{"id":13902,"date":"2026-02-26T13:14:09","date_gmt":"2026-02-26T12:14:09","guid":{"rendered":"https:\/\/www.combell.com\/en\/blog\/?p=13902"},"modified":"2026-02-26T13:14:12","modified_gmt":"2026-02-26T12:14:12","slug":"combell-nis2-essential-label","status":"publish","type":"post","link":"https:\/\/www.combell.com\/en\/blog\/combell-nis2-essential-label\/","title":{"rendered":"Combell receives NIS2 Essential label: extra assurance for your cloud environment"},"content":{"rendered":"<p><strong>Combell has received the NIS2 Essential Approved label from the Centre for Cybersecurity Belgium (CCB). In this blog, you\u2019ll briefly discover why this is very good news for your cloud environment and your NIS2 plans. More than ever, Combell is your trusted cloud partner.<\/strong><\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-02ad0010 uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">TL;DR<\/p>\n<div class=\"uagb-notice-text\">\n<p>Combell has obtained the NIS2 Essential label from the CCB. This confirms that our cloud environment meets the essential NIS2 requirements. For you, this means: demonstrable security, less compliance stress, and a hosting partner that has been formally assessed.In this blog, we explain what the label entails, how it relates to NIS2 and the Belgian CyberFundamentals Framework, and above all: what you concretely gain when you host your cloud environment with Combell.<\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Why this label matters<\/h2>\n<p>The NIS2 directive makes cybersecurity an absolute must for many organisations. Not only for critical sectors such as energy, telecom or healthcare, but also for many digital service providers and their suppliers.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>The fact that Combell has obtained the NIS2 Essential label means that our security approach not only feels solid internally, but has also been externally validated and recognised within the Belgian NIS2 framework.<\/p>\n<p><cite>Veerle Van Hecke, Compliance &amp; Sustainability Analytics Manager at Combell<\/cite><\/p><\/blockquote>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>As an IT manager or CTO, you will sooner or later be faced with questions about NIS2: from management, auditors, customers or regulators.<\/p>\n<p>On our blog, we have already <a href=\"https:\/\/www.combell.com\/en\/blog\/nis2-directive-belgium\/\">explained what NIS2 entails<\/a> and what impact it has on companies in Belgium and on <a href=\"https:\/\/www.combell.com\/en\/blog\/nis2-cloud-environment\/\">their cloud environments<\/a>. This new step - obtaining the NIS2 Essential label - makes that story tangible.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-buttons is-vertical is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link has-white-color has-iconic-blue-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/www.combell.com\/en\/blog\/nis2-directive-belgium\/\" style=\"border-radius:5px\">What you need to know about NIS2<\/a><\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Assurance for IT managers<\/h3>\n<p>With NIS2, a vague \u201cyes, yes, we\u2019re doing something about security\u201d is no longer enough. You must be able to <strong>demonstrably prove<\/strong> that your organisation and your suppliers have taken the appropriate measures.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>A cloud partner with an <strong>NIS2 Essential label<\/strong> makes this much easier:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-6c8bd978 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-4328ad91 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"You can show management and auditors that your hosting partner has been officially assessed against NIS2 requirements.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">You can show management and auditors that your hosting partner has been <strong>officially assessed<\/strong> against NIS2 requirements.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-a1e02bd7 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"You reduce the risk of an inadequately secured infrastructure becoming the weak link in your chain.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">You reduce the risk of an inadequately secured infrastructure becoming the weak link in your chain.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-bf69a9fa uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"You save time in tenders, security questionnaires and due diligence processes.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">You save time in tenders, security questionnaires and due diligence processes.<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>In other words: the label is <strong>not a marketing badge<\/strong>, but an extra layer of assurance on top of our existing certifications.<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"731\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/nis-guidelines-en-1024x731.png\" alt=\"\" class=\"wp-image-13940\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/nis-guidelines-en-1024x731.png 1024w, https:\/\/www.combell.com\/en\/blog\/files\/nis-guidelines-en-300x214.png 300w, https:\/\/www.combell.com\/en\/blog\/files\/nis-guidelines-en-768x549.png 768w, https:\/\/www.combell.com\/en\/blog\/files\/nis-guidelines-en.png 1400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">NIS2 in Belgium in brief<\/h2>\n<p>NIS2 is a European directive aimed at increasing the cyber resilience of essential and important organisations.<\/p>\n<p>Belgium translates this directive into national legislation and further elaborates it through the CCB\u2019s <strong>CyberFundamentals Framework.<\/strong><\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p><strong>NIS2 imposes obligations in areas such as:<\/strong><\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-c0dc0133 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-31f0d3ad uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"risk management and security policy\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">risk management and security policy<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-d0477098 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"technical and organisational security measures\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">technical and organisational security measures<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-0669be2b uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"incident detection and reporting\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">incident detection and reporting<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-eb52b532 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"business continuity and recovery\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">business continuity and recovery<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-c6f41324 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"supply chain management\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">supply chain management<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>For many organisations, the reality is this: <strong>they use cloud solutions themselves and\/or are suppliers to NIS2 entities.<\/strong> In both cases, the security of their hosting partner plays a key role.