Detection, analysis, containment and response to incidents
According to NIS2, you must fulfill certain Cybersecurity measures to manage the risks to the security of your network and information systems and to minimize the impact of security incidents. You must protect IT infrastructures and their physical environment (“all-hazards approach”). You should decide exactly how much is appropriate after a risk-based approach for themselves.
NIS‑2 certificate
Penetration testing, or pentesting, is an essential part of the NIS‑2 guideline. A quarter of the entire NIS‑2 reporting consists of the documentation of how often and when which pentests were carried out and with what results.
DEFENDERBOX as NIS‑2 cornerstone
Our DEFENDERBOX is NIS‑2 compliant, i.e. DEFENDERBOX reporting documents exactly all pentests that are considered NIS‑2 certification and an essential component for NIS‑2 audits.
DEFENDERBOX NIS‑2 Reporting
After the first pentest, the initial report for the NIS‑2 certificate is listed in detail,
- which devices, networks and environments were scanned from the outside and inside
- where, which vulnerabilities were found
- which security gaps have been checked
to create an overall picture of your company’s cyber security situation.
In the further weekly or monthly scans with the DEFENDERBOX becomes a NIS‑2 compliant quarterly report which documents exactly what
- which users
- which computer or
- Which devices
have carried out. All these reports are checked and approved by a data protection officer.
Act now!
Are you ready for NIS‑2? Our DEFENDERBOX supports you in this! Strengthen the resilience of your SME NIS‑2 compliant against hacker attacks.
Would you like to know how secure your company already is? Find out with our “Find & Fix” offer! So that you feel secure again.
Download here our NIS‑2 checklist “10 steps to compliance with the NIS‑2 directive” and check how you can increase your cyber security.
What is NIS‑2
NIS stands for “Network and Information Security”. The NIS‑1 directive has been in force since 2016, regulating the measures taken by companies and institutions that fall underKRITIS (operators of critical infrastructures).
The more far-reaching NIS‑2 directive comes into force in October 2024 and affects far more companies than NIS‑1, as this directive obliges EU companies to comply with stricter cybersecurity standards with additional requirements for IT information security.