swiss cyber security
Questionnaire and Calculations
Welcome to your NIS2 Cyber Security Evaluation Report, presented by konzeptplus ag. This report is generated by our advanced NIS2 Evaluation Tool, designed to offer comprehensive insights into cyber security best practices. Covering a range of factors from product and protocol analysis to CISA statistics and risk exposure, our tool delivers a detailed evaluation to enhance your cybersecurity strategies.
Critical applications
A critical application in information technology is a software or system crucial for an organization's functionality, security, or efficiency. These applications are vital for maintaining key business or operational processes. Key characteristics include high availability, strong security, efficient performance, and reliable support. Examples include healthcare systems, online banking platforms, telecommunication networks, and industrial automation systems. Failures in these applications can lead to serious consequences, such as financial loss and safety risks.

Not all infos to show Chart
Not all infos to show Chart
Not all infos to show Chart
Not all infos to show Chart
Not all infos to show Chart
Identity Management
Authentication Module XYZ macht Anomaly Monitoring
Access Management
MFA/FIDO Token/ Passwordless/
SSO
Single Sign On
Security & Firewalls
Authentication (?Authorisation ABAC/RBAC?)
Federated ID Management
Access monitoring
Signing/Electronic Signature
Monitoring
Communications
protected storage
secure & compliant sharing
secure encryption
open secure collaboration.
Transactions
full access monitoring
Fraud, AML, KYC, Risk
Data Security
AI Pattern-based monitoring
Anomaly spotting
Collaboration
AI Pattern-based monitoring
Anomaly spotting
Compliance
AI Pattern-based monitoring
Anomaly spotting
Identity Management
Access Management
Security & Firewalls
Monitoring
Communications
Transactions
Data Security
Collaboration
Compliance
Identity Management
Access Management
Security & Firewalls
Monitoring
secure compliant video conferences/ transcripts
Communications
Risk Engine,Integrity Scan, Dark Web
Transactions
Data Security
Collaboration
Compliance
Products
Welcome to our product selection, where we offer a range of cutting-edge solutions tailored to meet your specific needs. Each product is categorized based on its key features and performance evaluations to help you make an informed decision..
Volumetrics
The Questions in this section will alow as to caluclate the Price of the Products acording to the size of your Company
Contact
Here you can set the information under wich we can contact you