Security Self Check

Questionnaire and Calculations

Welcome to your NIS2 Cyber Security Evaluation Report, presented by konzeptplus ag. This report is generated by our advanced NIS2 Evaluation Tool, designed to offer comprehensive insights into cyber security best practices. Covering a range of factors from product and protocol analysis to CISA statistics and risk exposure, our tool delivers a detailed evaluation to enhance your cybersecurity strategies.

Critical applications

A critical application in information technology is a software or system crucial for an organization's functionality, security, or efficiency. These applications are vital for maintaining key business or operational processes. Key characteristics include high availability, strong security, efficient performance, and reliable support. Examples include healthcare systems, online banking platforms, telecommunication networks, and industrial automation systems. Failures in these applications can lead to serious consequences, such as financial loss and safety risks.
Image

I have already

My goal

Level 1 Level 2 Level 3
Identity Management
Multifactor Authenitication using PIV (Smartcard) and/or FIDO2
Self service and/or managed identity provisioning
Signins and Private Key Infrastructure
Zero Trust
Certificate Management System with HSM
Identity Provisioning
Artificial intelligence monitoring of authentication
Access Management
Role-based validation/authorisation
Use of PIV (Smartcard) and/or FIDO2
attribute based access management
Single Sign On (SSO)
managed Identity Provision
Token-based API-security
No additional best practices
Security & Firewalls
Malware / ransomware / virus detection
External access only over proxy
Access only to needed ports and routes
AI - based ransomware detection and antivirus tools
High availability networks with segregation
Monitoring
Analytics and surveilance of hardware und logins
Darkweb monitoring of domain and emails subversive activities (Know your business; KYB)
Darkweb monitoring of customer and management subversive activities (Know your customer - KYC; Know your management; KYM)
Zero Trust
Triple monitoring
AI-Based anomaly detection
(Network monitor is externally monitored, which is also monitored)
Darkweb Monitoring
Darkweb monitoring of employee subversive activities (Know your Employee - KYE)
Communications
Secure Chat (intern and Ext.)
Secure Mail
Secure Conference
Channel independent CI/ CD and event-based solutions. Encrpyted and secured datamanagement
Verified users
trusted signature class 2
Zero-Trust with FIDO2 ID-Validations
AI-monitored interactions
Validated but anonymous secure communication
Transactions
SSL
Tokenbased / zero trust end to end secured transactions
AI-monitored transactions
Data Security
Backup according to 321/322 rule (3 data copies, of which 1 production, 2 different media, 1 offsite or 1 offsite & 1 in cloud)
Encrypted backups
Encryption of data at rest
Mulilayer encryption
AI digital fingerprinting of data
Collaboration
Rolebased access to data and applications.
Zero Trust with IAM and API-Tokens
AI-monitored collaboration
Compliance
Compliant data - archiving policies
DSG adherence
Implemented technical and organisational measures
Whistleblowing functionality
Secure and compliance customer / partner communications
No additional best practices
Identity Management

Level 1

Multifactor Authenitication using PIV (Smartcard) and/or FIDO2
Self service and/or managed identity provisioning

Level 2

Signins and Private Key Infrastructure
Zero Trust
Certificate Management System with HSM
Identity Provisioning

Level 3

Artificial intelligence monitoring of authentication
Access Management

Level 1

Role-based validation/authorisation
Use of PIV (Smartcard) and/or FIDO2

Level 2

attribute based access management
Single Sign On (SSO)
managed Identity Provision
Token-based API-security

Level 3

No additional best practices
Security & Firewalls

Level 1

Malware / ransomware / virus detection
External access only over proxy
Access only to needed ports and routes

Level 2

AI - based ransomware detection and antivirus tools

Level 3

High availability networks with segregation
Monitoring

Level 1

Analytics and surveilance of hardware und logins
Darkweb monitoring of domain and emails subversive activities (Know your business; KYB)

Level 2

Darkweb monitoring of customer and management subversive activities (Know your customer - KYC; Know your management; KYM)
Zero Trust
Triple monitoring
AI-Based anomaly detection
(Network monitor is externally monitored, which is also monitored)

Level 3

Darkweb Monitoring
Darkweb monitoring of employee subversive activities (Know your Employee - KYE)
Communications

Level 1

Secure Chat (intern and Ext.)
Secure Mail
Secure Conference

Level 2

Channel independent CI/ CD and event-based solutions. Encrpyted and secured datamanagement
Verified users
trusted signature class 2

Level 3

Zero-Trust with FIDO2 ID-Validations
AI-monitored interactions
Validated but anonymous secure communication
Transactions

Level 1

SSL

Level 2

Tokenbased / zero trust end to end secured transactions

Level 3

AI-monitored transactions
Data Security

Level 1

Backup according to 321/322 rule (3 data copies, of which 1 production, 2 different media, 1 offsite or 1 offsite & 1 in cloud)
Encrypted backups

Level 2

Encryption of data at rest
Mulilayer encryption

Level 3

AI digital fingerprinting of data
Collaboration

Level 1

Rolebased access to data and applications.

Level 2

Zero Trust with IAM and API-Tokens

Level 3

AI-monitored collaboration
Compliance

Level 1

Compliant data - archiving policies
DSG adherence
Implemented technical and organisational measures

Level 2

Whistleblowing functionality
Secure and compliance customer / partner communications

Level 3

No additional best practices

Not all infos to show Chart
Not all infos to show Chart
Not all infos to show Chart
Not all infos to show Chart
Not all infos to show Chart

Products

Welcome to our product selection, where we offer a range of cutting-edge solutions tailored to meet your specific needs. Each product is categorized based on its key features and performance evaluations to help you make an informed decision..

