Cybersecurity of electronic security systems

Are your installations really protected and compliant with the new regulations? 

Our cybersecurity support is based on our core expertise: electronic security systems. We complement our integration, installation and maintenance services in video surveillance, intrusion detection and access control.

Integrated cybersecurity expertise at every stage

We have internalized cybersecurity skills within our design office, and forged partnerships with cybersecurity experts and suppliers.

We know the realities on the ground: 

  • we design safety systems (Belledonne, Uxel)
  • we integrate and install systems 
  • our security guards are on the ground and understand the security challenges of their sites 
  • our security agents use these systems at PC Sécurité

This presence across the entire security chain enables us to better anticipate all cyber risks, whether technological or human.

All our technicians are trained in network best practices, for safer, more efficient operations.

All our sales and pre-sales engineers have been trained in cybersecurity, to ensure that this risk is taken into account when analyzing customer needs. 

European NIS2 regulations: a growing regulatory framework

The NIS 2 directive considerably broadens its scope, with almost 20,000 entities concerned in France, compared with around 500 under NIS 1.

In particular, it applies to companies with over 50 employees and annual sales in excess of €10 million, in many sectors deemed sensitive. 

 

  • Energy
  • Transport
  • Banking sector
  • Water
  • Search
  • Public authorities
  • Space  
  • Healthcare and medical device manufacturing 
  • Food production and distribution
  • Chemical production and distribution
  • Digital infrastructure and service management 

In particular, critical sectors must provide ANSSI with guarantees that the physical security solutions they install (access control, intrusion detection, video surveillance, etc.) do not jeopardize their cybersecurity.

In the event of non-compliance, the NIS 2 directive stipulates financial penalties of up to €10 million or 2% of annual worldwide sales. 

Our audit:
a key step towards NIS 2 compliance 

We carry out a precise diagnosis of your electronic security systems, to assess their level of maturity with regard to the requirements of the NIS 2 directive. This audit is the first essential step in identifying your vulnerabilities, defining priorities for action, and providing you with a clear, well-argued reference document on which to base your regulatory compliance plan. 



Why carry out a cybersecurity audit?


  • Take stock of the situation with regard to the requirements of European NIS 2 regulations
  • Identify technical and organizational security vulnerabilities
  • Define a concrete, prioritized action plan


How does the audit work?


Areas analyzed : 

  • Electronic security systems (video surveillance, access control, intrusion)
  • Building and infrastructure access control procedures
  • Technical and organizational documentation

Examples of elements studied :

  • Network architecture and equipment connectivity
  • Readers, badges and encryption solutions
  • Security certificates, firewalls, network segmentation
  • Privilege management, access rights to sensitive premises
  • Organization of identity management (arrivals/departures, badges, etc.)


What deliverables?


Main deliverable:

  • Documented audit report with structured action plan

Examples of recommendations:

  • Implementation of a specific cybersecurity measure (MCS)
  • Physical security compliance
  • Hardening of certain sensitive equipment
  • Critical data encryption
  • Implementing a backup strategy
  • Tighter control of access and rights
  • Definition of disaster recovery and backup procedures

Do you have a question or a project?
Our experts are at your service.

In order to help you with your project, please complete the information below:

Please note that we will not process requests from private individuals.

    In order to help you with your project, please complete the information below:
    Please note that we will not process requests from private individuals.

    Please enter your name.
    Please enter your first name.
    Please enter a valid email address.
    Please enter your company name.
    Please enter a valid postal code.
    Please enter a valid telephone number.
    Please select the subject of your request.
    Please select a service.

    Would you like to join us?

    Apply for our job offers:

    I'm a candidate onetrecute.com

    Please note that we will not process any applications sent via this site.

    Please enter your message.
    Please accept this condition to send your message.

    * This data is collected for the implementation of processing for the purposes of subscribing to newsletters, communicating on events related to the Onet Group's business, prospecting and animation. It is intended for authorized Onet Group personnel. This data will be kept for 3 years from your last incoming contact if you are not otherwise listed as a customer contact; in the event of subscription to a newsletter or invitations to events as long as you do not unsubscribe; if you are a contact for a customer of an Onet Group company, for the duration of the relationship plus 3 years for commercial prospecting purposes.

    Contact us
    How to find us
    Quotation simulators