{"id":29757,"date":"2023-08-17T10:03:46","date_gmt":"2023-08-17T17:03:46","guid":{"rendered":"https:\/\/www.syteca.com\/?page_id=29757"},"modified":"2023-08-18T02:03:49","modified_gmt":"2023-08-18T09:03:49","slug":"dora-compliance","status":"publish","type":"page","link":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance","title":{"rendered":"DORA Compliance Software Solution"},"content":{"rendered":"\n\t\t<div  class=\"block-96819910-4b91-4d15-9f46-2fcbfb5dd9ca areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(16, 206, 158,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-8cb76b9c-e56a-4ca7-b0f2-b5d00ce9c54d areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-99059b2f-8f6c-471d-8269-90c852b289d1 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-be843ee8-d60f-4094-a922-ccbb8d52e1f2 col areoi-element d-flex flex-column align-items-center d-md-block align-self-center\">\n\t\t\t\n\t\t\t\n\n<h1 class=\"wp-block-heading has-text-align-center mb-4\">DORA Compliance Solution<\/h1>\n\n\n\n<p class=\"has-text-align-center p-poppins mb-4 main-screen-description\">Monitor insider activity. Detect anomalies. Respond to incidents. <strong>ALL-IN-ONE<\/strong><\/p>\n\n\n\n\t\t<div  class=\"block-ed99a043-9a6f-4222-8782-696a0454d07d areoi-element  d-flex flex-column flex-md-row align-items-center justify-content-center mt-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-6ed4a8c8-5fe6-4618-8194-7d08a3e62f64 btn areoi-has-url position-relative me-md-4 mb-3 hsBtn-demo btn-secondary\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tAccess the Demo Portal \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-e1ebf895-983f-4b74-b15e-427a862e0041 btn areoi-has-url position-relative  mb-3 btn-outline-secondary\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tGet in Touch \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-acb21368-218b-4661-9a08-a4d9d7c274a3 areoi-element lets-talk\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-4977c10d-4d08-4614-8738-a98d6de33a21 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-874d88a2-e894-42f2-bd86-dd8def3b0c3a row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-404530a0-de07-44e0-9687-df28f57c58d2 col areoi-element with-link align-self-center align-self-md-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"pe-xxl-5 with-link p-poppins\" style=\"font-size:1.13rem;font-style:normal;font-weight:500\">The <a href=\"https:\/\/www.digital-operational-resilience-act.com\/#:~:text=DORA%20sets%20uniform%20requirements%20for,platforms%20or%20data%20analytics%20services.\" target=\"_blank\" rel=\"noreferrer noopener\">Digital Operational Resilience Act (DORA)<\/a>, or Regulation (EU) 2022\/2554, entered into force in the European Union on January 17, 2023, and will apply to a wide range of financial entities starting from January 17, 2025.<\/p>\n\n\n\n<p class=\"p-poppins\" style=\"font-size:1.13rem;font-style:normal;font-weight:500\">DORA covers risks in the financial sector from using information and communications technology (ICT). The regulation aims to ensure financial entities have adequate protection, detection, containment, and recovery capabilities against ICT-related incidents.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b7d2bb9d-8fc0-489e-84b9-3a1773d9a5b2 col areoi-element align-self-lg-center d-none d-sm-none d-md-none d-lg-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full text-xxl-end\"><img decoding=\"async\" width=\"571\" height=\"334\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/17063816\/Img-DORA-Compliance-Solution.png\" alt=\"\" class=\"wp-image-29763\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/17063816\/Img-DORA-Compliance-Solution.png 571w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/17063816\/Img-DORA-Compliance-Solution-300x175.png 300w\" sizes=\"(max-width: 571px) 100vw, 571px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-380ad545-1751-47a1-a7d3-44d39375c367 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d99045a2-3b0c-44de-8dd2-3abc042a997f row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-c260ea45-a163-408a-901b-99f19fa850ca col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2e63a5d4-de88-488a-925a-d160f4ea5837 areoi-element\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading has-text-align-center mb-0\" style=\"font-style:normal;font-weight:600\">Benefits of using Syteca for DORA compliance<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Here\u2019s how you can benefit from using Syteca to comply with the DORA regulation:<\/p>\n\n\n\n\t\t<div  class=\"block-7e65f864-eebb-494a-968f-90b2fdf1fc90 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-50cc948d-8398-4e88-8053-521874815a45 col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5dcf9cb4-a50d-4935-817c-d526f996b1ee areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-4022e4d9-f2d8-4e6f-81e2-9b027e7adec8 row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-47af660c-01c1-4f57-a16a-ed7622789879 col areoi-element ps-lg-0 ps-xl-3 align-self-center col-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mt-2 has-text-color\" style=\"color:#4790ea4d;font-size:3.5rem;font-style:normal;font-weight:700\">01<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-113de618-d816-4dcb-ace7-c9211674a8c2 