In den Ausgewälten Produkten vorhanden

Bereits eingesetzt nach angaben der Level auswahl

Wird Empfolen

Rating
Cost Rating
Single Sign On
Signing/Electronic Signature
Secure Encryption
MFA
Pass Key
FIDO 2 Token
PKI Zertifikate
TOTP
U2F
Rating
Cost Rating
Single Sign On
Authentication (Authorisation ABAC/RBAC)
Access monitoring
Signing/Electronic Signature
Secure Encryption
MFA
Pass Key
FIDO 2 Token
PKI Zertifikate
Rating
Cost Rating
Single Sign On
Authentication (Authorisation ABAC/RBAC)
Federated ID Management
Access monitoring
Signing/Electronic Signature
Protected Storage
Full Access Monitoring
Pass Key
FIDO 2 Token
OTP
TOTP
SNMP
U2F
Rating
Cost Rating
Single Sign On
Access monitoring
Secure Compliant Video Conferences/Transcripts
Secure Encryption
Open Secure Collaboration
Full Access Monitoring
AI Pattern-based monitoring
SNMP
Rating
Cost Rating
Access monitoring
Secure Compliant Video Conferences/Transcripts
Protected Storage
Secure & Compliant Sharing
Secure Encryption
Open Secure Collaboration
OpenPGP
Rating
Cost Rating
Signing/Electronic Signature
Secure Encryption
Fraud, AML, KYC, Risk
Anomaly spotting
Rating
Cost Rating
AI Authentication Anomaly Monitoring
Access monitoring
Open Secure Collaboration
Risk Engine, Integrity Scan, Dark Web
AI Pattern-based monitoring
Anomaly spotting
Rating
Cost Rating
AI Authentication Anomaly Monitoring
Risk Engine, Integrity Scan, Dark Web
Fraud, AML, KYC, Risk
AI Pattern-based monitoring
Anomaly spotting
Rating
Cost Rating
AI Authentication Anomaly Monitoring
Authentication (Authorisation ABAC/RBAC)
Access monitoring
Secure Encryption
Risk Engine, Integrity Scan, Dark Web
AI Pattern-based monitoring
Anomaly spotting
Rating
Cost Rating
Protected Storage
Secure Encryption
Open Secure Collaboration
Risk Engine, Integrity Scan, Dark Web
Fraud, AML, KYC, Risk
AI Pattern-based monitoring
Anomaly spotting
Rating
Cost Rating
System Monitoring
Rating
Cost Rating
Secure & Compliant Sharing
Secure Encryption
Open Secure Collaboration
Rating
Cost Rating
Open Secure Collaboration
Rating
Cost Rating
Open Secure Collaboration
Rating
Cost Rating
Risk Engine, Integrity Scan, Dark Web
Rating
Cost Rating
Risk Engine, Integrity Scan, Dark Web
Rating
Cost Rating
Risk Engine, Integrity Scan, Dark Web
Rating
Cost Rating
Single Sign On
Authentication (Authorisation ABAC/RBAC)
Federated ID Management
Access monitoring
Signing/Electronic Signature
Full Access Monitoring
Pass Key
FIDO 2 Token
PKI Zertifikate
Rating
Cost Rating
Single Sign On
Authentication (Authorisation ABAC/RBAC)
Signing/Electronic Signature
Full Access Monitoring
Anomaly spotting
System Monitoring
Rating
Cost Rating
Secure Encryption
Full Access Monitoring
AI Pattern-based monitoring
System Monitoring
Rating
Cost Rating
AI Authentication Anomaly Monitoring
AI Pattern-based monitoring
Anomaly spotting
System Monitoring
Rating
Cost Rating
Single Sign On
Authentication (Authorisation ABAC/RBAC)
Federated ID Management
Access monitoring
Signing/Electronic Signature
MFA
Pass Key
FIDO 2 Token
PKI Zertifikate
TOTP
U2F

Volumetrics

The Questions in this section will alow as to caluclate the Price of the Products acording to the size of your Company

How many of the following type of IT users do you have:
This has an impact on the licencing of the various products, as well as the suitability of specific identity measures for specific user groups.
Contact

Here you can set the information under which we can contact you

Do you wish to be Contacted?
We appreciate your engagement with our Evaluation Tool, designed to provide you with a comprehensive analysis tailored to your unique requirements. Your commitment to excellence is evident, and we want to ensure that your experience is nothing short of exceptional.

By selecting the Commit and Calculate button, you initiate a sophisticated process that not only computes precise calculations but also furnishes you with detailed statistics through our cutting-edge Evaluation Tool. This information serves as a strategic compass, guiding your decisions towards optimal outcomes.

Should you contemplate a shift in your product preference for achieving the pinnacle of success at your LEVEL, feel free to revisit and modify your responses. Your commitment to excellence warrants the flexibility to align with your evolving objectives.

In addition to the insightful results, our platform offers you the capability to immortalize your achievements in a tangible format. By selecting the Create PDF option, a bespoke document encapsulating your results will be generated. To access this personalized report, you will be provided with a unique token, ensuring the security and exclusivity of your confidential information.

Your journey towards success is not only marked by commitment but also by informed choices. Click, commit, calculate, and elevate your trajectory with our sophisticated Evaluation Tool.