For the best web experience, please use IE11+, Chrome, Firefox, or Safari

NIST Framework Resource Center

Cybersecurity Risk Management: Identify, detect, protect, and recover.

The National Institute of Standards and Technology’s (NIST) Framework for Improving Critical Infrastructure Cybersecurity provides processes and mechanisms for any organization to enhance cybersecurity risk management. The Framework itself is the result of a federal Executive Order, and even though it’s voluntary, many federal agencies are adopting, or plan to adopt, the structure, activities, and procedures it details. But the Framework is applicable to more than just federal agencies; state and local governments, education institutions, and businesses worldwide can use it to assess and improve their cybersecurity infrastructure and processes.

Our hardware and services help your organization identify, protect, detect, respond, and recover, better managing cybersecurity risk.

Identify

Identify

Understand your cybersecurity risks

Achieve comprehensive, effective systems management by understanding what hardware and software are installed across your organization. Manage cybersecurity risk to systems, assets, data, and capabilities with an easy-to-deploy appliance. KACE systems management appliance enables you to take control of your IT environment. Save time and resources with this powerful, affordable, easy-to-use tool.

Detect

Detect

Discover cybersecurity events

Block evolving threats and implement the appropriate activities to identify the occurrence of a cybersecurity event. Enable timely discovery of events using SonicWALL next-generation firewalls, the most powerful firewall security available. Protect your organization against viruses, spam, spyware, intrusions, and other threats. Bolster your security while lowering your TCO, with massively scalable protection.

Protect

Protect

Develop safeguards to ensure service delivery

Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. Limit or contain the impact of a potential cybersecurity event by using the industry-leading One Identity Manager and other solutions to manage identity and access for regular and privileged users, as well as for data. Maximize access control and achieve governance with a unified approach to IAM.

Recover

Recover

Restore capabilities and services

Ensure near-continuous image-level backups and lightning-fast recovery of capabilities or services that were impaired due to a cybersecurity event. Reduce the impact from a cybersecurity event with backup, recovery, and application-specific data protection solutions from us. Boost productivity, save time and money.