Care Homes

What is GDPR?

The GDPR (General Data Protection Regulation) seeks to create a data protection law framework across all organisations that manage, process and control data in their interaction with the EU and aims to give control of personal data back to the individual. The reform impose strict rules on those hosting and ‘processing’ this data, anywhere in the world. The regulation presents some challenges to the accepted ways of managing data and makes clear the responsibilities of both the controllers of any data (whether corporate or individual) and the processors of any data.

It is a requirement that users:

  • Understand how companies use their data for sales and marketing purposes.
  • Are aware of their rights with regard to personal data.
  • Are informed of any issues in the control and management of their data (such as data breaches).
  • Organisations are concerned about the heavy financial penalties the Regulation can impose. However there is significant gain form those that embrace, adopt and consider how planning and early adoption of GDPR can bring market opportunity or advantage.

Are you ready for the challenge of GDPR?

Your GDPR journey and the Cloud

Cloud organisations that deliver true transparency to their customers will build strong trust in their Capabilities and brand. Start the GDPR transition with an emphasis on your business in the cloud – to drive process, policy, technology and informed decisions.

Exponential-e provides solutions, services and expertise to help support your aspirations in being GDPR ready.

There are five key areas that need to be addressed:


How can you translate GDPR into actions and values for your business. Lets help you consider what measures need to happen, against what activities and compliance's you already maintain and have.


Protecting the security of your data in the Cloud and providing an infrastructure that ensures proper user rights, choice, rectification and erasure correctly and easily is paramount.


This is probably one of the largest and impacting areas of the regulations, understanding the required changes is key.


Understanding where your data is, how its used and who is interacting with it is a primary requirement. Transparent undertaking between you and your cloud service provider is an absolute requirement.

People and Communication:

Train your people on GDPR requirements so they understand the risks of improper data use.



GDPR is a complex and far-reaching legislation, comprising many components that touch organisations in differently and at all levels. GDPR needs a strong Information Governance program and technical framework to succeed.

A comprehensive approach is required, taking all of its aspects and your organisations needs into consideration.

The assessment we provide can be a great help whether your company has already considered GDPR or is preparing to start. The assessment begins with determining the main GDPR stakeholders in your organisation per key area of attention. This is done together with the person responsible for data privacy in your organisation (you may even already have a special data privacy officer in place). These stakeholders might be: representatives of the HR department, for communication, training and personnel data; of the marketing department, for protecting your brand and your customer data; and of the IT department, for security issues. Interviews will be planned with all these people.


There are three versions of the assessment.

The first is a single day engagement to advise and understand your enterprise and what our consultants can assist with your start on the road to GDPR compliance. And an overview on areas that your business needs to focus on.

The Second is a week long assessment. This assessment is intended for companies who need to progress their GDPR readiness and process significant amounts of data. A review of the enterprise will determine how complex compliance will be. This will result in recommendations on how to speed-up the process and increase your chance of success.

Or do a full assessment (nominally 4-6 weeks); depending on the size of the organisation and the size of the business. It will address all five key areas and GDPR requirements. The goal is a practical roadmap, drawn-up in close co-operation with your internal stakeholders and owned by your data privacy officer or designated individual.


The Goal

The goal of assessment is to create a path of how your organisation can achieve GDPR, looking at the five main areas to decide what works need to be achieved. These areas are governance, people and communication, processes, data and security. The focus is on where your company´s biggest risks are and helping you to become ready for GDPR May 2018.

Checklist & Accelerators

Checklists and accelerators

Checklists and accelerators ensure the effectiveness of the sessions. We developed GDPR outcome-based materials like an overview of all GDPR requirements and measures, a list of all types of personal data, but also ready-to-use agendas to be customized for the different participants in the interviews or workshops. This way processes that could take weeks can be handled more quickly.

During the workshops the GDPR requirements are weighed against the processes, norms and values of your company in a consistent manner. The gaps and priorities found will lay the foundation for your roadmap.

Ransomware & Endpoint Protection

Unify prevention, detection, and response in a single platform.

Adapt your defences against the most advanced cyber attacks by rapidly eliminating threats with fully-automated, integrated response capabilities. Up to 95% breaches originate at endpoints. Our ransomware protection is much more than anti-virus, it’s sophisticated and multi-layered protection backed by a $1m warranty.

A multi-layered approach

Exponential-e’s multi-layered protection includes prevention, detection & response as a unified service. Exposure to ransomware and Trojan attacks are not easy to defend against using traditional anti-virus software, and if they are discovered the legacy technology cannot respond quickly enough to the volume or difficulty of threats.

We provide the only platform that defends every endpoint against every type of attack, at every stage in the threat lifecycle - before, during and after an attack. Exponential-e’s ransomware protection service takes action as early as possible to deal with threats and alerts effectively. This is the next-generation for mitigation, by containing malware and endpoints as your protection enables automated processes such as rollback and auto-immunisation.

Advanced Endpoint protection

Dealing with today’s cyber threats requires a fundamentally different approach. Our technology uses a major breakthrough in signature-less detection, based on machine learning, with 31,000 unique file characteristics defined and referenced.

We closely monitor all system activities to identify malicious behavior and mitigate threats in real time. What’s more, the pro-active endpoint protection is switched on before your system even starts up, tracking and scanning all activity to take action when needed.

Advanced Static Analysis using a Deep File Inspection engine discovers known and unknown malware. Behaviour-based threat analysis enables you to dynamically detect and prevent the most advanced attacks from any vector. All while a global intelligence base provides dynamic whitelisting and blacklisting.

SentinelOne Partners with Exponential-e

Exponential-e is the only Managed Service Provider in the UK chosen to partner with SentinelOne, the leading corporate endpoint security technology platform.

