INDUSTRIES

Energy sector

Energy companies are facing considerable cyber security threats with far-reaching impacts on both infrastructure and social security. Significantly reduce your cyber-related risks with a structured, systematic, and proactive cyber security approach. We’ll help you understand and remediate the vulnerabilities you have - today and in the future.

Secure operations

Find vulnerabilities before any cybercriminal does and ensure your operations run without any disruption.

Gain insight

Gain visibility into all your assets in all corners of your IT environment.

Compliance

Meet existing laws, regulations, and compliance requirements, like GDPR and NIS (Network and Information Security).

THREAT LANDSCAPE

Foreign powers - a growing threat

The energy sector has seen a significant increase in cyber attacks, with foreign powers have accounted for millions of attacks against organizations in the past years. The cyber threats facing electric-power and gas companies include the typical threats that plague other industries: data theft, billing fraud, and ransomware but also industrial espionage, sabotage. For energy companies, the main risk to consider is sabotage of the energy network.

Customers within the energy sector

logo-customer-Mölndal energi-holm security logo-customer-Gasnätet stockholm ab-holm security logo-customer-kraftringen-holm security logo-customer-SEOM sollentuna energi & miljö-holm security logo-customer-Falbygdens ernergi-holm security logo-customer-hedemora energi-holm security logo-customer-hallingdal kraftnett-holm security logo-customer-Hågogaland kraft-holm security

IN EUROPE

Meet the NIS directive

In August 2018, new and decisive legislation came into force based on the EU-directive NIS (Network and Information Security). The law tightens the requirements for information security in terms of integrity and availability for operators in sectors that provide essential services.

The background of the NIS directive is the increased threat for all types of organizations, and non-compliance can have serious consequences. Vulnerability assessment can help you create a systematic, structured, and continuous approach and comply with regulations.

icon-system-network-scanning

System & Network Scanning

Take control over the security of your systems and networks. We support all parts of your infrastructure – public, local, cloud, IoT, containers as well as OT and SCADA.

View product
icon-web-application-scanning

Web Application Scanning

One of the most powerful web application scanners on the market finding all types of vulnerabilities, like OWASP top 10Also scanning APIs.

View product
icon-phishing-awareness-training

Phishing & Awareness Training

Increase resilience against email attacks through simulation of email attacks, like phishing, spear phishing, and ransomware attacks. Built-in automated awareness training.

View product