{"id":29524,"date":"2026-02-26T13:13:24","date_gmt":"2026-02-26T12:13:24","guid":{"rendered":"https:\/\/www.combell.com\/nl\/blog\/?p=29524"},"modified":"2026-02-26T13:13:30","modified_gmt":"2026-02-26T12:13:30","slug":"combell-nis2-essential-label","status":"publish","type":"post","link":"https:\/\/www.combell.com\/nl\/blog\/combell-nis2-essential-label\/","title":{"rendered":"Combell krijgt NIS2 Essential label: extra zekerheid voor jouw cloudomgeving"},"content":{"rendered":"<p><strong>Combell heeft van het Centrum voor Cybersecurity Belgi\u00eb (CCB) het NIS2 Essential Approved label ontvangen. In deze blog lees je kort waarom dat z\u00e9\u00e9r goed nieuws is voor jouw cloudomgeving en NIS2-plannen. Combell is meer dan ooit jouw betrouwbare cloudpartner.<\/strong><\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-6e0a0abb uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">TL;DR<\/p>\n<div class=\"uagb-notice-text\">\n<p>Combell behaalde het NIS2 Essential-label van het CCB. Dat bevestigt dat onze cloudomgeving voldoet aan de essenti\u00eble NIS2-vereisten. Voor jou betekent dat: aantoonbare security, minder compliance-stress en een hostingpartner die formeel getoetst is.In deze blog leggen we uit wat het label inhoudt, hoe het zich verhoudt tot NIS2 en het Belgische CyberFundamentals Framework, en vooral: wat jij hier concreet aan hebt wanneer je jouw cloudomgeving bij Combell host.<span style=\"background-color: rgb(204, 224, 255); color: rgb(26, 32, 44);\"><\/span><\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Waarom dit label belangrijk is<\/h2>\n<p>De NIS2-richtlijn maakt cybersecurity voor heel wat organisaties een <strong>absolute <em>must<\/em><\/strong>. Niet alleen voor kritieke sectoren zoals energie, telecom of zorg, maar ook voor heel wat digitale dienstverleners en hun leveranciers.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Dat Combell het NIS2 Essential label kreeg, betekent dat onze securityaanpak niet alleen intern goed voelt, maar ook extern gevalideerd en erkend is binnen het Belgische NIS2-kader.<\/p>\n<p><cite>Veerle Van Hecke, Compliance &amp; Sustainability Analytics Manager bij Combell<\/cite><\/p><\/blockquote>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p><strong>Als IT-manager of CTO krijg je dus vroeg of laat vragen over NIS2 op je bord<\/strong>: van directie, auditors, klanten of toezichthouders.<\/p>\n<p>Op onze blog legden we al uit <a href=\"https:\/\/www.combell.com\/nl\/blog\/nis2-richtlijn-belgie\/\" target=\"_blank\" rel=\"noreferrer noopener\">wat NIS2 precies inhoudt<\/a> en welke impact het heeft op bedrijven in Belgi\u00eb <a href=\"https:\/\/www.combell.com\/nl\/blog\/nis2-cloudomgeving\/\" target=\"_blank\" rel=\"noreferrer noopener\">en op hun cloudomgeving<\/a>. Deze nieuwe stap - het behaalde NIS2 Essential-label - maakt dat verhaal concreet.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-buttons is-vertical is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link has-white-color has-iconic-blue-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/www.combell.com\/nl\/blog\/nis2-richtlijn-belgie\/\" style=\"border-radius:5px\">Wat je zeker moet weten over NIS2<\/a><\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Zekerheid voor IT-managers<\/h3>\n<p>Met NIS2 volstaat een vage \u201cja ja, we doen wel iets rond security\u201d niet meer. Je moet <strong>aantoonbaar<\/strong> kunnen maken dat je organisatie en je leveranciers de juiste maatregelen hebben genomen.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>Een cloudpartner met een <strong>NIS2 Essential label<\/strong> maakt dat een stuk eenvoudiger:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-19452c4b uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-afd1050e uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Je kunt naar bestuur en auditors tonen dat je hostingpartner officieel getoetst is op NIS2-vereisten.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Je kunt naar bestuur en auditors tonen dat je hostingpartner <strong>officieel getoetst<\/strong> is op NIS2-vereisten.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-50228c97 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Je vermindert het risico dat een onvoldoende beveiligde infrastructuur de zwakke schakel in je keten wordt.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Je vermindert het risico dat een onvoldoende beveiligde infrastructuur de zwakke schakel in je keten wordt.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-72857805 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Je wint tijd in tenders, securityvragenlijsten en due diligence-trajecten.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Je wint tijd in tenders, securityvragenlijsten en due diligence-trajecten.<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>Met andere woorden: het label is<strong> geen marketingbadge<\/strong>, maar een extra laag zekerheden bovenop onze bestaande certificeringen.