col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Strengthen corporate security<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-eb0d1df7-b98a-4b4f-8512-ac14885739fa col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3e47e8c0-fe0a-47c7-9166-d40171c64882 areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-73fc59e5-3d7f-4c9f-b64f-042dbe690338 row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-a1f82fc9-5502-4dce-a4d7-9a387a360328 col areoi-element ps-lg-0 ps-xl-3 align-self-center col-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mt-2 has-text-color\" style=\"color:#4790ea4d;font-size:3.5rem;font-style:normal;font-weight:700\">02<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-4fa6114a-9ce3-4f3b-95a0-3b432dfcb44c col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Protect sensitive data<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-10fe056a-7e7c-44e9-aba9-9f83e5a90e1a col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2d38d511-c6da-4e19-a2b7-8831b29da7ad areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-18a9a1ce-aeb0-4413-be29-f4fec1f1f0ce row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-28b65d60-204d-4a65-8f63-87a7e22b28e0 col areoi-element ps-lg-0 ps-xl-3 align-self-center col-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mt-2 has-text-color\" style=\"color:#4790ea4d;font-size:3.5rem;font-style:normal;font-weight:700\">03<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-2d734441-aaa7-44c3-a11c-0752154d012d col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Mitigate cybersecurity risks<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e2789fee-cdd2-4e54-b827-d7304e2a75bc col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-33424547-4882-4dca-903f-67e64be58ebd areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-4a9eb362-4312-4550-a696-a4755ae9bf9e row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-3db486bf-2ffd-4663-9e79-99d7dacef426 col areoi-element ps-lg-0 ps-xl-3 align-self-center col-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mt-2 has-text-color\" style=\"color:#4790ea4d;font-size:3.5rem;font-style:normal;font-weight:700\">04<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-cdfcca69-6197-48e1-9cf6-b09c254d1f54 col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Timely detect suspicious activity<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-abc4a375-0129-40f7-89ac-dd069fcc0847 col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2d38d511-c6da-4e19-a2b7-8831b29da7ad areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-18a9a1ce-aeb0-4413-be29-f4fec1f1f0ce row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-28b65d60-204d-4a65-8f63-87a7e22b28e0 col areoi-element ps-lg-0 ps-xl-3 align-self-center col-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mt-2 has-text-color\" style=\"color:#4790ea4d;font-size:3.5rem;font-style:normal;font-weight:700\">05<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-2d734441-aaa7-44c3-a11c-0752154d012d col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Avoid penalties for non-compliance<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-75c30e32-b4db-4b15-9448-cffa25c22499 col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-33424547-4882-4dca-903f-67e64be58ebd areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-4a9eb362-4312-4550-a696-a4755ae9bf9e row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-3db486bf-2ffd-4663-9e79-99d7dacef426 col areoi-element ps-lg-0 ps-xl-3 align-self-center col-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mt-2 has-text-color\" style=\"color:#4790ea4d;font-size:3.5rem;font-style:normal;font-weight:700\">06<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-cdfcca69-6197-48e1-9cf6-b09c254d1f54 col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Accelerate incident response<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-460f8249-1984-463b-82db-7f5987aad5ad areoi-element container marked-container marked-container-green\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-92eda7b0-b712-4744-9a16-c55e516e864a row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-19a11dad-2a2c-4626-bece-9ce0dbcbc6c9 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading mb-3 mb-md-4\">Who needs to comply with DORA?<\/h2>\n\n\n\n<p>DORA applies to a wide range of financial entities operating within the European Union, including credit and payment institutions, investment firms, financial market infrastructures, and entities that provide critical third-party services to organizations in the financial sector.<\/p>\n\n\n\n<p>DORA compliance is mandatory, meaning that affected financial entities operating in the EU will be legally obliged to comply with DORA requirements. Financial entities that are physically located outside the EU may also be subject to DORA if they provide services within EU borders.<\/p>\n\n\n\n<p class=\"with-link\">Note:&nbsp;Refer to <a href=\"https:\/\/www.digital-operational-resilience-act.com\/Article_2.html\" target=\"_blank\" rel=\"noreferrer noopener\">Article 2<\/a> of DORA for more information about the entities it applies to.