Protect your systems from loss and misuse of personal data and confidential business information. Respond to incidents in real time. Meet regulatory requirements for proper logging of access and changes.
Record all security-relevant necessities and definitions. The documentation communicates clearly and comprehensibly from which data sources events and logs are retrieved, what types of (personal) data are collected, why this data is logged, and how access to this data is structured. This allows you to demonstrate to attorneys, association auditors, internal or external auditors, and state data protection authorities that you have implemented the topic.
With our logging concept, you receive a template that you only need to fill out. We will be happy to support you!
We provide you with ready-made reporting packages and alerts that enable you to comply with both external regulations (e.g. DSGVO) and internal corporate compliance in your business. With us, you no longer run the risk of having to reconfigure your entire log management after an application or operating system update, because we keep your reporting and alerting packages up to date as part of our maintenance. If changes are required due to external regulations or internal compliance, we will implement them together with you and any sales partners so that your log management remains audit- and revision-proof.
According to §8a of the IT Security Act, operators of critical infrastructures have been obligated since July 18, 2017 to "take appropriate organizational and technical precautions to prevent disruptions to the availability, integrity, authenticity and confidentiality of their information technology systems [...]." You can comply with this regulation with ProLog®.
The General Data Protection Regulation aims to protect the fundamental rights and freedoms of natural persons and their personal data. The GDPR was adopted on April 27, 2016 and is applicable in all EU member states since May 25, 2018. With ProLog® you work DSGVO compliant.
The ISO 27001 & 27002 standards specify requirements for establishing an information security management system (ISMS) with consideration of processes, people and technologies in an organization. Implementation of the standards helps protect and manage information through risk management. An ISMS based on the ISO 27001 standard meets requirements for IT security or data protection. The ISO 27002 standard provides guidelines for implementation and can be used as an aid to meet an audit review for ISO 27001 certification. ProLog® works on the basis of ISO 27001.
In 2005, the German Association of the Automotive Industry developed a catalog of questions on information security that is used in the industry as a basis for auditing internal and external information security. The VDA-ISA is based on the international standards ISO 27001 and 27002 and is generally checked using the TISAX testing and exchange mechanism.
On March 21, 2019, the German Bundestag passed the Trade Secrets Act. It deals with the protection of confidential know-how and confidential business information against illegal acquisition as well as illegal use and disclosure. With ProLog® you install an important building block to protect your trade secrets.
Immediate information and the right contact.
Ensure that all critical applications are always available and running fast - for satisfied end users