Selected services
NIS 2
NIS 2 is an EU directive that sets requirements for cyber security for critical and important sectors such as supply, food manufacturing etc.
Unitas has made it easy for you to get started using a structured process and a sharp fixed price for the initial activities.
vCISO
vCISO is our external service where we offer strategic cyber security management and operational consulting to organizations without an internal CISO.
We also offer full-blown CISO-as-a-Service with dedicated CISO in-house in your organization.
GDPR Service Agreement
As an offer under Compliance-as-a-Service, we offer GDPR service and DPO service that help you comply with the GDPR rules.
We advise, implement and take care of the operation of the GDPR year wheel and ensure that you continuously comply with the GDPR.
CIS-18
CIS-18 is a set of cybersecurity best practices that help protect against threats.
Let us take the temperature of your implemented security and create a roadmap for future priority efforts.
We have also linked CIS-18 to both NIS 2, DORA and ISO27001/2.
Vulnerability scanning
We find the holes in your infrastructure by continuously testing for holes and possible exploitation.
We advise you on how to take the right measures, and are happy to take the dialogue directly with your IT department or external suppliers.
Blog
Follow UNITAS on the blog
NIS2
NIS2 is an EU law that tightens cyber security requirements for critical sectors such as energy and finance to protect against cyber threats.
Get started with NIS2 as easy as 1..2..3
vCISO
CISO-as-a-Service (vCISO) is an external service where we offer strategic cybersecurity management to organizations without an internal CISO.
GDPR Service Agreement
Compliance-as-a-Service is an external Solution that helps companies comply with GDPR regulations.
We offer advice, data handling and the implementation of necessary security measures to ensure the protection of personal data.
CIS-18
CIS-18 is a set of cybersecurity best practices that help protect against threats.
We implement these controls to strengthen our level of security, improve risk management and ensure that we are better equipped to deal with cyber attacks.
Vulnerability scanning
Vulnerability scanning is a process we use to identify security vulnerabilities in our systems. Regular scans help us detect threats and implement necessary security measures.
Blog
Follow Unitas on the blog