<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1400\" height=\"1000\" src=\"https:\/\/www.combell.com\/nl\/blog\/files\/nis-guidelines-nl.png\" alt=\"\" class=\"wp-image-29606\" srcset=\"https:\/\/www.combell.com\/nl\/blog\/files\/nis-guidelines-nl.png 1400w, https:\/\/www.combell.com\/nl\/blog\/files\/nis-guidelines-nl-300x214.png 300w, https:\/\/www.combell.com\/nl\/blog\/files\/nis-guidelines-nl-768x549.png 768w\" sizes=\"(max-width: 1400px) 100vw, 1400px\" \/><\/figure>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">NIS2 in Belgi\u00eb in het kort<\/h2>\n<p>NIS2 is een Europese richtlijn die de cyberweerbaarheid van essenti\u00eble en belangrijke organisaties moet verhogen.<\/p>\n<p>Belgi\u00eb vertaalt die richtlijn naar nationale wetgeving en werkt die verder uit via het <strong>CyberFundamentals Framework<\/strong> van het CCB.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p><strong>NIS2 legt onder meer verplichtingen op rond:<\/strong><\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-236c14ee uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-9a581ddf uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"risicobeheer en securitybeleid\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">risicobeheer en securitybeleid<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-e960de78 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"technische en organisatorische beveiligingsmaatregelen\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">technische en organisatorische beveiligingsmaatregelen<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-8c29a672 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"incidentdetectie en -melding\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">incidentdetectie en -melding<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-de4a3378 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"bedrijfscontinu\u00efteit en herstel\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">bedrijfscontinu\u00efteit en herstel<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-afd539ce uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"beheer van de toeleveringsketen\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">beheer van de toeleveringsketen<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>Voor heel wat organisaties geldt: <strong>ze gebruiken zelf cloudoplossingen en\/of zijn leverancier van NIS2-entiteiten<\/strong>. In beide gevallen speelt de beveiliging van hun hostingpartner een belangrijke rol.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Rol van het CCB<\/h3>\n<p>Het <strong><a href=\"https:\/\/ccb.belgium.be\/nl\" target=\"_blank\" rel=\"noopener\">Centrum voor Cybersecurity Belgi\u00eb<\/a><\/strong> is de nationale autoriteit voor cybersecurity. Het CCB definieert de criteria voor het NIS2 Essential label en erkent de processen waarlangs organisaties kunnen aantonen dat ze aan die criteria voldoen.<\/p>\n<p>\"Dat Combell het NIS2 Essential label kreeg, betekent dus dat onze securityaanpak niet alleen intern goed voelt, maar ook extern <strong>gevalideerd en erkend<\/strong> is binnen het Belgische NIS2-kader\", zegt Veerle Van Hecke, Compliance &amp; Sustainability Analytics Manager bij Combell.<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Aan welke eisen voldoet Combell?<\/h2>\n<h3 class=\"wp-block-heading\">Beleid en risicobeheer<\/h3>\n<p>Het label bevestigt onder meer dat Combell:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-d4ed654e uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-45eeb426 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"een formeel en gedragen cybersecuritybeleid heeft, verankerd in de organisatie\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">een <strong>formeel en gedragen cybersecuritybeleid<\/strong> heeft, verankerd in de organisatie<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-067601cd uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"risicobeheer structureel toepast bij beslissingen, projecten en changes\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>risicobeheer<\/strong> structureel toepast bij beslissingen, projecten en changes<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-b62b1f31 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"duidelijke rollen en verantwoordelijkheden heeft vastgelegd voor informatiebeveiliging\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">duidelijke rollen en verantwoordelijkheden heeft vastgelegd voor informatiebeveiliging<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>Veerle vat het trots samen: \"Bij Combell is cybersecurity geen losstaand IT-project, maar maakt integraal deel uit van hoe we onze <a href=\"https:\/\/www.combell.com\/nl\/cloud-server\" target=\"_blank\" rel=\"noreferrer noopener\">cloudoplossingen<\/a> ontwerpen, beheren en bijsturen.