Blog
Meet our Engineering team: at the forefront of IT security
Dániel Tóvaj
2024.12.03
EURO ONE Engineering: we protect your business systems with innovative engineering solutions and advanced IT security technologies.
ISO 27001:2022 and NIS2 requirements and applicability of SIEM solutions
Tamás Tóth
2024.11.28
Discover how the SIEM system aligns with ISO 27001:2022 and NIS2 standards, supporting compliance and meeting cybersecurity requirements.
Meet our SOC team: Cybersecurity at your service on 7/24
Tibor Csavdári
2024.11.26
The EURO ONE's SOC team ensures that companies' IT systems and data are protected with cutting-edge technologies and continuous monitoring.
The Zero Trust approach: Why is protection against internal threats becoming more important?
Gusztáv Krékity
2024.11.21
The Zero Trust model increases enterprise security by controlling all access and automatically protecting the system from internal and external threats.
Introducing our GRC team: IT and OT security, you can count on us
Gábor Bartha
2024.11.19
Our GRC team helps companies manage the risk and compliance requirements of IT/OT systems, improving security and efficiency.
Why is it Important to Integrate NAC Systems in an Enterprise IT System?
Gusztáv Krékity
2024.11.14
The integration of NAC systems is key to enterprise IT security, enabling access restriction and protection of data assets.
Introducing our Network and IT Security Team: Protection in the Digital Space
Gusztáv Krékity
2024.11.11
Our Network and IT Security team provides cutting-edge solutions to protect our customers' systems, ensuring continuous and secure operations.
IT Security Strategy with AI support
Ivett Dobay
2024.11.06
AI-based solutions enable the standardization of IT security systems, increasing cybersecurity effectiveness against growing threats.
InfoSec20 – 20 years of our InfoSec Division
Péter Sajó
2024.10.29
The EURO ONE InfoSec division turned 20 years old! Learn about our successes in cybersecurity and network security, and our future goals in managed services and AI technologies.
Protection against email attacks: solutions from Trend Micro
Gusztáv Krékity
2024.10.24
Trend Micro's AI-based and other solutions provide effective protection against compromised business email attacks. Learn more in our article!
Relationship between the NIS2 directive and IDM systems: How does IDM help with regulatory compliance?
Mónika Bikki
2024.10.17
IDM systems support NIS2 compliance, ensuring transparent management of privileges, auditability and rapid response to incidents.
Vulnerability Management: The Cornerstone of IT Security?!
Gusztáv Krékity
2024.09.26
Vulnerability management is fundamental to IT security, helping to prevent threats and ensure business continuity.
The relationship between Multi Factor Authentication and NIS2
Gusztáv Krékity
2024.09.10
Multi Factor Authentication (MFA) is essential for NIS2 compliance, strengthening corporate cyber security and providing protection against unauthorised access.
Endpoint Protection Solutions for NIS2 Compliance
Gusztáv Krékity
2024.09.02
EPP, EDR and XDR endpoint protection systems help you meet the requirements of the NIS2 Directive and ensuring effective protection against cyber attacks.
SpontEO – in IT Operation and Implementation
Márta Szabó
2024.08.15
SpontEO is an advanced automation tool that supports IT infrastructure management and compliance with NIS2 requirements, including account management and upgrades.
Security Services for Cyber Physical Systems
Péter Hunyadi
2024.08.09
Security solutions for cyber-physical systems, including OT protection, incident management and support for NIS2 compliance.