NIS2 #9: USB encryption

NIS2 #9: USB encryption Incident monitoring and reporting under NIS2 - what do you need [...]

NIS2 #8: Software monitoring

NIS2 #8: Software monitoring Find out how to identify installed software on devices Ask for [...]

NIS2 #7: USB monitoring

NIS2 #7: USB monitoring Learn how to monitor USB drives used by employees Ask for [...]

Inventory of IT equipment and assets in one place

Inventory of IT equipment and assets in one place Optimization and security with eAuditor Ask [...]

Modern identity management in the context of cyber security

eAuditor IAM: Modern identity management in the context of cyber security Effective data protection and [...]

NIS2 #6: Remote Installation

NIS2 #6: Remote Installation Remote software installation in accordance with NIS2 guidelines Ask for a [...]

NIS2 #5: Control of used applications and PROCESS policy

NIS2 #5: Control of used applications and PROCESS policy NIS2 application control and PROCESS policy [...]

NIS2 #4: DLP Policies.

NIS2 #4: DLP Policies. Management of DLP policies in accordance with NIS requirements Ask for [...]