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a104d1d4-e775-4625-8b6d-e3a4acb78328 areoi-element container marked-container marked-container-green\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bd41e220-5c1c-4ecb-b45e-36197ff9f7e2 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-c260ea45-a163-408a-901b-99f19fa850ca col areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading mb-3 mb-md-4\">The key purpose of DORA compliance<\/h2>\n\n\n\n<p>The primary aim of DORA is to enhance the operational resilience of financial organizations.&nbsp;<\/p>\n\n\n\n\t\t<div  class=\"block-c0703447-cd5c-4054-b7eb-6823b0974056 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-6e619d92-d5d2-4fd4-9d91-5bf7f02d15c2 col areoi-element col-2 col-md-1\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-large\"><img decoding=\"async\" width=\"48\" height=\"108\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/Frame-977.svg\" alt=\"\" class=\"wp-image-13179\"\/><\/figure>\n<\/div>\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-61306c52-ecf1-4c55-ba2c-552913670980 col areoi-element col-10 col-md-11\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-53490b61-6c96-4ccf-8bfe-f66abbaa04a0 areoi-element border-start border-info border-2\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-left mb-0 p-poppins\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Operational resilience is the ability of a financial entity to build, assure and review its operational integrity and reliability by ensuring, either directly or indirectly through the use of services provided by ICT third-party service providers, the full range of ICT-related capabilities needed to address the security of the network and information systems which a financial entity uses, and which support the continued provision of financial services and their quality, including throughout disruptions.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"p-poppins mb-0\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">The Digital Operational Resilience Act<\/p>\n\n\n\n<p class=\"with-link\" style=\"font-size:0.88rem\"><a href=\"https:\/\/www.digital-operational-resilience-act.com\/Article_3.html\" target=\"_blank\" rel=\"noreferrer noopener\">Article 3<\/a><\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n<h3 class=\"wp-block-heading text-center text-lg-start\">By developing DORA compliance requirements, the EU aims to help financial organizations to:<\/h3>\n\n\n\n\t\t<div  class=\"block-38335a3c-039c-4923-8c34-8f3570785b92 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-bda6afff-88af-4e9d-bda0-c87f09003252 col areoi-element d-flex col-12 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bd746844-4698-4611-9cb6-cc224472fdf3 areoi-element rounded-bg-13px d-md-flex flex-lg-column align-items-center flex-grow-1\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n<div class=\"wp-block-image pb-4 pb-md-0 pb-lg-4\">\n<figure class=\"aligncenter size-large\" style=\"min-width:70px\"><img decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/17064414\/Effectively-mitigate-risks.svg\" alt=\"\" class=\"wp-image-29774\"\/><\/figure>\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center p-poppins text-md-start text-lg-center ps-md-3 ps-lg-0 mb-0\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Effectively mitigate risks<\/p>\n<\/div><\/div>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-2917adb0-8e26-4aa2-8db3-ab29c9ec01cc col areoi-element d-flex col-12 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-39ccc989-e929-481a-885f-d11492bbff22 areoi-element rounded-bg-13px d-md-flex flex-lg-column align-items-center flex-grow-1\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n<div class=\"wp-block-image pb-4 pb-md-0 pb-lg-4\">\n<figure class=\"aligncenter size-large\" style=\"min-width:70px\"><img decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/high-security-standarts-icon.svg\" alt=\"\" class=\"wp-image-12968\"\/><\/figure>\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center p-poppins text-md-start text-lg-center ps-md-3 ps-lg-0 mb-0\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Manage security incidents<\/p>\n<\/div><\/div>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-90be3e58-1344-485e-8761-b5d5f9811219 col areoi-element d-flex col-12 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0d7ad96a-53f4-4565-8d28-84cdcf1613e5 areoi-element rounded-bg-13px d-md-flex flex-lg-column align-items-center flex-grow-1\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n<div class=\"wp-block-image pb-4 pb-md-0 pb-lg-4\">\n<figure class=\"aligncenter size-large\" style=\"min-width:70px\"><img decoding=\"async\" width=\"61\" height=\"60\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/data-protection-officers-icon.svg\" alt=\"\" class=\"wp-image-12975\"\/><\/figure>\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center p-poppins text-md-start text-lg-center ps-md-3 ps-lg-0 mb-0\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Enhance resilience against threats<\/p>\n<\/div><\/div>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-19145642-a765-4449-a2cd-e8989dc60312 col areoi-element d-flex col-12 