Vendor support

Across our vendor portfolio, you’ll find a range of cybersecurity solutions and services to support your customers’ NIS2 compliancy. Discover which vendor solutions can help your customers meet the various requirements.

Jump to:

An increasing number of public and private sector organisations are depending on cyber threat intelligence, making Anomali – specialists in cyber threat intelligence solutions – a highly relevant choice for your customers. With Anomali, you can support your customers in reducing risk and complying with NIS2.

Find out more
Capability
Solution
Policies on risk analysis and information security
Anomali Match
Crisis management and business continuity
Anomali Match
Security in network and information systems
Anomali Intelligence Channels

Claroty supports and simplifies NIS2 compliance by extending robust protection, monitoring, and other cyber risk management controls to all cyber-physical systems (CPS). Their portfolio is especially ideal for end-customers within the industrial, healthcare, commercial, and public sector spaces that fall under the new Directive.

WATCH: The Path to NIS2 Compliance

Join Westcon and Claroty's Arik Diamant in this webinar as he shares his expert view on the NIS2 Directive and how to meet reporting requirements.

Find out more
Capability
Solution
Policies on risk analysis and information security
Claroty xDome, Medigate, Claroty CTD
Crisis management and business continuity
Claroty xDome, Medigate, Claroty CTD
Supply chain security
Claroty xDome, Medigate, Claroty SRA, Claroty CTD
Security in network and information systems
Claroty xDome, Medigate, Claroty SRA, Claroty CTD

Policies and procedures to assess the effectiveness of cybersecurity risk management

Claroty xDome, Medigate, Claroty CTD
Basic cyber hygiene practices and cybersecurity training
Claroty xDome, Medigate, Claroty SRA, Claroty CTD
Policies and procedures for cryptography and encryption
Claroty xDome, Medigate, Claroty SRA, Claroty CTD
Human resources security, access controls, and asset management
Claroty xDome, Medigate, Claroty SRA, and Claroty CTD

Multifactor authentication and secured communications

Claroty xDome, Medigate, Claroty SRA, Claroty CTD

Check Point’s comprehensive cybersecurity services makes it a great contender for meeting NIS2 regulatory obligations. A global leader in cybersecurity for government and businesses, its multi-level security architecture helps your customers defend cloud, network, and mobile-held information through a one-point-of-control security management system.

Find out more
Capability
Solution
Policies on risk analysis and information security
Cyber Security Consulting Services
Incident handling
CloudGuard Posture Management, Horizon MDR, Horizon XDR
Crisis management and business continuity
Check Point Next Generation Security Gateways
Supply chain security
CloudGuard Spectral

Security in network and information systems

Cloud Workload Protection Platform, CloudGuard Spectral

Policies and procedures to assess the effectiveness of cybersecurity risk management

Quantum, CloudGuard, Harmony
Human resources security, access controls, and asset management
Quantum SASE
Multifactor authentication and secured communications
Remote Access VPN, Harmony Mobile, Harmony Connect, Harmony Endpoint

Endpoint security software vendor CrowdStrike is best known for its Falcon platform. Lightweight and modular, this single cloud-delivered solution unifies next-generation antivirus, endpoint detection and response, device control, vulnerability assessment, and IT hygiene, ticking multiple boxes for NIS2.

Find out more
Capability
Solution
Policies on risk analysis and information security
Falcon Intelligence, Falcon Insight XDR, Falcon Exposure Management
Incident handling
Falcon Insight XDR
Supply chain security
Falcon Intelligence
Security in network and information systems
Falcon Platform

Policies and procedures to assess the effectiveness of cybersecurity risk management

Falcon Intelligence, Falcon Exposure Management

Basic cyber hygiene practices and cybersecurity training

Falcon Exposure Management
Multifactor authentication and secured communications
Falcon Identity Protection

Synonymous with DNS, DHCP, and IPAMN, EfficientIP helps customers manage their network services as a distinct entity to ensure high availability, security, and network consistency. With Efficient IP, you can support your customers in enhancing their security posture for NIS2.

Find out more
Capability
Solution
Crisis management and business continuity
DNS Threat Pulse, DNS Guardian
Security in network and information systems
Network Object Manager
Policies and procedures to assess the effectiveness of cybersecurity risk management
DNS Threat Pulse
Human resources security, access controls, and asset management
SOLIDServer DDI

F5 is committed to helping end-customers meet NIS2 obligations without affecting customer and partner experiences. With F5, your customers can better defend their many cloud, computing, and network environments, as well as manage their full application portfolio through a centralised console.

Find out more
Capability
Solution
Crisis management and business continuity
BIG-IP DNS, BIG-IP Local Traffic Manager
Human resources security, access controls, and asset management
BIG-IP Access Policy Manager, F5 Access Manager
Security in network and information systems
Big-IP Advanced Firewall Manager, F5 XC
Policies and procedures to assess the effectiveness of cybersecurity risk management
F5 XC, Bigip Advanced Firewal Manager, Bigip Advanced WAF
Human resources security, access controls, and asset management
BIG-IP Access Policy Manager, BIG-IP Advanced Firewall Manager, F5 XC
Multifactor authentication and secured communications
BIG-IP Access Policy Manager

Infoblox is a leader in the DNS, DHCP, and IPAM (DDI) spaces and is well-equipped to raise the security standards of your customers. Champions of the UK’s Cyber Assessment Framework (published in light of NIS1), Infoblox is an ideal choice for those looking to assess their abilities to manage cyber security risks.

