Blue Nlyte Banner

Compliance

Discover – Manage – Report

Play by the rules, don’t pay because of the rules

Compliance requirements come from many sources, regulatory agencies, corporate standards, and vendor agreements to name a few. Wrangling the bookkeeping, tracking, auditing, and reporting is daunting enough, but then assuring that the data sources you are working from are accurate can seem impossible. If you are going to be held accountable for your organizations compliancy, you need to hold the organization accountable for accurate data. Something you can get from a single source of truth.

GDPR compliance icon


Data Location
The critical data’s geographic location and the devices servers/storage/network it resides on, and where it has been replicated to.

Security Tool Identification
What and if any security tools are deployed on identified devices and enabled to protect the critical data.

Data Breach Notifications
Indicating what data subject’s data ran on what assets, identification of secondary locations of infrastructure for the safe handling of data transporting across borders.

Discover | Identify what personal data you have and where it resides.

Manage | Govern how personal data is used and accessed.

Protect | Establish security controls to prevent, detect, and respond to vulnerabilities and data breaches.

Report | Act on data requests, report data breaches, and keep required documentation.

Avoiding some of the Compliance misconceptions

Regulatory compliance is all about the “data”
A common misconception is that GDPR, HIPAA, SOX, PCI, etc. only focused on a small data set. All of these regulations stipulate the management of the data in trust requires accountability for the entire chain of custody including the infrastructure it resides in. Nlyte improves compliance by providing the ability to track within the physical infrastructure where the data resides, whether it is encrypted and by what method, the means in which the data is transported, and who has interacted with the data.

I’m too small to have a software audit
Some of the landmark cases that hit the news in the last few years may lead smaller or less visible organizations into thinking they are too obscure to be the target of an audit from the BSA (Business Software Alliance). However, BSA is supported by Microsoft, Adobe, Oracle, and many others who are looking for all the revenue possible, recent audits by the BSA have shifted to smaller organization.

Asset Management is 80% process and 20% technology. Nlyte provides the technology piece to provide you with full visibility into what you have installed across the board and who has access rights.

ISO standards

Once considered simply the ISO standard for auditing software (SAM), the ISO 19770 family of standards has received attention from the major Accounting Firms as well as NIST. They recognize that identifying, tracking, and reporting the history and status of the hardware and software infrastructure is imperative to a reliable compliance practice and audit program. Nlyte delivers comprehensive details on hundreds of attributes that enable a compliance team to discover and understand any/all technology assets providing location, status, accessibility, and vulnerabilities.

Compliance pays for itself

While may believe compliance is the necessary evil, there is a new respect for the benefit of a strong compliance program. There are the obvious responses:

  • Avoid penalties
  • Increased licensing fees
  • Legal fees
  • Public shame

While those are good and tangible ROI drivers, it turns out keeping accurate track of what you have and what you are using has some real day-to-day cost benefits.

  • It is not uncommon for many organizations to over provision hardware and software by 20% or more. Accurate tracking of deployment and usage can eliminate all of the support and maintenance costs associated with that idle equipment.
  • Groups within an organization have to purchase hardware and software when there is idle equipment in storage or another groups asset pool. Identifying and reallocating eliminates waist and frees up budget for other critical expenditures.
  • The cost to execute a physical audit takes 50 or more hours according to a recent survey from the Serpio group. This does not include the ongoing mini-audits and inventory exercises IT and asset management teams engage in on a daily basis.

Nlyte provides tools that continuously monitor the network for assets being added and removed. A single source of truth is established with current data information and then shared with CMDB, ITSM, and Finance systems. This eliminates the hunt and seek audit process and provides accurate reporting with a simple key stroke.

Binoculars icon

Blog

What is GDPR and how can DCIM help achieve compliance?

Case study icon

Compliance Brief

Compliance Data Management and Reporting Brief

Video icon

Video

About the Nlyte DCIM Software Suite.

Key Features

Simple Set Up
Simple to Use
Request a Demo Today!