious or accidental—within 72 hours after discovery of the breach, where feasible, unless the breach is unlikely to result in a risk to individuals. In addition, companies will have to notify individuals without delay where the breach is likely to result in a high risk to them.

Most security breaches involve the use or abuse of privileged credentials, so it’s time to re-evaluate your security architecture and consider built-in security with a focus on digital identities. This approach supports compliance initiatives like GDPR and can contribute to your business transformation.

Get in touch with CA.

Contact
Call us at 1-800-225-5224
Call us at 1-800-225-5224
Email
Get in touch with CA
Email Us

Chat with CA

Just give us some brief information and we'll connect you to the right CA Expert.

Our hours of availability are 8AM - 5PM CST.

All Fields Required

connecting

We're matching your request.

Unfortunately, we can't connect you to an agent. If you are not automatically redirected please click here.

  • {{message.agentProfile.name}} will be helping you today.

    View Profile


  • Transfered to {{message.agentProfile.name}}

    {{message.agentProfile.name}} joined the conversation

    {{message.agentProfile.name}} left the conversation

  • Your chat with {{$storage.chatSession.messages[$index - 1].agentProfile.name}} has ended.
    Thank you for your interest in CA.


    How Did We Do?
    Let us know how we did so that we can maintain a quality experience.

    Take Our Survey >

    Rate Your Chat Experience.

    {{chat.statusMsg}}

agent is typing