Beyond GDPR: Five Technologies to Borrow From Security to Operationalize Privacy

Privacy laws such as the California Consumer Privacy Act (CCPA) and the EU’s General Data Protection Act (GDPR) have made it increasingly difficult for security and risk management (SRM) leaders to balance controlling personal data and remaining compliant with their myriad of other demands.

Gartner says “In preparing for various privacy regulations, security and risk management leaders can find a set of balanced controls for privacy and security in the implementation of five key technologies. IRM, CASB, DCAP, DLP and file analysis all help to control personal data and support compliance.”

Gartner Beyond GDPR


By submitting this form, you are consenting to receive marketing emails from: Active Navigation, 11720 Plaza America Drive, Reston, VA, 20190, https://www.activenavigation.com. You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact
Gartner Beyond GDPR: Five Technologies to Borrow From Security to Operationalize Privacy , Bart Willemsen , Zaira Pirzada
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Active Navigation.

Start typing and press Enter to search