Latest Research


This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-519-432-3550 (International)

Comprehensive software reviews to make better IT decisions

Proteus-Cyber Bridges the Gap Between Data Privacy and Threat Intelligence

Proteus-Cyber, a leading vendor within the privacy program management space, has recently added new standout features to its current privacy software offering. The Threat Intelligence feature tracks and links directly to Common Vulnerabilities and Exposures (CVEs) discovered daily and can be integrated within the IT asset register of current Proteus-Cyber NextGen Data Privacy users.

This useful new feature bridges the gap between privacy processes and supporting controls and the potential cybersecurity threats that pose a significant barrier to ensuring data is adequately protected. The feature is available for free as a part of the vendor’s public website. The true benefit of the feature is the ability that current Proteus-Cyber users will have to directly identify which incumbent threats may leave them vulnerable based on their systems and current patching cadence. Users can sort through CVEs based on type, company, and application, and much like the vendor’s Privacy News Tracking feature, new updates and relevant threats are constantly added.

In addition to this feature, Proteus-Cyber has also segmented its privacy program management software into Express and Enterprise formats. The former intended for organizations that choose to focus on immediate resolution of potential points of exposure from a privacy perspective, while the latter benefits organizations choosing to take a proactive and comprehensive approach to privacy program management.

Source: Proteus-Cyber Vendor Briefing, Proteus-Cyber

Our Take

The complex world of data privacy is heavily linked to the cybersecurity realm, although discord often exists between the two owning parties. While privacy management is process oriented, an effective data privacy program necessitates robust supporting technical security controls. After all, a data privacy program intends to safeguard an organization’s sensitive personal data, a feat that involves protection from external as well as internal breaches.

Proteus-Cyber’s Threat Intelligence integration identifies a gap that exists in connecting data privacy to its supporting security controls. IT leaders seeking a more comprehensive look into their data privacy program as well as the ability to identify threats that may expose the organization to data privacy harm should evaluate NextGen Data Privacy, as the software solution moves beyond a “tick-box” approach to privacy management. Organizations that effectively integrate security controls to address gaps in data privacy to protect from real-world vulnerabilities are those well poised to move beyond compliance and effectively safeguard sensitive personal data from potential breach.


Want to Know More?

Build a Privacy Program

Comply With the California Consumer Privacy Act

Fast Track Your GDPR Compliance Efforts

Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019