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Role of the CCB<\/h3>\n<p>The <a href=\"https:\/\/ccb.belgium.be\/\" target=\"_blank\" rel=\"noopener\"><strong>Centre for Cybersecurity Belgium<\/strong><\/a> is the national authority for cybersecurity. The CCB defines the criteria for the NIS2 Essential label and recognises the processes through which organisations can demonstrate that they meet those criteria.<\/p>\n<p>\u201cThe fact that Combell has obtained the NIS2 Essential label means that our security approach not only feels solid internally, but has also been externally <strong>validated and recognised<\/strong> within the Belgian NIS2 framework,\u201d says Veerle Van Hecke, Compliance &amp; Sustainability Analytics Manager at Combell.<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">What requirements does Combell meet?<\/h2>\n<h3 class=\"wp-block-heading\">Policy and risk management<\/h3>\n<p>The label confirms, among other things, that Combell:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-1973fa17 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-d616152b uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"has a formal and organisation-wide cybersecurity policy\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">has a <strong>formal and organisation-wide cybersecurity policy<\/strong><\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-d49de007 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"structurally applies risk management in decisions, projects and changes\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">structurally applies <strong>risk management<\/strong> in decisions, projects and changes<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-69f9c0bb uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"has clearly defined roles and responsibilities for information security\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">has clearly defined roles and responsibilities for information security<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>Veerle proudly summarises: \u201cAt Combell, cybersecurity is not a standalone IT project, but an integral part of how we design, manage and continuously improve our <a href=\"https:\/\/www.combell.com\/en\/cloud-server\">cloud solutions<\/a>.\u201d<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Technical and organisational measures<\/h3>\n<p>In addition, the label demonstrates that we have implemented appropriate <strong>technical and organisational measures<\/strong>, including:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-d7f4aba3 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-8589cb58 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"strong access management (identity &amp; access management, least privilege, multi-factor authentication where appropriate)\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">strong <strong>access management<\/strong> (identity &amp; access management, least privilege, multi-factor authentication where appropriate)<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-abc2a54c uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"network security through segmentation, firewalls and other protection layers\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>network security<\/strong> through segmentation, firewalls and other protection layers<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-2a82cccc uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"data protection measures, such as encryption in transit\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>data protection<\/strong> measures, such as encryption in transit<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-f638966b uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"standardised processes for patching, hardening and change management\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">standardised processes for <strong>patching, hardening and change management<\/strong><\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>\u201cThese measures form the secure foundation layer of the Combell cloud,\u201d emphasises Veerle Van Hecke. \u201cOn top of that foundation, we can implement additional <em>controls<\/em> depending on your sector, risks or compliance needs.\u201d<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Incident management and improvement<\/h3>\n<p>No organisation can 100% rule out that an incident may occur. What you can do, however, is ensure that you handle it <strong>quickly and professionally.<\/strong><\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>You don\u2019t just have to say that your hosting partner is \u2018secure\u2019. You can demonstrate that this partner complies with government-defined standards and is regularly assessed.<\/p>\n<p><cite>Veerle Van Hecke, Compliance &amp; Sustainability Analytics Manager at Combell<\/cite><\/p><\/blockquote>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>The NIS2 Essential label confirms that Combell:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-ac5fe3c7 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-b0a3fb99 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"has formal incident management processes in place\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">has formal <strong>incident management processes<\/strong> in place<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-a4582643 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"tests and evaluates these processes to ensure they work in practice\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>tests and evaluates<\/strong> these processes to ensure they work in practice<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-56ed48a4 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"continuously works on monitoring, reporting and improving our security measures\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">continuously works on <strong>monitoring, reporting and improving<\/strong> our security measures<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>\u201cThis means you are not relying on \u2018best effort\u2019, but on a cloud partner that knows exactly what needs to happen when something goes wrong,\u201d says Veerle Van Hecke.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Awareness and clear responsibilities<\/h3>\n<p>Finally, the label also looks at the <strong>human side<\/strong> of security. At Combell, we invest in information security awareness, clear procedures and a culture in which employees are <strong>alert and engaged.<\/strong><\/p>\n<p>Veerle concludes: \u201cFor you as a customer, this means you are working with a team that truly lives and breathes security. Not just through a checklist, but in our daily operations.\u201d<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">What does this mean for your organisation?<\/h2>\n<h3 class=\"wp-block-heading\">Less compliance stress<\/h3>\n<p>Do you work in an organisation subject to NIS2, or do you provide services to such an organisation? Then you know that auditors and customers increasingly ask for <strong>proof<\/strong>: certificates, processes, reports, test results.