blog eDiscovery Ethical Wall Governance Security

Archiving data for US regulations while complying with GDPR

Archiving data for US

Financial institutions globally must comply with their local regulatory framework. In the European Union they must comply with the General Data Protection Regulation (GDPR), while companies in the US must adhere to the Financial Industry Regulatory Authority (FINRA) regulations.

The regulatory landscape poses a unique challenge for their archiving solutions of main vendors such as Global Relay and Smarsh. Being based in the United States, they are obligated to adhere to U.S. regulations requiring the archiving of all financial data. However, the GDPR prohibits non-European countries from accessing European data.

In this blog post, we’ll break down these difficulties and present AGAT’s effective solution to address the problem.

US vs. GDPR Data Archiving Requirements

In the United States, financial institutions have a responsibility to be transparent and accountable by saving electronic data. This ensures a reliable financial system that protects investors and follows regulations like those set by the Securities and Exchange Commission (SEC) and the Financial Industry Regulatory Authority (FINRA)

At the same time, the General Data Protection Regulation (GDPR) created by the European Union (EU) aims to safeguard personal data. It focuses on privacy and security in our interconnected world. GDPR empowers individuals to control their personal information and sets strict rules for its use, storage, and sharing.

The Challenge of Archiving EU Data

Complying with the General Data Protection Regulation (GDPR) can pose complexities for these US vendors as it requires storing data exclusively within the EU or in jurisdictions that provide adequate data protection levels.

A significant development was the invalidation of the EU/US Privacy Shield by the Court of Justice of the European Union (CJEU) in the Facebook Ireland v Schrems (Schrems II) case. This highlighted the divergence in data protection approaches between the US and the EU, potentially exposing EU personal data to inadequate protection due to potential US government access.

The problem is generated when companies that have both American and European branches, like banks, investment funds or insurance companies, archive their data on popular platforms like Smarsh or Global Relay.

The nature of these companies being located in the US and thus, allowing non-european agents to have access to EU based sensitive data, signifies a violation of the GDPR data-privacy laws.

 The Solution: AGAT SphereShield’s Archive and eDiscovery for Microsoft Teams

AGAT offers a unique solution that surpasses the limitations of US vendors by providing an on-premise approach. 

With AGAT’s Archive and eDiscovery, data can be archived on local servers or VPS, which means that all the PII or other sensitive information stays within the borders of the GDPR jurisdiction.

As a result, European financial institutions or US companies with EU branches can achieve compliance with both US regulations and GDPR while maintaining full control over the data transfer process.

What is more, AGAT’s eDiscovery has the unique functions to search by both written and oral conversations through multiple parameters like participants, channels, text, dates and more.


AGAT Software Ediscovery

AGAT’s eDiscovery can be fully integrated with their DLP functionalities to avoid sensitive data being sent by text, files or even oral conversations


While many traditional archiving solutions fall short when addressing the needs of US companies having EU presence, AGAT steps in bringing an all encompassing on-premise solution that avoids the hefty fines of GDPR breaches.

Contact Us today to see how our innovative solution can streamline your data archiving process and ensure compliance with both US regulations and GDPR requirements.

blog DLP Microsoft Teams Mobile Security Security SkypeShield

Data Loss Prevention in a Remote Work Environment: Adapting to the New Normal

Data Loss Prevention in a Remote work enviroment

In recent years, remote work has transformed from a convenient perk into a full-fledged paradigm shift in the modern workplace. The COVID-19 pandemic accelerated this trend, forcing companies worldwide to embrace remote work as the new normal. While remote work offers numerous benefits, such as increased flexibility and reduced commute times, it also poses significant challenges in ensuring the security of sensitive data. As employees access company information from various locations and devices, the risk of data loss or breaches increases. In this article, we will explore the importance of data loss prevention (DLP) in a remote work environment and discuss strategies to adapt to this evolving landscape.

The Growing Importance of Data Loss Prevention (DLP)

Data is the lifeblood of any organization, containing valuable intellectual property, customer information, financial data, and proprietary research. Data loss or unauthorized access can lead to severe consequences, including financial losses, reputational damage, legal liabilities, and regulatory non-compliance. In a remote work environment, the lack of physical security measures and increased reliance on personal devices make data more vulnerable to breaches and leaks.
Adapting DLP Strategies to Remote Work

Employee Education and Training

The first line of defense against data loss in a remote setting is a well-informed and vigilant workforce. Organizations must invest in comprehensive training programs to educate employees about potential data security risks and best practices. Training topics may include the proper use of company devices and applications, recognizing phishing attempts, secure file sharing methods, and the importance of strong password management.

Implementing Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA) adds an extra layer of security to the login process by requiring users to provide multiple forms of identification. This could include something they know (password), something they have (smartphone), or something they are (fingerprint). By implementing MFA, organizations can significantly reduce the risk of unauthorized access to sensitive data, even if login credentials are compromised.

Endpoint Security and Device Management

In a remote work environment, employees often use personal devices to access company resources. This creates potential security vulnerabilities if these devices are not adequately managed. Companies should enforce policies that require antivirus software, regular updates, and device encryption on all devices used to handle sensitive data. Additionally, consider adopting Mobile Device Management (MDM) solutions to remotely manage and secure devices, ensuring that corporate data can be wiped if necessary.

Secure File Sharing and Collaboration Tools

Remote teams rely heavily on file sharing and collaboration tools to work efficiently. While these tools boost productivity, they can also become entry points for data breaches if not configured securely. Organizations should choose platforms with strong encryption, access controls, and permissions settings. Additionally, regularly review and audit user access to ensure that only authorized personnel have access to sensitive data.

Network Security and VPN Usage

A robust virtual private network (VPN) is essential for secure remote access to an organization’s internal network. Encourage employees to use VPNs when working from public or unsecured Wi-Fi networks to encrypt data transmissions and protect against potential eavesdropping and man-in-the-middle attacks.

Data Backup and Recovery
Regular data backups are crucial to minimize the impact of data loss incidents. In a remote work environment, where employees may have different data storage practices, centralized backup systems are essential. Cloud-based backup solutions can safeguard data across various devices and locations, providing a safety net against accidental deletions, device failures, or cyberattacks.

Data loss prevention in a remote work environment is vital for safeguarding sensitive information in the face of evolving work trends. As remote work becomes a permanent fixture in the modern workplace, organizations must adapt their security strategies accordingly. By prioritizing employee education, implementing robust security measures, and leveraging advanced technologies, businesses can mitigate the risks associated with data loss and ensure that remote work remains productive, secure, and compliant with industry regulations.

Please contact AGAT Software for more information
Write us an email at:
And don’t  hesitate to contact us !

blog Ethical Wall Governance Microsoft Teams Security

The Future of Information Barriers: Emerging Technologies and Trends

The Future of Information Barriers Emerging Technologies and Trends

As the world continues to rapidly advance technologically, the way we handle information is evolving at an unprecedented pace. With the rise of digitalization and data-driven processes, safeguarding sensitive information from unauthorized access and misuse is becoming more critical than ever. In this blog, we will explore the future of information barriers and how emerging technologies and trends are shaping the landscape of data security.

Blockchain and Immutable Data Protection:

Blockchain technology is more commonly associated with cryptocurrencies, but its potential extends far beyond that. In the realm of data security, blockchain offers a revolutionary approach to protect sensitive information. By using a decentralized and tamper-resistant ledger, blockchain ensures data integrity and prevents unauthorized alterations. This technology could lead to a future where data breaches become significantly more challenging, as hackers would need to compromise an entire network of nodes instead of a single centralized server.

Quantum Cryptography and Unbreakable Encryption:

With the advent of quantum computing on the horizon, traditional encryption methods face the risk of becoming vulnerable to quantum attacks. However, quantum cryptography, based on the principles of quantum mechanics, presents a promising solution. This technology leverages the inherent properties of quantum particles to create unbreakable encryption keys. As quantum cryptography matures, it may become a staple in securing sensitive data against future computational threats.

Artificial Intelligence (AI) for Enhanced Data Monitoring:

AI and machine learning are already playing a significant role in cybersecurity. In the future, AI-powered systems will likely take on an even more prominent role in monitoring and enforcing information barriers. AI can analyze vast amounts of data to detect anomalies, flag suspicious activities, and adapt to new threats in real-time. These smart systems will work alongside human administrators to create a more proactive and robust defense against data breaches.

Zero Trust Architecture:

The traditional perimeter-based security model is no longer sufficient in today’s dynamic and remote work environments. The concept of zero trust architecture assumes that no user or device should be inherently trusted, regardless of their location or authentication. Instead, it emphasizes continuous verification and authentication of users, devices, and applications before granting access to sensitive data. This approach minimizes the risk of unauthorized access, especially in scenarios where employees access data from various devices and networks.

Homomorphic Encryption for Secure Data Processing:

Homomorphic encryption allows data to be processed without the need for decryption, ensuring data privacy throughout its lifecycle. This breakthrough technology enables secure data sharing and analysis, even with third-party entities, while maintaining data confidentiality. As homomorphic encryption becomes more practical and efficient, it will enable collaboration on sensitive data across industries without compromising privacy.

Privacy-Preserving Technologies:

Emerging privacy-preserving technologies, such as differential privacy and federated learning, aim to strike a balance between data utility and privacy. These techniques allow organizations to glean insights from large datasets while keeping individual data points anonymized. By preserving privacy, companies can share valuable data without exposing sensitive information.

The future of information barriers is being shaped by emerging technologies and trends that offer unprecedented levels of data security and privacy. Blockchain’s immutable ledger, quantum cryptography’s unbreakable encryption, AI-driven monitoring systems, and the zero trust architecture are just a few examples of the transformative potential these innovations hold.

As technology evolves, so do cyber threats, and it is essential for organizations to stay proactive in implementing robust data security measures. Embracing these emerging technologies, understanding their capabilities, and adapting them to specific use cases will be crucial in safeguarding sensitive information and maintaining the trust of customers, partners, and stakeholders in the digital age. As we move forward, a holistic approach to data protection will be necessary, encompassing not just the technology but also the processes, policies, and people involved in handling valuable information.

Do not hesitate to give your compliance capabilities a boost. Contact us and our team will show you a short demo of AGAT Information Barriers solution.