Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Most tasks involving operations, support, and troubleshooting carried out by Microsoft staff and their sub-processors typically do not necessitate access to customer data. In those infrequent instances where such access becomes necessary, Customer Lockbox for Microsoft Azure offers a system through which customers can evaluate and either approve or deny requests for access to their data. This feature is particularly utilized when a Microsoft engineer requires access to customer data, either due to a support ticket initiated by the customer or a problem detected by Microsoft itself. Activity logs serve to document Customer Lockbox interactions, which can be accessed in the Azure portal by selecting Activity Logs, allowing for a review of auditing information linked to these requests. Users have the option to filter the logs to find specific actions. Furthermore, a new baseline control (3.13) has been introduced in the Azure Security Benchmark, addressing the relevance of Customer Lockbox. This enhancement enables customers to leverage the benchmark to assess the applicability of Customer Lockbox for their services effectively. By doing so, organizations can ensure they maintain a high standard of data security and compliance.

Description

Proteus NextGen Data Privacy software gives DPOs, Privacy Teams and Legal Teams the data privacy management tools they need to manage GDPR compliance, CCPA Compliance or any other data privacy compliance program, efficiently and effectively. Proteus NextGen was designed for enterprises that use current, secure technologies. It is often considered the most flexible and comprehensive data privacy software available. You will find everything you need, including privacy impact assessments, DPIAs and transfer impacts assessments, data mapping, reporting (eg Record of Processing Activity reports), subject access request management, breach notification management, vendor management, risk assessment, risk assessment, and automated SCC generation to help Schrems II compliance. We offer training and consulting to help you get up and running quickly. Our goal is customer satisfaction. Visit our website to request a demonstration www.proteuscyber.com

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Azure AI Services
Azure API Management
Azure App Service
Azure Container Registry
Azure Data Factory
Azure Functions
Azure Kubernetes Service (AKS)
Azure Monitor
Azure SQL Database
Azure Storage
Azure Synapse Analytics
Azure Virtual Machines
Microsoft Azure

Integrations

Azure AI Services
Azure API Management
Azure App Service
Azure Container Registry
Azure Data Factory
Azure Functions
Azure Kubernetes Service (AKS)
Azure Monitor
Azure SQL Database
Azure Storage
Azure Synapse Analytics
Azure Virtual Machines
Microsoft Azure

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Microsoft

Founded

1975

Country

United States

Website

docs.microsoft.com/en-us/azure/security/fundamentals/customer-lockbox-overview

Vendor Details

Company Name

Proteus-Cyber

Founded

2003

Country

United Kingdom

Website

proteuscyber.com

Product Features

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Alternatives

Alternatives