General Data Protection Regulation

Providing IT services means making data available to groups or individuals for the only purpose of consulting or managing them. GDPR (General Data Protection Regulation) introduces the concept of responsibility for data processing by the companies that store them and make them available for different processing purposes. There are some important moments in data life and among these the memorization, their copy for backup purposes and their use. If for the first two cases their circumscription is quite intuitive, encrypted databases, encrypted backup copies, encrypted storage, when we have to use them in the programs that provide the services, these data must necessarily be used in unencrypted mode to be consulted and managed.

Application services without authorization access control for individual functions that have access to data negate all encryption measures of mass storage media by accessing data without encryption.
The control, security and timeliness in identifying vulnerabilities that can export data without control is one of the issues that needs to be developed more, in order to avoid consultations of unauthorized databases or, worse, whole stolen data sets exploiting applicative vulnerabilities.

Why LBL?

Artificial Intelligence and Pattern Recognition

The LBL S.A.A.I.I. Suite it has been specifically designed to secure business-critical and mission-critical environments. The system is interposed to applications by providing a shield capable of controlling accesses, running logs and through an artificial intelligence system to intercept all the anomalous requests. The data analysis system of data traffic Attack Prophecy (powered by Pluribus One) is the result of years of research in the Pattern Recognition and today unique in its kind in terms of effectiveness

The system is able to generate the rules that make the access to the applications safe by constantly checking the evolution and detecting new threats immediately.

The system is able to learn the “normal” use of applications, detect anomalies, intrusion attempts, loss of information by unauthorized users, attempts to force parameters with the intent of using the application for not provided purposes, attempts to capture passwords by duplicating sites as a result of phishing campaigns, attempts to force login and password with repeated attempts.
Furthermore, the solution protects against sudden applicative load peaks that can generate overflows in services, making applications not predictable in behavior and more vulnerable to attacks.

Globalized management of digital certificates

The centralization of the integration of authentication and authorization services (SSO and Federation) make any use of the services traceable, identifying any unauthorized access.
The system also natively integrates a globalized management repository of digital certificates that make communications encrypted.
Through the centralized catalog system it is possible to manage and keep up-to-date all the digital certificates of the infrastructure, drastically reducing the effort to always maintain the highest levels of security.
The data use chain is today articulated in infrastructures often distributed in Cloud or in hybrid mode. For these reasons LBL S.A.A.I. at today it is the ideal solution as it is multi-platform and independent from the system that hosts it.

Products used

Are you interested in our solutions?