{"id":2020,"date":"2024-09-23T15:57:13","date_gmt":"2024-09-23T13:57:13","guid":{"rendered":"https:\/\/enthec.com\/case-studies\/proteccion-de-datos-sensibles\/"},"modified":"2024-11-05T19:28:55","modified_gmt":"2024-11-05T18:28:55","slug":"protection-of-sensitive-data","status":"publish","type":"page","link":"https:\/\/enthec.com\/en\/use-cases\/protection-of-sensitive-data\/","title":{"rendered":"Protection of Sensitive Data"},"content":{"rendered":"
[vc_row row_height_percent=”0″ back_color=”color-jevc” back_image=”105″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ content_parallax=”0″ uncode_shortcode_id=”150573″ back_color_type=”uncode-palette”][vc_column column_width_percent=”100″ gutter_size=”3″ style=”dark” overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/2″ uncode_shortcode_id=”536538″][vc_custom_heading auto_text=”yes” text_size=”custom” text_weight=”700″ uncode_shortcode_id=”283533″ heading_custom_size=”5em”]T\u00edtulo din\u00e1mico[\/vc_custom_heading][vc_single_image media=”319″ media_width_use_pixel=”yes” uncode_shortcode_id=”664052″ media_width_pixel=”250″][\/vc_column][vc_column column_width_percent=”100″ gutter_size=”3″ style=”dark” overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/2″ uncode_shortcode_id=”141236″][vc_empty_space empty_h=”3″ mobile_visibility=”yes”][vc_custom_heading heading_semantic=”h1″ text_size=”h4″ text_weight=”300″ uncode_shortcode_id=”262768″]The cybersecurity and compliance capabilities of the Kartos XTI Watchbots platform enable the detection of security breaches and vulnerabilities that may affect the protection, integrity and privacy of the sensitive databases managed by the entity and whose custody is specifically regulated by law.[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=”0″ back_color=”color-jevc” back_image=”105″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ enable_bottom_divider=”default” bottom_divider=”step” shape_bottom_h_use_pixel=”” shape_bottom_height=”500″ shape_bottom_color=”color-lxmt” shape_bottom_opacity=”100″ shape_bottom_index=”0″ content_parallax=”0″ uncode_shortcode_id=”265517″ back_color_type=”uncode-palette” shape_bottom_color_type=”uncode-palette”][vc_column column_width_percent=”100″ gutter_size=”2″ style=”light” back_color=”color-xsdn” overlay_alpha=”50″ shadow=”std” shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”10″ medium_width=”0″ mobile_width=”0″ width=”1\/1″ uncode_shortcode_id=”408996″ back_color_type=”uncode-palette”][vc_custom_heading uncode_shortcode_id=”199352″]CHALLENGE[\/vc_custom_heading][vc_single_image media=”473″ media_width_use_pixel=”yes” uncode_shortcode_id=”443915″ media_width_pixel=”50″][vc_custom_heading text_size=”h4″ uncode_shortcode_id=”323867″]The financial institution needed to guarantee the protection of its sensitive databases in order to comply with the strict legislation regulating their custody and avoid possible administrative sanctions, as well as reputational crises. In addition to this objective, it also needed to ensure the continuity of its essential service by locating and neutralising any security breach or vulnerability that could affect it.[\/vc_custom_heading][vc_row_inner][vc_column_inner column_width_percent=”100″ gutter_size=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/2″ uncode_shortcode_id=”148772″][vc_single_image media=”747″ media_width_percent=”100″ media_ratio=”four-three” uncode_shortcode_id=”393742″][vc_custom_heading separator=”yes” uncode_shortcode_id=”119241″]Solution[\/vc_custom_heading][vc_column_text uncode_shortcode_id=”163825″]After analysing the client’s needs, Enthec Solutions proposed the acquisition of a Company licence and a Third-Party licence to monitor its own and its value chain’s database and service continuity risks. Third-parties are a major risk in terms of compliance, but also in terms of service continuity, so simply monitoring its own risks would not have been effective in achieving the desired objective.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_width_percent=”100″ gutter_size=”2″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_width=”0″ width=”1\/2″ uncode_shortcode_id=”333741″][vc_single_image media=”453″ media_width_percent=”100″ media_ratio=”four-three” uncode_shortcode_id=”145503″][vc_custom_heading separator=”yes” uncode_shortcode_id=”114131″]Result[\/vc_custom_heading][vc_column_text uncode_shortcode_id=”110072″]When it started using the Kartos XT IWatchbots platform, the financial institution detected open gaps and exposed vulnerabilities that it had not identified and proceeded to close them to avoid the risk of administrative sanctions and the risk that they could be used to carry out a cyber-attack against its systems. Some of these breaches stemmed from inadequate protection of part of its value chain, so it activated the procedure for notifying the third parties involved. Today, thanks to Kartos by Enthec’s automated and continuous monitoring, the financial institution protects the continuity of its service and its sensitive databases, as well as controls the risk of third parties, receiving real-time alerts of new breaches and vulnerabilities as soon as they are generated.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"
[vc_row row_height_percent=”0″ back_color=”color-jevc” back_image=”105″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″ content_parallax=”0″ uncode_shortcode_id=”150573″ back_color_type=”uncode-palette”][vc_column column_width_percent=”100″ gutter_size=”3″ style=”dark” overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ […]<\/p>\n","protected":false},"author":1,"featured_media":2021,"parent":2010,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2020","page","type-page","status-publish","has-post-thumbnail","hentry","page_category-use-cases"],"yoast_head":"\n