Compliance

Your IT Environment, Audit-Ready

Compliance frameworks require you to know your IT environment — what's there, what's happening, and what's deviating. Insight gives you that visibility.

The Cybersecurity Act Is Here

Sweden's Cybersecurity Act (2025:1506), implementing the EU NIS2 directive, has been in effect since January 15, 2026. Organizations in 18 sectors must demonstrate continuous monitoring, logging, and incident response capabilities.

  • Energy, transport, banking, healthcare, digital infrastructure, public sector, and more
  • Sweden chose the "whole-entity approach" — your entire organization is in scope
  • Penalties up to €10M or 2% of global annual revenue

What Frameworks Require — and How Insight Delivers

Centralized Logging

Frameworks require logs to be collected, stored, and protected from all systems

Automatically collects logs from Windows Event Log, Linux journald, syslog, and network devices into a single location

Asset & Software Inventory

Organizations must maintain a current inventory of all hardware and software

Auto-discovers servers, clients, network devices, and installed software. Continuously updated.

Continuous Monitoring

The IT environment must be monitored around the clock to detect anomalies

Monitors the entire IT stack 24/7 with 1-second resolution — servers, network, containers, applications

Anomaly & Threat Detection

Deviations and security events must be detected and evaluated

AI-driven analysis and 70+ MITRE ATT&CK mapped detection rules identify threats and anomalies, correlating events across your entire environment

Incident Support & Evidence

Incidents must be reported within 24–72 hours with a timeline and supporting evidence

Provides logs, metrics, and alerts in a unified timeline — ready-made evidence for incident reports

Network Monitoring

Network infrastructure must be monitored and secured

SNMP polling, topology mapping, bandwidth analysis — full visibility from switch to router

Security Event Detection

NIS2 Art. 21 requires risk management measures including security event detection and incident handling

70+ MITRE ATT&CK mapped rules detect brute force, AV disabled, log clearing, privilege escalation, and more. Attack chain correlation groups related events into incidents.

Frameworks We Help You Address

NIS2 / Cybersecurity Act

In effect since January 15, 2026 for Swedish organizations in 18 sectors. "Whole-entity approach" — the entire organization is in scope.

Risk management (Art. 21), security monitoring, incident detection, asset inventory

ISO 27001:2022

International standard, often required in contracts and procurement processes.

A.8.15 (logging), A.8.16 (monitoring), A.5.9 (asset inventory), A.8.20 (network security)

GDPR

Applies to all EU/EEA operations handling personal data.

Art. 32 (technical safeguards), Art. 33 (early detection for faster breach notification), Art. 30 (asset inventory supports ROPA)

DORA

EU regulation for the financial sector, in effect since January 2025.

Art. 8 (ICT asset identification), Art. 9–10 (continuous monitoring, detection), Art. 17 (incident reporting)

PCI DSS 4.0

Required for organizations handling card payment data.

Req 10 (logging all access), Req 11 (network monitoring), log retention (1 year)

SOC 2

Trust Services standard, increasingly common internationally.

CC7.1 (system monitoring), CC7.2 (anomaly detection), CC7.3–7.4 (incident response)

Your Data Never Leaves Your Network

Insight runs 100% on-premise — your monitoring data stays in your data center. Relevant for GDPR, NIS2, and organizations with classified networks. Air-gap support for fully isolated environments.

Performance and Security Visibility in Minutes

Download the appliance, import it into VMware, and see your first performance metrics and security alerts in minutes. No cloud account required.