\"<\/p>\n<h3 class=\"wp-block-heading\">Technische en organisatorische maatregelen<\/h3>\n<p>Daarnaast toont het label aan dat we passende <strong>technische en organisatorische maatregelen<\/strong> hebben ingevoerd, waaronder:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-24eaab71 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-05754dcc uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"sterk toegangsbeheer (identity &amp; access management, least privilege, multi-factor authenticatie waar aangewezen)\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">sterk <strong>toegangsbeheer<\/strong> (identity &amp; access management, least privilege, multi-factor authenticatie waar aangewezen)<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-829f56e9 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"netwerkbeveiliging via segmentatie, firewalls en andere beschermingslagen\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>netwerkbeveiliging<\/strong> via segmentatie, firewalls en andere beschermingslagen<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-18b5224a uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"maatregelen rond databescherming, zoals encryptie in transit\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">maatregelen rond <strong>databescherming<\/strong>, zoals encryptie in transit<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-87e00bc4 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"gestandaardiseerde processen voor patching, hardening en change management\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">gestandaardiseerde processen voor <strong>patching, hardening en change management<\/strong><\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>\"Deze maatregelen vormen de beveiligde basislaag van de Combell cloud\", benadrukt Veerle Van Hecke. \"Bovenop die basis kunnen we extra <em>controls <\/em>voorzien naargelang jouw sector, risico\u2019s of compliancenoden.\"<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Incidentbeheer en verbetering<\/h3>\n<p>Geen enkele organisatie kan 100% uitsluiten dat er ooit een incident plaatsvindt. Wel kan je zorgen dat je er <strong>snel en professioneel<\/strong> mee omgaat.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Je hoeft niet enkel te zeggen dat je hostingpartner 'veilig' is. Je kan aantonen dat die partner voldoet aan door de overheid gedefinieerde normen en regelmatig getoetst wordt.<\/p>\n<p><cite>Veerle Van Hecke, Compliance &amp; Sustainability Analytics Manager bij Combell<\/cite><\/p><\/blockquote>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>Het NIS2 Essential label bevestigt dat Combell:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-b33affbb uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-5fb258a0 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"formele incidentbeheerprocessen heeft vastgelegd\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">formele <strong>incidentbeheerprocessen<\/strong> heeft vastgelegd<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-ba7786a6 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"deze processen test en evalueert, zodat we weten wat werkt in de praktijk\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">deze processen <strong>test en evalueert<\/strong>, zodat we weten wat werkt in de praktijk<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-e4760a7a uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"continu werkt aan monitoring, rapportering en verbetering van onze beveiligingsmaatregelen\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">continu werkt aan <strong>monitoring, rapportering en verbetering<\/strong> van onze beveiligingsmaatregelen<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>\"Zo ben jij niet alleen afhankelijk van \u201cbest effort\u201d, maar van een cloudpartner die precies weet wat er moet gebeuren wanneer er iets misloopt\", zegt Veerle Van Hecke hierover.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Sensibilisering en duidelijke verantwoordelijkheden<\/h3>\n<p>Tot slot kijkt het label ook naar de <strong>menselijke kant<\/strong> van security. Bij Combell investeren we in sensibilisering rond informatiebeveiliging, duidelijke procedures en een cultuur waarin medewerkers <strong>alert en betrokken<\/strong> zijn.<\/p>\n<p>Veerle concludeert: \"Voor jou als klant betekent dat je samenwerkt met een team dat security ademt. Nee, niet enkel met een checklist, maar in onze dagelijkse bezigheden.\"<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Wat betekent dit voor jouw organisatie?<\/h2>\n<h3 class=\"wp-block-heading\">Minder compliance-stress<\/h3>\n<p>Werk je in een NIS2-plichtige organisatie, of lever je diensten aan zo\u2019n organisatie? Dan weet je dat auditors en klanten steeds vaker vragen naar <strong>bewijs<\/strong>: certificaten, processen, rapporten, testresultaten.