Complete NIS2 solutions
The main objective of NIS2 is to prevent cyber attacks and mitigate their impact when they occur
Why should we be more prepared?
A survey last year found that 41 percent of companies in the European Union paid ransom to cybercriminals to recover their data, amounting to $456 million (158.6 billion forints) last year. (Research cited by Világgazdaság, 31.05.2023.)
By complying with the NIS2 guidelines, companies can minimise the loss of revenue from cyber-attacks and save on the costs associated with cyber-attack response and mitigation. Well-chosen cyber defence technologies use automation, so the cost of extra human resources associated with NIS2 can be minimised.
*(Research quoted by Világgazdaság, 2023.05.31.)
NIS2 Our solutions
NIS2 Complete + IBF
All that is NIS2 Complete and more:
- Provision of an Information Security Officer (IBF) to the Client to avoid Conflicts of Interest**
- Planning, organising, coordinating and controlling
- Preparation of internal audit documentation for compliance with Law XXIII of 2023
- Preparation of an IT security policy
- Security classification and organisational classification of electronic information systems (EIRs) and opinions
- Contacts with the authority
- Coordinate information security awareness training for employees/stakeholders
NIS2
Complete
All that is NIS2 Basic and more:
- Developing an Information Security Framework (ISF)
- Design and implementation of a risk management framework
- Creating a regulatory environment
- Business impact analysis, identifying threats
- Education on the system in place
- Support for system operation
- Preparation for the official audit; internal review
- Organising the official audit, contracting the official auditor
- Advisory Support during the Authority Audit
NIS2
Basic
- Situation Assessment/ GAP Analysis
- IT system review
- Developing an action plan
- Electronic Information System (EIR) registration, self-assessment
Registration guide
Free
- The Free Guide provides help for filling in the official registration (Annex 420)
**The“conflict of interest” rule in relation to the Information Security Officer (ISO) means that the ISO, in the performance of his/her duties, must not engage in activities that could influence decision-making processes or create a conflict of interest. The conflict of interest rules are designed to ensure that the IBF performs its functions independently and objectively.
a. The IBF may not be in a position or situation that could influence the organisation’s security decisions.
b. Avoidance of dual functions: the IBF may not perform any functions which potentially conflict with information security responsibilities. For example, the IBF should not be the CFO as this could create a conflict of interest.
Cybersecurity areas of NIS2
Monitoring
Cybersecurity Exposure Monitoring Services SecureVisio
Logging
Logging systems with automatic incident management SecureVisio – SIEM+SOAR
Data management
Control access to data, prevent data leaks SecureVisio
Antivirus solutions
For complete cyber security Cybereason next gen antivirus
Education, awareness raising
Awareness-raising for prevention Cofense
Who are the stakeholders?
NIS2 covers all companies operating in the risky or high-risk sectors detailed below and employing more than 50 people or with a turnover of more than €10 million.
We offer them a complete and reliable solution to easily comply with NIS2 guidelines.
Cyber Security Monitoring - Scheduling
2024. 1 January. -
30 June
- Security classification and designation of the person responsible for the security of electronic information systems
2024. from 18 October
- Application of NIS2 safeguard measures and payment of a surveillance fee
2024. 31 December 2011
- Contract with a cybersecurity auditor who will carry out the due diligence
2025. 31 December 2011
- Pass the first cybersecurity audit
Cooperation on strong foundations
Grepton’s collaboration with vendor partners has a strong foundation, with Grepton bringing over 20 years of digital development experience, while our vendor partners bring a long history of IT security and IT distribution experience to the partnership. Together with decades of industry experience, we provide our customers with timeless and innovative cybersecurity solutions.
Assessment, implementation, training from a partner
3 manufacturers' technologies from one supplier
Hungarian implementation, support environment
Technical and product support through excellent manufacturer relationships
Cybereason new generation endpoint protection
Cybereason provides full EPP, EDR and mobile security functionality for medium and large enterprises and public administrations. Its products provide highly automated operations, monitor attacks on the network side, and support SOC operating systems with easy-to-integrate forensic knowledge. Its endpoint protection technology is available in pure terrestrial, cloud-based and hybrid designs, with a wide range of add-ons for customisation.
Protection against ransomware with 9 layers of protection
The Cybereason 4 endpoint protection package tailored to customer needs:
- Cybereason Professional
- Cybereason Business
- Cybereason Enterprise
- Cybereason Ultimate
Add-ons:
- Incident Response
- MDR (Managed Detection and Response)
- DFIR (Digital Forensic and Incident Response)
- Risk analysis, security situational awareness
- Data leakage protection
- Mobile protection
- Threat detection and protection
Secure Visio - Next generation IT security platform
SecureVisio’s SIEM, SOAR and UEBA systems are adapted to the needs of the Hungarian market and can provide cyber protection for medium and large companies and institutions, even at the regional level. All this can be achieved entirely locally, without the cloud. SecureVisio reacts quickly to changes and is therefore a reliable partner in complying with legislation such as NIS2 or GDPR. The technology supports Industry 4.0 guidelines and is compatible with SCADA systems.
Cybersecurity processes that SecureVisio can manage:
- Situational awareness – inventory, map and visualise IT assets and processes
- Risk analysis of cyber threats
- SecureVisio SIEM – Event information collection and storage
- SecureVisio SOAR – Automate the process for handling security incidents and vulnerabilities
- Protection of personal data
Why is it worth using SecureVisio?