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d89f0ddc-cef3-4823-9bf2-1d970419e8dc areoi-element rounded-bg-13px d-md-flex flex-lg-column align-items-center flex-grow-1\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n<div class=\"wp-block-image pb-4 pb-md-0 pb-lg-4\">\n<figure class=\"aligncenter size-large\" style=\"min-width:70px\"><img decoding=\"async\" width=\"61\" height=\"60\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/04\/privacy-icon.svg\" alt=\"\" class=\"wp-image-13388\"\/><\/figure>\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center p-poppins text-md-start text-lg-center ps-md-3 ps-lg-0 mb-0\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Handle third-party risks<\/p>\n<\/div><\/div>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-24f50624-e0cd-48d3-a8c4-6f4744833d55 col areoi-element d-flex col-12 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3b45d924-dd2b-4e4d-92c1-1863ca7fa2dc areoi-element rounded-bg-13px d-md-flex flex-lg-column align-items-center flex-grow-1\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n<div class=\"wp-block-image pb-4 pb-md-0 pb-lg-4\">\n<figure class=\"aligncenter size-large\" style=\"min-width:70px\"><img decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/17064735\/Exchange-experience-within-the-sector.svg\" alt=\"\" class=\"wp-image-29781\"\/><\/figure>\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p class=\"has-text-align-center p-poppins text-md-start text-lg-center ps-md-3 ps-lg-0 mb-0\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Exchange experience within the sector<\/p>\n<\/div><\/div>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n<p class=\"with-link\"><strong>Note<\/strong>:&nbsp;Refer to the <a href=\"https:\/\/www.digital-operational-resilience-act.com\/DORA_Articles.html\" target=\"_blank\" rel=\"noreferrer noopener\">final text of DORA<\/a> to learn more about all the requirements.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-5bb6a866-c10f-48a2-a951-94bafd3a4d15 areoi-element container marked-container marked-container-green\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-49fa986c-ba00-4b23-897d-d63d30ad34be row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-1494f6fc-bbe6-4f68-a86a-97fed22f7fd5 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading mb-3 mb-md-4\">Ensure DORA compliance with Syteca<\/h2>\n\n\n\n<p>Your organization can use the Syteca insider risk management platform for implementation of Digital Operational Resilience Act requirements:<\/p>\n\n\n\n\t\t<div  class=\"block-1ec55b68-83ba-4396-b94e-43da55fb9ebe areoi-element real-table\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 has-white-color has-text-color has-background\" style=\"background-color:#1a3b4e;font-size:1.25rem;font-style:normal;font-weight:600\">How Syteca can help you comply with DORA<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes two-columns\"><table class=\"has-fixed-layout\"><thead><tr><th>DORA compliance requirements<\/th><th>Syteca offering<\/th><\/tr><\/thead><tbody><tr><td><span class=\"d-block pb-2\" style=\"font-weight:600\">ICT risk management<\/span><span><i>CHAPTER II (Articles 5-16)<\/i> points out the monitoring activities and other security procedures and policies financial institutions should establish and regularly update to enable a proper ICT risk management process.<\/span><\/td><td>\n               <ul>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\">Increase visibility inside your network using <a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noopener\">continuous user activity monitoring<\/a>.<\/li>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\">Analyze user activity patterns and evaluate risks by leveraging <a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noopener\">detailed audit logs and reports<\/a>.<\/li>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\">Detect anomalies in user behavior and spot potential security risks with Syteca\u2019s user and entity behavior analytics (UEBA) module.<\/li>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\">Set custom alert rules in accordance with established security policies and receive <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noopener\">real-time notifications<\/a>.<\/li>\n               <\/ul>\n            <\/td><\/tr><tr><td><span class=\"d-block pb-2\" style=\"font-weight:600\">ICT-related incident management, classification, and reporting<\/span><span><i>CHAPTER III (Articles 17-23)<\/i> states that applicable entities need to have the means to quickly detect, track, classify, and report ICT-related incidents as well as establish responsibilities and mitigation plans for various incident scenarios.<\/span><\/td><td>\n               <ul>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\">Promptly detect ICT-related incidents by receiving <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noopener\">instant notifications<\/a> on suspicious user behavior, unauthorized access attempts, and system anomalies.<\/li>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\">Speed up the incident response process by <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noopener\">automating countermeasures<\/a>, such as blocking users and killing processes.