<\/p>\n<p>With a cloud partner labelled NIS2 Essential, you can substantiate a significant part of that story. You can clearly demonstrate that the <strong>underlying hosting and cloud infrastructure<\/strong> meets strictly assessed security requirements.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Better protection and continuity<\/h3>\n<p>The measures behind the label have a direct impact on:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-8810dcc7 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-9f461e99 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"the protection of sensitive and confidential information\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">the <strong>protection of sensitive and confidential information<\/strong><\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-3051fb2a uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"the availability of your applications and data\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">the <strong>availability<\/strong> of your applications and data<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-678ab44a uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"business continuity in the event of incidents\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>business continuity<\/strong> in the event of incidents<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">A stronger story towards management and auditors<\/h3>\n<p>As an IT manager or CTO, you often have to build bridges between what is technically possible and expectations \u201cfrom above\u201d.<\/p>\n<p>An external recognition such as the NIS2 Essential label helps you make the conversation with management, risk &amp; compliance or customers <strong>more concrete.<\/strong><\/p>\n<p>Veerle Van Hecke knows why: \u201cYou don\u2019t just have to say that your hosting partner is \u2018secure\u2019. You can demonstrate that this partner <strong>complies with government-defined standards<\/strong> and is regularly assessed.\u201d<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"731\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/server-shield@2x-1024x731.png\" alt=\"\" class=\"wp-image-13941\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/server-shield@2x-1024x731.png 1024w, https:\/\/www.combell.com\/en\/blog\/files\/server-shield@2x-300x214.png 300w, https:\/\/www.combell.com\/en\/blog\/files\/server-shield@2x-768x549.png 768w, https:\/\/www.combell.com\/en\/blog\/files\/server-shield@2x.png 1400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Advantages of the Combell cloud<\/h2>\n<h3 class=\"wp-block-heading\">Local, ISO-certified data centres<\/h3>\n<p>Combell hosts your data in modern, <a href=\"https:\/\/www.combell.com\/en\/datacenters\">highly secure data centres in the Benelux<\/a>. This infrastructure is aligned with international standards such as <strong>ISO 27001<\/strong> (information security) and <strong>ISO 27701<\/strong> (privacy information management).<\/p>\n<p>Combined with the NIS2 Essential label, this gives you <strong>multiple layers of assurance<\/strong>: international standards and a Belgian framework that directly aligns with NIS2.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-cb759bd2 uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">Lees ook<\/p>\n<div class=\"uagb-notice-text\">\n<p><a href=\"https:\/\/www.combell.com\/en\/blog\/nis2-directive-belgium\/\">NIS2: is your cloud environment ready?<\/a><\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Multi-layer security and backups<\/h3>\n<p>Our cloud solutions are built according to the principle of defence in depth. Think of:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-16bc50e7 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-29853853 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"advanced firewalls and DDoS protection\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">advanced <strong>firewalls<\/strong> and DDoS protection<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-03133813 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"separated environments (development, test, production) where required\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">separated environments (development, test, production) where required<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-37dcb385 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"backups and redundancy in line with agreed RPO\/RTO objectives\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>backups and redundancy<\/strong> in line with agreed RPO\/RTO objectives<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-74fb88f8 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"monitoring of critical components and proactive alerts\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">monitoring of critical components and proactive alerts<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>This reduces the risk that a single weak link will have a major impact on your business.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">24\/7 monitoring and support<\/h3>\n<p>Your cloud environment doesn\u2019t only run during office hours. That\u2019s why our teams <strong>monitor it 24\/7<\/strong>, with support from experts who know your environment.<\/p>\n<p><strong>If something goes wrong, you can count on:<\/strong><\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-2ed5ed39 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-00a629d7 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"fast response times in line with SLA\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">fast response times in line with SLA<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-5e3ba999 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"direct assistance from specialists, not anonymous call centres\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">direct assistance from specialists, not anonymous call centres<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-044a3d7c uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"clear communication about what happened and which steps are being taken\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">clear communication about what happened and which steps are being taken<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"731\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/sla-guarantee@2x-1-1024x731.png\" alt=\"\" class=\"wp-image-13942\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/sla-guarantee@2x-1-1024x731.png 1024w, https:\/\/www.combell.com\/en\/blog\/files\/sla-guarantee@2x-1-300x214.png 300w, https:\/\/www.combell.com\/en\/blog\/files\/sla-guarantee@2x-1-768x549.png 768w, https:\/\/www.combell.com\/en\/blog\/files\/sla-guarantee@2x-1.png 1400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">A labelled cloud partner as a strategic advantage<\/h2>\n<p>When you can present a cloud partner with an <strong>NIS2 Essential label<\/strong> in this context, you have a clear strategic advantage. It shows that you deliberately choose a partner who:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-02920a9b uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-ca2304c3 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"understands and applies NIS2 requirements\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">understands and applies NIS2 requirements<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-8b6fb47a uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"has its security assessed by external parties\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">has its security assessed by external parties<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-768158f6 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"operates within a Belgian framework closely aligned with legislation\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">operates within a Belgian framework closely aligned with legislation<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Discussing your cloud hosting<\/h2>\n<h3 class=\"wp-block-heading\">Topics for an initial meeting<\/h3>\n<p>Every organisation is different. One has a complex hybrid architecture, another mainly runs SaaS, and a third develops its own applications in the cloud. Still, there are several recurring questions we can explore together:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-b05d6094 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-86970b67 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"How relevant is NIS2 within your organisation and\/or your customer portfolio?\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">How relevant is NIS2 within your organisation and\/or your customer portfolio?<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-c28bbe75 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Which systems and data are truly critical for your business?\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Which systems and data are truly <strong>critical<\/strong> for your business?<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-0e72811c uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"What does your current hosting or cloud environment look like, and where are the biggest risks?\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">What does your current hosting or cloud environment look like, and where are the biggest risks?<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-0eec67cd uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Which measures are already in place today, and where do we still see gaps?\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Which measures are already in place today, and where do we still see gaps?<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-92d06288 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Based on these insights, we can help you design an NIS2-ready cloud architecture with the right combination of cloud servers, managed cloud, security solutions and backup.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Based on these insights, we can help you design an NIS2-ready cloud architecture with the right combination of cloud servers, managed cloud, security solutions and backup.<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>Based on these insights, we can help you design an NIS2-ready cloud architecture with the right combination of <strong>cloud servers, <a href=\"https:\/\/www.combell.com\/en\/managed-cloud\">managed cloud<\/a>, security solutions and backup.<\/strong><\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">How Combell can support you<\/h3>\n<p>With the NIS2 Essential label, we demonstrate that our foundation is <strong>robust and independently assessed.<\/strong> But we are happy to go one step further: together with you, we look for <strong>the solution that best fits your organisation<\/strong>, taking into account your sector, risks, budget and growth plans.<\/p>\n<p>Would you like to know how your current environment measures up against NIS2 expectations and the CyberFundamentals Framework? Or are you at the start of a cloud migration and want to approach it in a future-proof way from day one?<\/p>\n<p><strong>Get in touch with our cloud experts and start the conversation about an NIS2-ready cloud environment tailored to your organisation.<\/strong><\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-buttons is-vertical is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link has-white-color has-yellow-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/www.combell.com\/en\/cloud-server\">Choose the ultra-secure Combell cloud<\/a><\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Combell has received the NIS2 Essential Approved label from the Centre for Cybersecurity Belgium (CCB). In this blog, you\u2019ll briefly discover why this is very good news for your cloud...<\/p>\n","protected":false},"author":37,"featured_media":13944,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[62],"tags":[],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-essential-label-header-small.jpg",1200,420,false],"thumbnail":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-essential-label-header-small-50x50.jpg",50,50,true],"medium":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-essential-label-header-small-300x105.jpg",300,105,true],"medium_large":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-essential-label-header-small-768x269.jpg",768,269,true],"large":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-essential-label-header-small-1024x358.jpg",1024,358,true],"1536x1536":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-essential-label-header-small.jpg",1200,420,false],"2048x2048":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-essential-label-header-small.jpg",1200,420,false],"post-featured":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-essential-label-header-small-850x290.jpg",850,290,true],"post-featured-opt":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-essential-label-header-small-750x256.jpg",750,256,true],"post-featured-opt-md":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-essential-label-header-small-850x290.jpg",850,290,true],"post-featured-opt-sm":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-essential-label-header-small-485x165.jpg",485,165,true],"post-featured-opt-xs":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-essential-label-header-small-375x128.jpg",375,128,true],"post-most-popular":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-essential-label-header-small-50x50.jpg",50,50,true],"post-author":["https:\/\/www.combell.com\/en\/blog\/files\/nis2-essential-label-header-small-60x60.jpg",60,60,true]},"uagb_author_info":{"display_name":"Jasper Van Biesen","author_link":"https:\/\/www.combell.com\/en\/blog\/author\/jaspervanbiesen\/"},"uagb_comment_info":0,"uagb_excerpt":"Combell has received the NIS2 Essential Approved label from the Centre for Cybersecurity Belgium (CCB). In this blog, you\u2019ll briefly discover why this is very good news for your cloud...","_links":{"self":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/13902"}],"collection":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=13902"}],"version-history":[{"count":4,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/13902\/revisions"}],"predecessor-version":[{"id":13948,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/13902\/revisions\/13948"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media\/13944"}],"wp:attachment":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=13902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=13902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=13902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}