NSS Labs rated SentinelOne as ‘Recommended’ in The NSS Labs Security Value Map, with the best TCO per protected endpoint, performing the industry’s most rigorous test to date of leading Advanced Endpoint Protection (AEP) solutions. To provide further confidence, SentinelOne financially backs the service and guarantees protection up to $1000 per endpoint or up to $1m compensation should an attack ever go undetected.

Automated, pro-active protection which is customisable

Stop targeted attacks before they even begin. A fully automated, policy-driven response provides zero-touch mitigation for decisive incident response of all endpoint devices. This includes robust containment, full remediation & rollback as you can react to alerts accordingly.

The rise in more sophisticated, dynamic attacks means organizations typically need to deploy additional security controls at the endpoint, but multiple endpoint security agents impact system performance, operational cost and complexity.

A lightweight, autonomous agent continuously monitors all activity on the user endpoint or server, online or offline, automatically acting as early as possible and to mitigate and minimise risk. Manage all of this from a cloud-based platform providing the lowest TCO on the market.


  • Multi-layered approach.
  • Fully automated response.
  • Protects user endpoints AND Data Centre servers.
  • Monitors threats in real-time.
  • Adapts against latest attacks.
  • Complete and insightful visibility.
  • Easy to deploy and simple to manage.


  • Superior Cyber Security with proactive threat detection.
  • No impact to performance.
  • Reduce costs up to 75%.
  • Up to 5x lower TCO.
  • Simplify security management and compliance.
  • Save operational time and resources.
  • Peace of Mind.

UC-One App Help

The Exponential-e UC-One mobile and desktop applications form part of a service provided by Exponential-e.

If you have any questions regarding the Exponential-e UC-One mobile and desktop applications please contact your local IT administrator.

Cloud Sync

per month

Enabling collaboration and control for your users and business

Our Cloud Sync solution is an enterprise-grade file sharing and mobile collaboration tool that enables users to access their files/folders from any device, whether they are online or offline.

Users can finally get access to their business files in just a few simple steps, thanks to the combination of a highly secure file sync and rich mobile and web experience. All whilst the IT department can ensure security, manageability and control of the system - with the added bonus of retaining UK Data Sovereignty.

Redefine collaboration. The way users work is changing, and to align with that the IT systems businesses provide must change too.

  Exponential-e Exponential-e Exponential-e Exponential-e Dropbox for Business Dropbox for Business Box Box One Drive One Drive Citrix ShareFile Citrix ShareFile
Price per user/month From £5.99 From £10.49 From £15 From £11 From £6.50 From £6.60
Storage per user 1 TB Unlimited Unlimited Unlimited 1TB From 1GB
Access on any Device YES YES NO NO NO YES
File Sync Specific Folders YES YES YES YES YES YES
Policy-Driven Hybrid Cloud YES YES NO NO NO YES
UK (and European) data Protection Ensured YES YES NO YES NO NO
Security, Privacy, Compliance Assured YES YES NO NO NO NO
Integration with Exponential-e S4 Cloud Storage YES YES NO NO NO NO
Control access and sharing rights YES YES NO YES YES YES
Univeral integration with Apps and Add-ins YES YES NO YES NO YES

File access from anywhere

Unlike other solutions Cloud Sync conforms to the way your individual users work. There is no need to store documents in designated folders or drives, instead users are able to build and create their drive as works best for them - enabling an increase in productivity.

Cloud Sync is a highly flexible and reliable solution designed not to slow you down, and instead provide users with everything they need wherever they might be.

No need to access files via a tenuous VPN link or upload folders/files to a web portal first. Cloud Sync works fluidly with you, providing a seamless storage solution in the background.

What are the key benefits of Cloud Sync?

  • Mobility - Access full functionality, and all of your files, across any device and from any location.
  • Sharing and Collaboration - Make working on team projects easy, whilst controlling document access with permission level settings.
  • Policies and Control - Restrict or enable access dependant on the group-level policy and user access requirements.
  • Administration - Control the system from a group and user basis, and brand File, Sync and Share with your own company logo and brand style.
  • Cloud Storage- Ensure your files and data are stored in a secure and cost effective way with Cloud Storage, with the added benefit of 99.999999999% data resiliency and seamless ingress/egress.
  • Integration - Cloud Sync works with a number of operating systems and is mobile-optimised for smartphone devices.
  • Reporting - Create and produce usage reports based on users, files, device and folders.
  • Security - As a priority Cloud Sync provides high-level security with Single sign-on (SSO) with Active Directory or any SAML-based authentication system.
  • Data Sovereignty - When used with our Cloud Storage solution, customers can ensure that files uploaded to the Cloud will only be stored in UK-based Data Centres.

The perfect partner for Cloud Storage (S4)

Cloud Storage (S4) is a low-cost, efficient solution that enables your business to store its files, folders and data in our UK based Data Centres ensuring data sovereignty. At a fraction of the cost of traditional NAS/SAN storage solutions, Cloud Storage can enable your business to reduce storage costs and increase productivity across your organisation.

By combing Cloud Storage with Cloud Sync your business will be able to meet the challenges of today’s digital workplace - and the large quantity of data that comes with it. Control the transition of your data from legacy systems to Cloud Storage through the use of File, Sync and Share, and provide your business with just one centralised access point for all your data and documents.

Cloud Storage (S4) is Simple, Secure, Scalable, Sovereign and at prices 30% cheaper than Amazon it could be the ideal solution for your business - particularly when partnered with Cloud Sync. Find out more.


HCP App Help

Thank you for using our Hosted Communications Platform.

If you have any questions regarding the HCP mobile and desktop applications please contact your local IT administrator.