Find out more
Capability
Solution
Incident handling
Cybersecurity Ecosystem
Security in network and information systems
Cybersecurity Ecosystem, BloxOne
Policies and procedures for cryptography and encryption
Encrypted DNS
Human resources security, access controls, and asset management
Infoblox IPAM

Champions of ‘Everywhere Work’, Ivanti is helping businesses be remote with confidence. Their comprehensive portfolio combines endpoint and risk management with service and asset management – and with their intelligent automation, devices can “self-heal and self-secure”, while employees can self-service.

Find out more
Capability
Solution
Crisis management and business continuity
Ivanti Cloud
Security in network and information systems
Ivanti Network Access Control
Human resources security, access controls, and asset management
Ivanti Neurons for ITAM

Menlo Security is best known for preventing attacks ever reaching users’ devices – but they’re also well-equipped to support your NIS2 compliance requirements. Secure your supply chain with Menlo’s zero-hour attack protection, and improve your incident handling posture with real-time zero hour phishing.

Find out more
Capability
Solution
Policies on risk analysis and information security
HEAT Shield
Incident handling
HEAT Shield
Supply chain security
HEAT Shield
Security in network and information systems
Secure Web Gateway
Policies and procedures to assess the effectiveness of cybersecurity risk management
Isolation Platform
Human resources security, access controls, and asset management
Secure Application Access

Identity and access management leader Okta is simplifying NIS2 compliance. Support your customers with Okta by helping them apply stronger risk management, improve incident handling, ensure business continuity, strengthen their supply chain security, and more.

Find out more
Capability
Solution
Incident handling
Okta Workforce Identity Cloud, Okta Customer Identity Cloud
Crisis management and business continuity
Okta Workforce Identity Cloud, Okta Customer Identity Cloud
Supply chain security
Okta Workforce Identity Cloud, Okta Customer Identity Cloud
Policies and procedures to assess the effectiveness of cybersecurity risk management
Adaptive Multi-Factor Authentication
Multifactor authentication and secured communications

Adaptive Multi-Factor AuthenticationPolicies on risk analysis and information security

Adaptive Multi-Factor Authentication

Identity and access management leader Globally renowned for its high-quality safeguarding solutions, your customers are in good hands with Palo Alto Networks. The next-gen solutions provider has stated its commitment to making the EU more cyber-resilient, as well as its readiness to work with organisations across and between EU member states as they start to implement NIS2.

Find out more
Capability
Solution
Policies on risk analysis and information security
Next Generation Firewall & Cloud Delivered Security Subscriptions
Incident handling
Cortex XSOAR, Cortex XSIAM
Crisis management and business continuity
Next-Generation Firewalls, Cortex XDR, UNIT42 Services
Supply chain security
Prisma Cloud

Security in network and information systems

Next Generation Firewalls
Human resources security, access controls, and asset management
Prisma SASE, Next-Generation Firewall
Policies and procedures to assess the effectiveness of cybersecurity risk management
AI-OPS

Proofpoint is a next generation cybersecurity platform that protects people, data, and brands from advanced cyberthreats that target email, web, cloud and social media. From advanced threat protection, security awareness training, cloud security, compliance digital risk protection, and more, Proofpoint is helping people be safer online.

Find out more
Capability
Solution
Incident handling
Proofpoint Aegis Platform
Supply chain security
Proofpoint Threat Intelligence Services, Proofpoint Email Security and Email Fraud Defense, Proofpoint Secure Email Relay
Basic cyber hygiene practices and cybersecurity training
Proofpoint Security Awareness Training, Proofpoint Email Fraud Defense
Policies and procedures for cryptography and encryption
Proofpoint Email Encryption

Human resources security, access controls, and asset management

Proofpoint Identity Threat Defense, Proofpoint Sigma platform (information protection)

Multifactor authentication and secured communications

Proofpoint Email Encryption and secure share

Vectra continues to be driven by its ambition to make the world safer and fairer by “erasing the unknown. They’re helping end-customers be NIS2-compliant through Attach Signal Intelligence, Security Operations Transformation, and an easy-to-use, highly automated security platform.

Find out more
Capability
Solution
Policies on risk analysis and information security
Vectra AI Threat Detection and Response
Incident handling
Vectra AI Attack Signal Intelligence and Security Operations Transformation
Crisis management and business continuity
Vectra Disaster Recovery
Supply chain security
Vectra AI Attack Signal Intelligence

Security in network and information systems

Cognito NDR networks

Zscaler Zscaler is universally recognised as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world's most established companies.

Find out more
Capability
Solution
Policies on risk analysis and information security
Zscaler Internet Access
Incident handling
Zscaler Internet Access – Data Protection (Workflow Automation), Zscaler Cloud Posture Control
Crisis management and business continuity
Zscaler Internet Access, Zscaler Private Access
Security in network and information systems
Zscaler Internet Access, Zscaler Private Access, Zscaler Deception

Policies and procedures to assess the effectiveness of cybersecurity risk management

Zscaler Identity Threat Detection & Response

Policies and procedures for cryptography and encryption: Zscaler Internet Access

Human resources security, access controls, and asset management
Zscaler Internet Access, Zscaler Private Access, Zscaler Cloud Security Posture Management

Work with us and our vendors to prepare your customers for NIS2.

Next section:

Find out how we can support you

Next page >

© 2024 Westcon-Comstor

westconcomstor.com | Legal | Privacy and cookies