With the NIS2 directive, the European Union wants to make companies step up their cybersecurity efforts. With Ewon products, HMS Networks already meets the most stringent standards in this field.
NIS2 (Network and Information Security) is a European directive published on December 27, 2022, which aims to strengthen the European Union's cybersecurity resilience at corporate and government level. Unlike NIS1, which concerned only a limited number of essential sectors (health, energy, etc.), NIS2 targets not only a larger number of essential sectors (space, public administrations, etc.), but also important sectors (food, postal services, electronics manufacturers, etc.).
The new sectors concerned will therefore have to implement the obligations listed in the law (risk management, incident reporting, etc.) through concrete actions.
As the number of cyber attacks increases, this topic becomes a key challenge for all stakeholders. Based on this observation, NIS2 establishes a framework for Europe-wide cybersecurity management.
It is currently impossible to give specific details on the implementation of the measures set out in NIS2, as, like all directives, it has yet to be transposed into the national law of each member state. Member states will have a specific time frame to do so.
We are already perfectly prepared to meet the NIS2 challenge.
With the ISO 27001 certification, the international standard for information security management systems, Ewon currently meets the most stringent cybersecurity requirements. And we're ready to go even further. Aware of our social responsibility in terms of security, we therefore welcome the European Union's initiative to tackle this issue head-on, because more than ever, it's our collective security that's at stake.
Through our ISO 27001 certification, we have implemented comprehensive security measures that protect information. We are audited on every of the 100+ controls listed in Annex A of ISO 27001. This provides the level of security that industrial companies are entitled to expect.
We pay particular attention to the implementation and compliance of all these measures from devices to the cloud as well as in our own infrastructure, ensuring that machines and data are well protected.