<\/p>\n<p>Met een NIS2 Essential gelabelde cloudpartner kun je een belangrijk stuk van dat verhaal onderbouwen. Je kunt duidelijk aantonen dat de <strong>onderliggende hosting- en cloudinfrastructuur<\/strong> voldoet aan streng getoetste security-eisen.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Betere bescherming en continu\u00efteit<\/h3>\n<p>De maatregelen achter het label hebben directe impact op:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-4f991e98 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-bd27c831 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"de bescherming van gevoelige en vertrouwelijke informatie\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">de <strong>bescherming van gevoelige en vertrouwelijke informatie<\/strong><\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-ad45ec7e uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"de beschikbaarheid van jouw applicaties en data\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">de <strong>beschikbaarheid<\/strong> van jouw applicaties en data<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-ee95865f uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"de bedrijfscontinu\u00efteit bij incidenten\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">de <strong>bedrijfscontinu\u00efteit<\/strong> bij incidenten<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Sterker verhaal richting bestuur en auditors<\/h3>\n<p>Als IT-manager of CTO moet je vaak bruggen bouwen tussen wat technisch mogelijk is en verwachtingen 'van bovenaf'.<\/p>\n<p>Een externe erkenning zoals het NIS2 Essential label zal je helpen om het gesprek met bestuur, risk &amp; compliance of klanten <strong>concreter<\/strong> te maken.<\/p>\n<p>Veerle Van Hecke weet waarom: \"Je hoeft niet enkel te zeggen dat je hostingpartner 'veilig' is. Je kan aantonen dat die partner voldoet aan <strong>door de overheid gedefinieerde normen<\/strong> en regelmatig getoetst wordt.\"<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1400\" height=\"1000\" src=\"https:\/\/www.combell.com\/nl\/blog\/files\/server-shield@2x-2.png\" alt=\"\" class=\"wp-image-29605\" srcset=\"https:\/\/www.combell.com\/nl\/blog\/files\/server-shield@2x-2.png 1400w, https:\/\/www.combell.com\/nl\/blog\/files\/server-shield@2x-2-300x214.png 300w, https:\/\/www.combell.com\/nl\/blog\/files\/server-shield@2x-2-768x549.png 768w\" sizes=\"(max-width: 1400px) 100vw, 1400px\" \/><\/figure>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Voordelen van de Combell cloud<\/h2>\n<h3 class=\"wp-block-heading\">Lokale, ISO-gecertificeerde datacenters<\/h3>\n<p>Combell host jouw data in moderne, <a href=\"https:\/\/www.combell.com\/nl\/datacenters\" rel=\"noreferrer noopener\" target=\"_blank\">streng beveiligde datacenters in de Benelux<\/a>. Die infrastructuur is gekoppeld aan internationale normen zoals <strong>ISO 27001<\/strong> (informatiebeveiliging) en <strong>ISO 27701<\/strong> (privacy-informatiebeheer).<\/p>\n<p>In combinatie met het NIS2 Essential label krijg je zo een <strong>meervoudige zekerheid<\/strong>: internationale standaarden \u00e9n een Belgisch kader dat rechtstreeks aansluit bij NIS2.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-dfed8a24 uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">Lees ook<\/p>\n<div class=\"uagb-notice-text\">\n<p><a href=\"https:\/\/www.combell.com\/nl\/blog\/nis2-cloudomgeving\/\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2: is jouw cloudomgeving er klaar voor?<\/a><\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Multi-layer security en back-ups<\/h3>\n<p>Onze cloudoplossingen zijn opgebouwd volgens het principe van <strong><em>defence in depth<\/em><\/strong>. Denk aan:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-840c4e88 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-d9568c58 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"geavanceerde firewalls en DDoS-bescherming\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">geavanceerde <strong>firewalls<\/strong> en DDoS-bescherming<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-515872b2 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"gescheiden omgevingen (development, test, productie) waar nodig\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">gescheiden omgevingen (development, test, productie) waar nodig<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-44d6866e uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"back-ups en redundantie volgens afgesproken RPO\/RTO-doelstellingen\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>back-ups en redundantie<\/strong> volgens afgesproken RPO\/RTO-doelstellingen<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-eca045c3 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"monitoring van kritieke componenten en proactieve alerts\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">monitoring van kritieke componenten en proactieve alerts<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>Zo verklein je de kans dat \u00e9\u00e9n enkele zwakke schakel een grote impact heeft op je business.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">24\/7 monitoring en support<\/h3>\n<p>Je cloudomgeving draait niet enkel tijdens kantooruren. Daarom kijken onze teams <strong>24\/7 mee<\/strong>, met monitoring en support door experten die je omgeving kennen.<\/p>\n<p><strong>Loopt er iets mis, dan kun je rekenen op:<\/strong><\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-c8297ad4 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-fd7b499b uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"snelle responstijden volgens SLA\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">snelle responstijden volgens SLA<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-a2ab640f uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"rechtstreekse hulp van specialisten, geen anonieme callcenters\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">rechtstreekse hulp van specialisten, geen anonieme callcenters<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-7c71bf5a uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"duidelijke communicatie over wat er gebeurd is en welke stappen worden gezet\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">duidelijke communicatie over wat er gebeurd is en welke stappen worden gezet<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1400\" height=\"1000\" src=\"https:\/\/www.combell.com\/nl\/blog\/files\/sla-guarantee@2x-2.png\" alt=\"\" class=\"wp-image-29602\" srcset=\"https:\/\/www.combell.com\/nl\/blog\/files\/sla-guarantee@2x-2.png 1400w, https:\/\/www.combell.com\/nl\/blog\/files\/sla-guarantee@2x-2-300x214.png 300w, https:\/\/www.combell.com\/nl\/blog\/files\/sla-guarantee@2x-2-768x549.png 768w\" sizes=\"(max-width: 1400px) 100vw, 1400px\" \/><\/figure>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Een gelabelde cloudpartner als troef<\/h2>\n<p>Wanneer je in die context een cloudpartner kunt voorleggen met een <strong>NIS2 Essential label<\/strong>, heb je een duidelijke troef in handen. Het toont dat je bewust kiest voor een partner die:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-f7e8a67c uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-b06d4541 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"de NIS2-vereisten kent en toepast\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">de NIS2-vereisten kent en toepast<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-d79c8a69 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"zijn security laat toetsen door externe partijen\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">zijn security laat toetsen door externe partijen<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-1812159d uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"werkt binnen een Belgisch kader dat nauw aansluit bij de wetgeving\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">werkt binnen een Belgisch kader dat nauw aansluit bij de wetgeving<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">In gesprek over jouw cloud hosting<\/h2>\n<h3 class=\"wp-block-heading\">Topics voor een eerste overleg<\/h3>\n<p>Elke organisatie is anders. De ene heeft een complexe hybride architectuur, de andere draait vooral SaaS, een derde bouwt zelf toepassingen in de cloud. Toch zijn er een aantal terugkerende vragen die we samen kunnen bekijken:<\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-c7e4623a uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-dfe0fe91 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Hoe NIS2-relevant is in jouw organisatie en\/of je klantenportefeuille?\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Hoe NIS2-relevant is in jouw organisatie en\/of je klantenportefeuille?<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-08f7b885 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Welke systemen en data zijn echt kritiek voor je business?\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Welke systemen en data zijn echt <strong>kritiek<\/strong> voor je business?<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-dfb992e9 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Hoe ziet je huidige hosting- of cloudomgeving eruit, en waar zitten de grootste risico\u2019s?\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Hoe ziet je huidige hosting- of cloudomgeving eruit, en waar zitten de grootste risico\u2019s?<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-082f337f uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Welke maatregelen zijn vandaag al aanwezig, en welke hiaten zien we nog?\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Welke maatregelen zijn vandaag al aanwezig, en welke hiaten zien we nog?<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>Vanuit die inzichten kunnen we mee nadenken over een NIS2-ready cloudarchitectuur met de juiste combinatie van <strong>cloud servers, <a href=\"https:\/\/www.combell.com\/nl\/managed-cloud\" target=\"_blank\" rel=\"noreferrer noopener\">managed cloud<\/a>, securityoplossingen en back-up<\/strong>.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Hoe Combell je kan helpen<\/h3>\n<p>Met het NIS2 Essential label tonen we dat onze basis <strong>robuust en getoetst<\/strong> is. Maar we gaan graag een stap verder: samen met jou zoeken we naar de <strong>best passende oplossing<\/strong> voor jouw organisatie, rekening houdend met sector, risico\u2019s, budget en groeiplannen.<\/p>\n<p>Wil je weten hoe jouw huidige omgeving scoort tegenover de NIS2-verwachtingen en het CyberFundamentals Framework? Of sta je aan het begin van een cloudmigratie en wil je die meteen futureproof aanpakken?<\/p>\n<p><strong>Neem contact op met onze cloudexperten en ga in gesprek over een NIS2-ready cloudomgeving op maat van jouw organisatie.<\/strong><\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-buttons is-vertical is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link has-white-color has-yellow-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/www.combell.com\/nl\/cloud-server\">Kies voor de ultraveilige Combell cloud<\/a><\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Combell heeft van het Centrum voor Cybersecurity Belgi\u00eb (CCB) het NIS2 Essential Approved label ontvangen. In deze blog lees je kort waarom dat z\u00e9\u00e9r goed nieuws is voor jouw cloudomgeving...<\/p>\n","protected":false},"author":37,"featured_media":29608,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[100],"tags":[],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.combell.com\/nl\/blog\/files\/nis2-essential-label-header-small.jpg",1200,420,false],"thumbnail":["https:\/\/www.combell.com\/nl\/blog\/files\/nis2-essential-label-header-small-50x50.jpg",50,50,true],"medium":["https:\/\/www.combell.com\/nl\/blog\/files\/nis2-essential-label-header-small-300x105.jpg",300,105,true],"medium_large":["https:\/\/www.combell.com\/nl\/blog\/files\/nis2-essential-label-header-small-768x269.jpg",768,269,true],"large":["https:\/\/www.combell.com\/nl\/blog\/files\/nis2-essential-label-header-small.jpg",1200,420,false],"1536x1536":["https:\/\/www.combell.com\/nl\/blog\/files\/nis2-essential-label-header-small.jpg",1200,420,false],"2048x2048":["https:\/\/www.combell.com\/nl\/blog\/files\/nis2-essential-label-header-small.jpg",1200,420,false],"post-featured":["https:\/\/www.combell.com\/nl\/blog\/files\/nis2-essential-label-header-small-850x290.jpg",850,290,true],"post-featured-opt":["https:\/\/www.combell.com\/nl\/blog\/files\/nis2-essential-label-header-small-750x256.jpg",750,256,true],"post-featured-opt-md":["https:\/\/www.combell.com\/nl\/blog\/files\/nis2-essential-label-header-small-850x290.jpg",850,290,true],"post-featured-opt-sm":["https:\/\/www.combell.com\/nl\/blog\/files\/nis2-essential-label-header-small-485x165.jpg",485,165,true],"post-featured-opt-xs":["https:\/\/www.combell.com\/nl\/blog\/files\/nis2-essential-label-header-small-375x128.jpg",375,128,true],"post-most-popular":["https:\/\/www.combell.com\/nl\/blog\/files\/nis2-essential-label-header-small-50x50.jpg",50,50,true],"post-author":["https:\/\/www.combell.com\/nl\/blog\/files\/nis2-essential-label-header-small-60x60.jpg",60,60,true]},"uagb_author_info":{"display_name":"Jasper Van Biesen","author_link":"https:\/\/www.combell.com\/nl\/blog\/author\/jaspervanbiesen\/"},"uagb_comment_info":0,"uagb_excerpt":"Combell heeft van het Centrum voor Cybersecurity Belgi\u00eb (CCB) het NIS2 Essential Approved label ontvangen. In deze blog lees je kort waarom dat z\u00e9\u00e9r goed nieuws is voor jouw cloudomgeving...","_links":{"self":[{"href":"https:\/\/www.combell.com\/nl\/blog\/wp-json\/wp\/v2\/posts\/29524"}],"collection":[{"href":"https:\/\/www.combell.com\/nl\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.combell.com\/nl\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.combell.com\/nl\/blog\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/www.combell.com\/nl\/blog\/wp-json\/wp\/v2\/comments?post=29524"}],"version-history":[{"count":12,"href":"https:\/\/www.combell.com\/nl\/blog\/wp-json\/wp\/v2\/posts\/29524\/revisions"}],"predecessor-version":[{"id":29634,"href":"https:\/\/www.combell.com\/nl\/blog\/wp-json\/wp\/v2\/posts\/29524\/revisions\/29634"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.combell.com\/nl\/blog\/wp-json\/wp\/v2\/media\/29608"}],"wp:attachment":[{"href":"https:\/\/www.combell.com\/nl\/blog\/wp-json\/wp\/v2\/media?parent=29524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.combell.com\/nl\/blog\/wp-json\/wp\/v2\/categories?post=29524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.combell.com\/nl\/blog\/wp-json\/wp\/v2\/tags?post=29524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}