Compliance and trust infrastructure
Atos continuously invests in the latest certifications and qualifications in order to ensure full compliance with stringent security requirements and to meet clients’ expectations.
To follow or contact us:
ANSSI is the national authority in the area of cyberdefence and network and information security (NIS). ANSSI oversees issuance of, or issuing, on behalf of the Prime Minister, security accreditation (certification and qualification) for trusted products and service providers.
Common Criteria certification
The Common Criteria (CC) represent an international framework of guidelines and specifications developed to assess products in terms of security and information. This certification provides the assurance for governments and businesses that Atos products meets the most stringent regulatory security requirements to protect critical data.
The Citrix Ready certification identifies verified solutions that are trusted to enhance virtualization, networking and cloud computing solutions from Citrix, including Citrix® XenDesktop®, XenApp™, XenServer®, NetScaler® and GoToMeeting®. It gives customers an added confidence in the compatibility of the joint solution offering.
The eIDAS regulation allows the European Union to provide a legal framework for transnational digital transactions. It is aiming for the enhancement of electronic exchanges’ trust.
In order for the European Council to be able to work in all areas which require the use of EU classified information (EUCI), it needs to have a comprehensive security system to protect this information.
EU classified information is categorised in four levels, which are defined by the severity of the impact of disclosure:
– EU TOP SECRET: the unauthorised disclosure of this information could cause exceptionally grave prejudice to the essential interests of the EU or one or more of the member states.
– EU SECRET: the unauthorised disclosure of this information could seriously harm the essential interests of the EU or one or more of the member states.
– EU CONFIDENTIAL: the unauthorised disclosure of this information could harm the essential interests of the EU or one or more of the member states.
– EU RESTRICTED: the unauthorised disclosure of this information could be disadvantageous to the interests of the EU or one or more of the member states.
The Federal Information Processing Standard Publication 140-2 (FIPS 140-2), is a U.S. government computer security standard used to approve cryptographic modules. The National Institute of Standards and Technology (NIST) issued the FIPS 140 Publication Series to coordinate the requirements and standards for cryptography modules that include both hardware and software components. Protection of a cryptographic module within a security system is necessary to maintain the confidentiality and integrity of the information protected by the module.
LABEL FRANCE CYBERSECURITY
The France Cyber Security label aims to promote the recognition of French cybersecurity services. The France Cybersecurity Label is the guarantee for end users that the certified products and services are made in France and possess clear and well-defined functionalities, with a level of quality established by an independent panel.
NATO works with sensitive information and limits access to individuals with proper security clearances. Unintended or malicious disclosure could cause damage to NATO’s forces, its members or its mission. Therefore, classified information is protected through a series of security procedures based on its markings. Four levels of security classification exist: NATO RESTRICTED, NATO CONFIDENTIAL, NATO SECRET, AND COSMIC TOP SECRET.
PIN Transaction Security (PTS) devices are used by a merchant at the point-of-interaction for capturing payment card data and validating approval of its use for a transaction. The Council, via PCI Recognized Laboratories, validates the conformance of PTS devices to the PCI PTS standard and provides a list of approved devices..
Offers and news
With the cyber threat landscape evolving at a rapid scale in a complexly growing environment, cybersecurity has become one of the top business risks.
Are you prepared for the unexpected?
To follow or contact us: