{"id":18078,"date":"2025-06-26T17:43:15","date_gmt":"2025-06-26T15:43:15","guid":{"rendered":"https:\/\/www.thegreenbow.com\/?post_type=resource&#038;p=18078"},"modified":"2025-07-01T18:05:31","modified_gmt":"2025-07-01T16:05:31","slug":"three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance","status":"publish","type":"resource","link":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\/","title":{"rendered":"Three good reasons to use a VPN to achieve NIS2 compliance"},"content":{"rendered":"\n<div class=\"wp-block-ch-resource-content alignfull\">\n<p><strong>Auteur : Arnaud DUFOURNET<\/strong>, Marketing &amp; Customer Experience Director<\/p>\n\n\n\n<p>The annual activity reports published by the French National Cybersecurity Agency <a href=\"https:\/\/cyber.gouv.fr\/en\/actualites\/anssi-publishes-its-2024-annual-review\" target=\"_blank\" rel=\"noreferrer noopener\">ANSSI<\/a>, and the French government\u2019s cyberattack assistance service <a href=\"https:\/\/www.cybermalveillance.gouv.fr\/tous-nos-contenus\/actualites\/rapport-activite-2024#tendances-cles-menace-2024\" target=\"_blank\" rel=\"noreferrer noopener\">Cybermalveillance<\/a> [report in French only], both show a worrying rise in cyberattacks in 2024 (49.9% more requests for assistance logged by Cybermalveillance, and 15% more security events recorded by ANSSI). It is vital that European companies strengthen their resilience in response to the growing danger posed by these threats. This is, of course, the entire point of the <a href=\"https:\/\/www.thegreenbow.com\/fr\/ressource\/blog\/nis-2-des-grands-defis-a-relever-pour-plus-de-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2 directive<\/a> currently being transposed into national laws by the EU member states. In France, the bill on \u201ccritical infrastructure resilience and strengthening cybersecurity\u201d presented to the Council of Ministers on October 15, 2024 and adopted by the Senate (upper house) on March 12, 2025 is not expected to go before the National Assembly before September. This bill, as readers might recall, transposes three European Union directives (REC, NIS2, and DORA) to harmonize and simplify the compliance of those entities affected by them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>A new set of technical and organizational requirements<\/strong><\/h2>\n\n\n\n<p>One of the major challenges in implementing this legislation is the extension to the scope of those organizations needing to deal with cyber resilience. Some 15,000 organizations in France will have to comply with the provisions, and the vast majority of them will be discovering previously unknown levels of cybersecurity requirements.<\/p>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 39%\"><div class=\"wp-block-media-text__content\">\n<p>To guide them, ANSSI has been working since late 2023 on a reference framework based on 20 security objectives through which NIS2 compliance can be achieved. These objectives cover four key issues, namely <strong>Protection<\/strong>, <strong>Defense<\/strong>, <strong>Governance<\/strong>, and <strong>Resilience<\/strong>.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"579\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/Objectif-NIS2_Lite-1024x579.jpg\" alt=\"\" class=\"wp-image-17921 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/Objectif-NIS2_Lite-1024x579.jpg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/Objectif-NIS2_Lite-300x170.jpg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/Objectif-NIS2_Lite-768x434.jpg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/Objectif-NIS2_Lite-1536x868.jpg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/Objectif-NIS2_Lite-2048x1158.jpg 2048w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/Objectif-NIS2_Lite-100x57.jpg 100w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Following consultation with federations, industry bodies, associations of elected representatives, and local authority representatives, a second version, still containing 20 objectives, is currently being finalized. These objectives are accompanied by tangible measures to be put in place, plus acceptable means of compliance for NIS2 \u201cessential entities\u201d and \u201cimportant entities\u201d. Of these measures, the use of VPNs is emerging as a must-have in terms of meeting three of the objectives set by ANSSI.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Keeping remote access secure<\/strong><\/h2>\n\n\n\n<p>Whether they are categorized as important or essential, organizations subject to NIS2 must without fail control access to their information systems. The major new aspect to this European directive is that this control concerns remote access granted both to off-site employees such as those working from home, and to IT service providers and suppliers who also have such access.<\/p>\n\n\n\n<p>Using a VPN meets the objective of keeping remote access secure in two respects:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enhanced authentication<\/strong>. For essential entities, remote access must be protected by multi-factor authentication. For example, ensuring that a VPN tunnel can only be established after a) presentation of a valid certificate linked to a smart card, and b) confirmation via a PIN code.<\/li>\n\n\n\n<li><strong>Connection encryption<\/strong>. Using a VPN ensures that data interchange remains confidential, thanks to encryption mechanisms that comply with the requirements of the security reference framework.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Keeping IS architecture secure<\/strong><\/h2>\n\n\n\n<p>The NIS2 directive requires access control and resource partitioning, including when third parties (e.g. service providers) are authorized to access information systems. It is crucial to restrict such access to only clearly-identified resources. Authentication and access audit trails are further measures to be taken.<\/p>\n\n\n\n<p>What advantages does an IPsec VPN, such as that offered by TheGreenBow, bring?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Access microsegmentation.<\/strong> VPNs can be used to set up specific tunnels that give access only to certain resources matching a user&#8217;s profile. For example, essential entities use IPsec VPNs to secure access to their restricted information systems, ensuring that only authorized personnel can reach sensitive resources.<\/li>\n\n\n\n<li><strong>Traceability and control.<\/strong> Every VPN connection is traced and can be supervised through a dedicated console, guaranteeing enhanced authentication (especially if multi-factor authentication is implemented) and highly granular access management.<\/li>\n\n\n\n<li><strong>Communications filtering.<\/strong> In addition to entry point firewalls and gateways, a VPN can be configured to filter the URLs or IP ranges made accessible, thereby blocking all non-essential communication.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Identifying and reacting to security incidents<\/strong><\/h2>\n\n\n\n<p>When it comes to defense, it is crucial to identify security incidents quickly, and to put a clear procedure in place for analyzing, assessing, and reacting to suspicious events.<\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:37% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/Cybersecurity-audit_Lite-1024x574.jpg\" alt=\"\" class=\"wp-image-17929 size-full\" srcset=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/Cybersecurity-audit_Lite-1024x574.jpg 1024w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/Cybersecurity-audit_Lite-300x168.jpg 300w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/Cybersecurity-audit_Lite-768x430.jpg 768w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/Cybersecurity-audit_Lite-1536x861.jpg 1536w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/Cybersecurity-audit_Lite-2048x1148.jpg 2048w, https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/Cybersecurity-audit_Lite-100x56.jpg 100w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>The framework recommends using reports from a variety of sources (employees, service providers, customers, and users) and analyzing event causes to avoid any recurrence.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>How can a VPN help to achieve that objective?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Secure log collection.<\/strong> Installing a VPN client on every endpoint that needs to access the IS remotely enables essential information to be collected and transmitted, in encrypted form, so that connection incidents can be investigated. Centralized logs from VPN clients are an effective complement to the information sources offered by an EDR or XDR platform.<\/li>\n\n\n\n<li><strong>Continuous supervision.<\/strong> Events collected by the VPN, once analyzed, can help to identify attempted attacks, or to minimize the impact of an incident. A supervision console (such as a<strong> <a href=\"https:\/\/www.thegreenbow.com\/en\/products\/connection-management-center\/\">Connection Management Center<\/a><\/strong>) provides a history of such events and a continuous audit trail of remote connections.<\/li>\n<\/ul>\n\n\n\n<p>As cyberattacks continue to cause havoc\u2014as evidenced by the costly attack that hit <a href=\"https:\/\/www.bbc.co.uk\/news\/articles\/c93llkg4n51o\" target=\"_blank\" rel=\"noreferrer noopener\">Marks &amp; Spencer<\/a> in April this year, estimated at \u00a3300 million\u2014transposition of the NIS2 directive is taking shape. The use of VPN tunnels, combined with <a href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/think-ztna-and-vpns-are-incompatible-think-again\/\" target=\"_blank\" rel=\"noreferrer noopener\">ZTNA<\/a> rules, seems to be a <em>sine qua non<\/em> for meeting security requirements. To help organizations find solutions to meet these new standards, Hexatrust has published a <a href=\"https:\/\/www.hexatrust.com\/actualites\/fic2024-hexatrust-devoile-sa-brochure-capacitaire-nis2\/\" target=\"_blank\" rel=\"noreferrer noopener\">detailed catalog<\/a> [in French] of NIS2-compliant French and European cybersecurity solutions. It is vital to <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\" target=\"_blank\" rel=\"noreferrer noopener\">start preparing<\/a> now to ensure resilience tomorrow.<\/p>\n<\/div>\n","protected":false},"featured_media":17925,"template":"","meta":{"_acf_changed":false,"resource_type":"internal"},"resource_category":[342],"class_list":["post-18078","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource_category-blog-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Three good reasons to use a VPN to achieve NIS2 compliance - TheGreenBow<\/title>\n<meta name=\"description\" content=\"Discover why using an IPsec VPN is more essential than ever to comply with the NIS2 directive.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three good reasons to use a VPN to achieve NIS2 compliance - TheGreenBow\" \/>\n<meta property=\"og:description\" content=\"Discover why using an IPsec VPN is more essential than ever to comply with the NIS2 directive.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"TheGreenBow\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-01T16:05:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/VPN_Lite-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@thegreenbow\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\\\/\",\"name\":\"Three good reasons to use a VPN to achieve NIS2 compliance - TheGreenBow\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/VPN_Lite-scaled.jpg\",\"datePublished\":\"2025-06-26T15:43:15+00:00\",\"dateModified\":\"2025-07-01T16:05:31+00:00\",\"description\":\"Discover why using an IPsec VPN is more essential than ever to comply with the NIS2 directive.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/VPN_Lite-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/VPN_Lite-scaled.jpg\",\"width\":2560,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/ressource\\\/blog-en\\\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/resources\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Three good reasons to use a VPN to achieve NIS2 compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\",\"name\":\"TheGreenBow\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#organization\",\"name\":\"TheGreenBow\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"contentUrl\":\"https:\\\/\\\/www.thegreenbow.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/Logotype@2x-min.png\",\"width\":422,\"height\":84,\"caption\":\"TheGreenBow\"},\"image\":{\"@id\":\"https:\\\/\\\/www.thegreenbow.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/thegreenbow\",\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/thegreenbow\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCZKtI7_fmgFcmovgGSy8AnQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three good reasons to use a VPN to achieve NIS2 compliance - TheGreenBow","description":"Discover why using an IPsec VPN is more essential than ever to comply with the NIS2 directive.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Three good reasons to use a VPN to achieve NIS2 compliance - TheGreenBow","og_description":"Discover why using an IPsec VPN is more essential than ever to comply with the NIS2 directive.","og_url":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\/","og_site_name":"TheGreenBow","article_modified_time":"2025-07-01T16:05:31+00:00","og_image":[{"width":2560,"height":1280,"url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/VPN_Lite-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@thegreenbow","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\/","url":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\/","name":"Three good reasons to use a VPN to achieve NIS2 compliance - TheGreenBow","isPartOf":{"@id":"https:\/\/www.thegreenbow.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/VPN_Lite-scaled.jpg","datePublished":"2025-06-26T15:43:15+00:00","dateModified":"2025-07-01T16:05:31+00:00","description":"Discover why using an IPsec VPN is more essential than ever to comply with the NIS2 directive.","breadcrumb":{"@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\/#primaryimage","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/VPN_Lite-scaled.jpg","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2025\/06\/VPN_Lite-scaled.jpg","width":2560,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/www.thegreenbow.com\/en\/ressource\/blog-en\/three-good-reasons-to-use-a-vpn-to-achieve-nis2-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.thegreenbow.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.thegreenbow.com\/en\/resources\/blog-en\/"},{"@type":"ListItem","position":3,"name":"Three good reasons to use a VPN to achieve NIS2 compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.thegreenbow.com\/en\/#website","url":"https:\/\/www.thegreenbow.com\/en\/","name":"TheGreenBow","description":"","publisher":{"@id":"https:\/\/www.thegreenbow.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thegreenbow.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.thegreenbow.com\/en\/#organization","name":"TheGreenBow","url":"https:\/\/www.thegreenbow.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.thegreenbow.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","contentUrl":"https:\/\/www.thegreenbow.com\/wp-content\/uploads\/2021\/04\/Logotype@2x-min.png","width":422,"height":84,"caption":"TheGreenBow"},"image":{"@id":"https:\/\/www.thegreenbow.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/thegreenbow","https:\/\/fr.linkedin.com\/company\/thegreenbow","https:\/\/www.youtube.com\/channel\/UCZKtI7_fmgFcmovgGSy8AnQ"]}]}},"_links":{"self":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource\/18078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/types\/resource"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/media\/17925"}],"wp:attachment":[{"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/media?parent=18078"}],"wp:term":[{"taxonomy":"resource_category","embeddable":true,"href":"https:\/\/www.thegreenbow.com\/en\/wp-json\/wp\/v2\/resource_category?post=18078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}