- effective compliance with general and industry standards (e.g. NIS2, GDPR…)
- easy updates, support
- cost-effective licensing on a log source basis
- reducing false alarms with behavioural analysis functions (UEBA)
- BCP management with built-in automation
- more efficient SOC teams: faster response, fewer false alarms
Cofense - platform for phising and awareness
An awareness platform where a complete phising campaign can be simulated, measured back and the awareness process can be carried out. PhishMe, available within Cofens, takes training to the next level with training modules based on the latest phising trends
Cofense pillars:
- Phising Defense Center: automated execution of phishing campaigns
- Customise any email campaign you think is real, including BEC mail campaigns
- Security Email Gateway: report emails that are considered suspicious to support immediately at the touch of a button.
- Advanced reporting skills:
- Clickstream analysis
- Threat deception countdown (not just clicks, but also fills in for example)
- Generate management reports on company performance and organisational awareness and resilience
iStorage
Bitdefender - GravityZone
Bitdefender is one of the world’s top three endpoint protection vendors, protecting more than 500 million endpoints worldwide with Bitdefender technology. It has its own research and development lab, where it detects an average of 400 new threats every minute.
Bitdefender’s GravityZone endpoint protection portfolio offers three levels of protection, ensuring the right protection for everyone from micro-enterprises to large enterprises and public sector entities exposed to high threat levels.
Business Security – Protecting small and medium-sized businesses
Through machine learning techniques, behavioral analysis and continuous monitoring of running processes, complete protection against all types of malware (ransomware, phishing, zero-day attacks, viruses, spyware, etc.) can be delivered to desktops, laptops, physical and virtual servers through a single, easy-to-manage platform.
Business Security Premium – Protecting medium and large enterprises
Machine learning-driven security technology protects your business from sophisticated cyber-attacks such as advanced threat technology (APT) and ransomware. The solution is easy to manage from a single console and covers physical, virtual, mobile, cloud and email endpoints.
Business Security Enterprise – Designed to protect large enterprises
It combines the world’s most powerful endpoint protection platform with EDR and XDR capabilities to protect workstations, servers and containers.
Bitdefender technologies:
- XDR (Extended Detection and Response)
- Cloud and server protection
- SecDevops, container protection
- E-mail protection
- EDR (Endpoint Detection and Response)
- Ground server protection
- Protection of mobile devices
- Monitoring and Risk Management
- Patch management
- Full disk encryption
- Save protection
With Bitdefender’s modular endpoint protection technology, the protection level can be extended through add-ons.
Available add-ons:
- Advanced email protection
- Patch management
- Full disk encryption
- Amazon Web Service Protection
- NAS, file sharing, next-gen protection
Trellix
Trellix is a US IT security vendor at the forefront of prevention. For years, he has been responsible for detecting every second zero-day attack. Trellix was created in 2022 from the merger of two companies that dominate the cybersecurity market. The company entered the market as a single brand with a complex product portfolio after the merger of FireEye and McAfee Enterprise. More than 1 billion threats have been detected worldwide.
The Trellix product portfolio:
- XDR -Extended Response and Detection
Data is processed, correlated and contextualised with threat intelligence. Built-in playbooks provide an integrated analytical experience with automated recovery. - Endpoint Protection (Trellix Endpoint Security, Trellix EDR, Trellix Mobile Security)
- Application control
- Mobile endpoint protection
- EDR – Endpoint Detection and Response
- Web control
- Network Security (Trellix Network Security)
- Active forensic
- IPS – Intrusion Prevention System
- SecOps
- Data management and privacy (Trellix DLP)
- DLP – Data Loss Prevention
- NDLP – Network Data Loss Prevention
- Email protection (Trellix Email Security)
- Cloud Security (Trellix Cloud Security)
- Threats, vulnerability testing
- SIEM – Security Information and Event Management
GFI LanGuard
GFI Languard
A cost-effective alternative for mapping network elements, identifying security risks and patching them.
What does GFI LanGuard do?
- Allows patching of operating systems, third-party applications, web browsers and mobile phones.
- Compatible with Microsoft, MacOS and Linux operating systems.
- Up to 500 machines can be upgraded simultaneously via a central console.
- It can identify more than 60 000 vulnerabilities.
- Integrates with more than 4 000 third-party security applications.
![bezár](/wp-content/themes/blocksy-child/images/close-icon.png)
![bezár](/wp-content/themes/blocksy-child/images/close-icon.png)
![bezár](/wp-content/themes/blocksy-child/images/close-icon.png)
Send us your contact details and we will contact you as soon as possible, or contact us at
+36 1 204-7730!
![shake hands](/wp-content/themes/blocksy-child/images/shake-hands.jpg)
![shake hands](/wp-content/themes/blocksy-child/images/shake-hands.jpg)
![shake hands](/wp-content/themes/blocksy-child/images/shake-hands.jpg)
![bezár](/wp-content/themes/blocksy-child/images/close-icon.png)
![bezár](/wp-content/themes/blocksy-child/images/close-icon.png)
![bezár](/wp-content/themes/blocksy-child/images/close-icon.png)
Please enter your contact details and we will send you the free guide to the email address you provided shortly!
![shake hands](/wp-content/themes/blocksy-child/images/shake-hands.jpg)
![shake hands](/wp-content/themes/blocksy-child/images/shake-hands.jpg)
![shake hands](/wp-content/themes/blocksy-child/images/shake-hands.jpg)