Security framework
Within NIS2 the government is speaking about the Information Security Management Systems. Kappa Data uses for its portofilio the security framework, where we present solutions within the core functions of the NIST framework that is also used by the Cyberfundamentals Framework of CCB Belgium
What is the Kappa Data's Security Framework?
As explained above we have used the Cyberfundamentals Framework of CCB Belgium as a reference and we filled in each core function, like Identify-Protect-Detect-Response-Recover, solutions that Kappa Data can offer towards IT Partners.Â
Below you can find all the links towards each solution.Â
Identify Assets
Everything starts with knowing the important cyber threats to your most important assets. Assets can be your IT devices, software applications, buildings, people and as well your business processes and your know-how.Â
You can’t protect what you don’t know exists!Â
The following solutions can be found on this page :Â
Protect Assets
One you have identified the assets you can focus on developing and implementing the safeguards that are necessary to mitigate or contain a cyber risk.Â
The following solutions can be found on this page :Â
Detect Cyber Incidents
Within the Detect core functions of the Cyberfundamentals Framework, the purpose is to ensure the timely detection of cyber security events.Â
The following solutions can be found on this page :Â
Response to cyber incidents
The Respond Core function requires controls that can help you to respond to cyber security incidents. This function requires the ability to contain the impact of potential cyber security incident.Â
This requirement of NIS2 is quite challenging for entities who don’t have the resources of specialized Security Analysts or are having a Security Operations Center.Â
More information on respond to incidents can be found here.Â
Within the Respond area, they are some articles worthwhile to discover.
XDR
Extended Detection and Reponse (XDR) is a way to analyse data coming from a broad spectrum of devices. Not only endpoints are covered, but as well systems like Email, Cloud, Firewall, Microsoft, Productivity platforms, Backup systems and Identity providers can be covered as well. The XDR tools Kappa Data provides have integrations with the most common devices that are used by many organizations.Â
Security Operations Center (SOC)
In case you don’t have the resources to detect and respond to cyber incidents you could be triggered to know more about the services provided by Kappa Data and its suppliers to buy (monthly/yearly) services from it suppliers that do the hard work for you.Â
Secure Access Service Edge (SASE)
For organizations that are looking to replace their MPLS network, our Secure Access Service Edget (SASE) solution of Cato Networks covers the complete security framework like the Cyberfundamentals framework.Â
With Cato Networks, several branch offices can be connected towards one cloud backbone that unifies connectivity and security. Discover how easy it is, to set-up Cato Networks in your organisation.Â
Recover from cyber incidents
The Recover stage in this security framework is all about recovering from a cyber incident and to ensure your business continuity.Â
Everything starts with defining a recovery plan. Different recovery processes and procedures needs to be in place in case of an incident. The processes defines the roles and responsibilities and what to do with the company’s information and systems in case of an incident. The recovery plan needs to incorporate corrections and lessons learned after an incident.Â
Backup’s are essential for protection the company’s information. Within the page Backup contains more information what type of systems Kappa Data can offer.Â
Another important part in the recovery phase is communication to your customers, suppliers and stakeholders. You reputation needs to be repaired, so communication is quite important in this phase. More information can be found on public relations page.Â