<\/li>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\">Get a <a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noopener\">thorough evidence trail<\/a> to investigate the cause, impact, and scope of the incident and prevent similar cases in the future.<\/li>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\"><a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noopener\">Export user activity records<\/a> in a tamper-proof file format to submit solid evidence on the incident for forensic activities.<\/li>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\">Inform about security incidents and demonstrate cybersecurity compliance to relevant authorities by submitting <a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noopener\">well-structured and informative reports<\/a>.<\/li>\n               <\/ul>\n            <\/td><\/tr><tr><td><span class=\"d-block pb-2\" style=\"font-weight:600\">Digital operational resilience testing<\/span><span><i>CHAPTER IV (Articles 24-27)<\/i> outlines that financial organizations should assess and test their preparedness for handling ICT-related incidents at least once a year to identify and eliminate gaps in operational resilience.<\/span><\/td><td>\n               <ul>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\">Strengthen your organization\u2019s resilience by <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noopener\">managing access privileges<\/a>, <a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noopener\">monitoring user activity<\/a>, and <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noopener\">responding to incidents<\/a>.<\/li>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\">Analyze resilience testing results by reviewing informative <a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noopener\">reports and audit logs<\/a>.<\/li>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\">Watch live user sessions as resilience testing continues to analyze performance.<\/li>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\">Display <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noopener\">warning messages<\/a> to teach users about forbidden actions during penetration testing.<\/li>\n               <\/ul>\n            <\/td><\/tr><tr><td><span class=\"d-block pb-2\" style=\"font-weight:600\">ICT third-party risk management<\/span><span><i>CHAPTER V (Articles 28-44)<\/i> lists the rules and requirements financial entities need to follow to ensure secure cooperation with ICT service providers and properly manage third-party risks.<\/span><\/td><td>\n               <ul>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\"><a href=\"\/en\/solutions\/third-party-vendor-monitoring\" target=\"_blank\" rel=\"noopener\">Monitor the activity of third-party service providers<\/a> on your organization\u2019s endpoints to ensure compliance with established policies and security standards.<\/li>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\"><a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noopener\">Define granular access permissions<\/a> for third-party providers, ensuring that they only have access to the resources and data they need.<\/li>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\"><a href=\"\/en\/product\/supported-platforms\/windows-monitoring\" target=\"_blank\" rel=\"noopener\">Enhance the security of RDP connections<\/a> and swiftly detect unauthorized access to sensitive data or any other potentially malicious activity.<\/li>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\"><a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noopener\">Configure custom live alerts and notifications<\/a> on suspicious behavior and security violations of third-party users.<\/li>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\">Oversee the activity of third-party providers inside your IT infrastructure with the help of <a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noopener\">detailed user activity logs<\/a>.<\/li>\n               <\/ul>\n            <\/td><\/tr><tr><td><span class=\"d-block pb-2\" style=\"font-weight:600\">Information and intelligence sharing<\/span><span><i>CHAPTER VI (Article 45)<\/i> encourages financial institutions to exchange cyber threat information and intelligence to enhance digital operational resilience in the whole sector.<\/span><\/td><td>\n               <ul>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\">Capture <a href=\"\/en\/product\/session-recording\" target=\"_blank\" rel=\"noopener\">detailed records of user activity<\/a> and document security incidents to share them with regulatory bodies and other financial entities as part of incident reporting and cooperation.<\/li>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\">Generate comprehensive <a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noopener\">logs and reports<\/a> to demonstrate adherence to cybersecurity regulatory requirements.<\/li>\n                  <li class=\"text-start pb-1 pb-lg-2 with-link\">Export data in a <a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noopener\">protected file format<\/a> to share cybersecurity evidence.