Compliance and trust infrastructure
Eviden an atos business continuously invests in the latest certifications and qualifications in order to ensure full compliance with stringent security requirements and meet client expectations.
Follow or contact us:
ANSSI is France’s national authority in the area of cyberdefence and network and information security (NIS). ANSSI oversees the issuance of security accreditation (certification and qualification) for trusted products and service providers on behalf of the Prime Minister.
Common Criteria Certification
The Common Criteria (CC) represent an international framework of guidelines and specifications developed to assess products in terms of security and information. This certification provides assurance to governments and businesses that Eviden products meets the most stringent regulatory security requirements to protect critical data.
The Citrix Ready certification identifies verified solutions that are trusted to enhance virtualization, networking and cloud computing solutions from Citrix, including Citrix® XenDesktop®, XenApp™, XenServer®, NetScaler® and GoToMeeting®. It gives customers added confidence in the compatibility of the joint solution offering.
The eIDAS regulation allows the European Union to provide a legal framework for transnational digital transactions. Its goal is the enhancement of trust in electronic exchanges.
In order for the European Council to be able to work in all areas which require the use of EU classified information (EUCI), it needs to have a comprehensive security system to protect this information.
EU classified information is categorised in four levels, which are defined by the severity of the impact of disclosure:
– EU TOP SECRET: the unauthorised disclosure of this information could cause exceptionally grave prejudice to the essential interests of the EU or one or more of the member states.
– EU SECRET: the unauthorised disclosure of this information could seriously harm the essential interests of the EU or one or more of the member states.
– EU CONFIDENTIAL: the unauthorised disclosure of this information could harm the essential interests of the EU or one or more of the member states.
– EU RESTRICTED: the unauthorised disclosure of this information could be disadvantageous to the interests of the EU or one or more of the member states.
The Federal Information Processing Standard Publication 140-2 (FIPS 140-2), is a U.S. government computer security standard used to approve cryptographic modules. The National Institute of Standards and Technology (NIST) issued the FIPS 140 Publication Series to coordinate the requirements and standards for cryptography modules that include both hardware and software components. Protection of a cryptographic module within a security system is necessary to maintain the confidentiality and integrity of the information protected by the module.
France Cybersecurity Label
The France Cybersecurity Label aims to promote the recognition of French cybersecurity services. The France Cybersecurity Label is a guarantee to end users that the certified products and services are made in France and possess clear and well-defined functionalities, with a level of quality established by an independent panel.
NATO works with sensitive information and limits access to individuals with proper security clearances. Unintended or malicious disclosure could cause damage to NATO’s forces, its members or its mission. Therefore, classified information is protected through a series of security procedures based on its markings. Four levels of security classification exist: NATO RESTRICTED, NATO CONFIDENTIAL, NATO SECRET, AND COSMIC TOP SECRET.
PIN Transaction Security (PTS) devices are used by merchants at the point-of-interaction to capture payment card data and validate approval of its use for a transaction. The Council, via PCI Recognized Laboratories, validates the conformance of PTS devices to the PCI PTS standard and provides a list of approved devices.
Offerings and news
With the cyberthreat landscape evolving rapidly in an increasingly complex environment, cybersecurity has become one of the top business risks.
Are you prepared for the unexpected?
To follow or contact us: