According to the Regulation, "breach of security of personal information" means a breach of security which results in the accidental or unlawful destruction, loss, alteration or unauthorized disclosure of personal data transmitted, stored or otherwise processed, or unauthorized access to them HOW DO WE PROTECT OURSELVES? - Using endpoint security (AntiVirus, Content Filtering, secure network access, including for external devices (BYOD)); and choose an appropriate segmentation method (VLAN = virtual lan). - Using perimeter protection solutions / technologies such as NGFW (Next Generation Firewall) offered by Sophos and SonicWall - which combines traditional Firewall Equipment with other network device filtering features, such as a firewall for applications that use an inspection In-Depth Package Management (IPR), an Intrusion Prevention System (IPS). Other techniques can also be used, such as TLS / SSL encrypted traffic inspection, site filtering, QoS / bandwidth management, antivirus inspection and integration of third party identity management (LDAP, RADIUS, Active Directory). Implementing email security measures (email encryption) Ensuring adequate visibility within IT infrastructures by using monitoring solutions / technologies such as SIEM (Security Information and Event Management); Access from other places via VPN tool (virtual private network) Choose solutions from the Firewall Equipment category to ensure that your data is stored in complete security. Our offer includes competitive solutions at the best prices, solutions that will surely help you get the right results for your company.