<\/li>\n               <\/ul>\n            <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-57328e2c-9712-4ca2-95e0-742c28461fca areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-79147d38-d613-4fe0-8363-9b1f61494370 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9f6c2f8a-0f3b-4f68-b76a-c8230e238439 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center\">Meet other IT security requirements with Syteca<\/h2>\n\n\n\n\t\t<div  class=\"block-ce59ecde-e09c-4dc0-8772-a2845b211ce1 row areoi-element standard-set\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-b5b19f3a-8089-430d-b8df-57779e2561cb col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-b76cc725-7c87-49f5-8142-351b878979d7 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 27001<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a6bed40c-b544-464a-a83b-b3204282f7cf col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a124878b-4ffa-4003-b4cc-a0b614be59c9 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/pci-dss-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">PCI DSS<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-33613801-d2d1-48a5-a170-d3cd136178ca col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-8add58f2-3e03-40bd-825b-92e94567f5f8 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/swift-customer-security-program-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">SWIFT CSP<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e43326f9-047f-494e-af2d-695055055472 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e7b7441d-517e-4d22-8c31-5939b6b7cf14 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/sox-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">SOX<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9ed3edea-864d-4cd9-8204-0f39f65ea416 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2c0dd273-60c2-48b0-a1d1-0d5bf595e4f0 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/fisma-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">FISMA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f5c71927-e795-4fc7-b5d8-1336d19fefb0 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-71978f43-04dc-4ab3-83ed-a8c22cca778e areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/gdpr-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">GDPR<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f3b08ab4-5a59-4633-af80-1f6ede1c1bf6 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-c6aee13f-6acd-496a-b450-3c7793846e59 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nist-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NIST 800-53<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-af56e4f7-5aa8-4e97-9e7f-1110ff8c81d6 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d277acf6-c0e8-4906-b4b8-9eeb22640812 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nist-800-171-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NIST 800-171<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-6c49f66f-789d-4a8e-a47d-f2eef32621f7 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-988ff469-99a6-48bb-a06c-749de2e59159 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nerc-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NERC<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9977c2a2-163d-48ca-ba4f-9b6132704998 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e40e22a8-388b-4aa8-bd14-36c9f33c479b areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/glba-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">GLBA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-38bc542e-0b69-47f3-89c2-01acc885743b col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-7da2f8b4-83f4-4b04-94ca-8093fb5d0020 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nispom-change-2-and-h-r-act-666\" target=\"_blank\" rel=\"noreferrer noopener\">NISPOM Change 2 and H.R. 666<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-954a3a8e-95fa-406a-a329-4ce26852cb6a col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0820a35f-52fd-4605-bd29-8f6f7d0e2431 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/soc-2-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">SOC 2<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9977c2a2-163d-48ca-ba4f-9b6132704998 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e40e22a8-388b-4aa8-bd14-36c9f33c479b areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/hipaa-compliance-solutions\" target=\"_blank\" rel=\"noreferrer noopener\">HIPAA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-38bc542e-0b69-47f3-89c2-01acc885743b col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-7da2f8b4-83f4-4b04-94ca-8093fb5d0020 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/dora-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">DORA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-954a3a8e-95fa-406a-a329-4ce26852cb6a col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0820a35f-52fd-4605-bd29-8f6f7d0e2431 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-8c89124e-253f-4805-9f93-347c86377a5b areoi-element lets-talk overflow-hidden\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 234,0.2)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-72b6197e-3dfe-4ec1-89f6-e5d6a1394c3a areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-03ae15ca-7610-4452-ac69-d7f00edd880d row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-0e8081c0-dbaf-469c-bf7f-523ca6f7694a col areoi-element align-self-md-center col-xxl-5\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading text-center text-md-start\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#4790ea\" class=\"has-inline-color\">Let\u2019s <\/mark>get the conversation started<\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"text-center text-md-start opacity-75 pe-xxl-5\">Contact our team to learn how our insider risk management software can safeguard your organization&#8217;s data from any risks caused by human factors. Book a call with us at a time that suits you best, and let&#8217;s explore how we can help you achieve your security goals.<\/p>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t<div  class=\"block-cf14a16c-6c30-4ce2-96c4-909d173f9c7b areoi-element d-flex justify-content-center justify-content-md-start\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-5446f9ca-cbaa-42df-8020-fec51b20785e btn areoi-has-url position-relative btn-secondary\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tGet in Touch \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3a7702ac-7e87-4702-abff-88e557a0d73c col areoi-element align-self-md-center col-xxl-7 d-none d-sm-none d-md-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/12\/Rectangle-205.png\" alt=\"\"\/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":16,"featured_media":29800,"parent":12284,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-full.php","meta":{"footnotes":""},"class_list":["post-29757","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DORA Compliance Software Solution | Syteca<\/title>\n<meta name=\"description\" content=\"Leverage the robust Syteca solution to ensure operational resilience in your financial organization and comply with DORA \u2013 a new EU regulation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DORA Compliance Software Solution | Syteca\" \/>\n<meta property=\"og:description\" content=\"Leverage the robust Syteca solution to ensure operational resilience in your financial organization and comply with DORA \u2013 a new EU regulation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-18T09:03:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/17094850\/OG-DORA-Compliance-Solution.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance\",\"url\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance\",\"name\":\"DORA Compliance Software Solution | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/17094850\/OG-DORA-Compliance-Solution.png\",\"datePublished\":\"2023-08-17T17:03:46+00:00\",\"dateModified\":\"2023-08-18T09:03:49+00:00\",\"description\":\"Leverage the robust Syteca solution to ensure operational resilience in your financial organization and comply with DORA \u2013 a new EU regulation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/17094850\/OG-DORA-Compliance-Solution.png\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/17094850\/OG-DORA-Compliance-Solution.png\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Solutions\",\"item\":\"https:\/\/www.syteca.com\/en\/solutions\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Compliance Solution\",\"item\":\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DORA Compliance Software Solution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DORA Compliance Software Solution | Syteca","description":"Leverage the robust Syteca solution to ensure operational resilience in your financial organization and comply with DORA \u2013 a new EU regulation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance","og_locale":"en_US","og_type":"article","og_title":"DORA Compliance Software Solution | Syteca","og_description":"Leverage the robust Syteca solution to ensure operational resilience in your financial organization and comply with DORA \u2013 a new EU regulation.","og_url":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance","og_site_name":"Syteca","article_modified_time":"2023-08-18T09:03:49+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/17094850\/OG-DORA-Compliance-Solution.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance","url":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance","name":"DORA Compliance Software Solution | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/17094850\/OG-DORA-Compliance-Solution.png","datePublished":"2023-08-17T17:03:46+00:00","dateModified":"2023-08-18T09:03:49+00:00","description":"Leverage the robust Syteca solution to ensure operational resilience in your financial organization and comply with DORA \u2013 a new EU regulation.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/17094850\/OG-DORA-Compliance-Solution.png","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/17094850\/OG-DORA-Compliance-Solution.png","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Solutions","item":"https:\/\/www.syteca.com\/en\/solutions"},{"@type":"ListItem","position":2,"name":"IT Compliance Solution","item":"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements"},{"@type":"ListItem","position":3,"name":"DORA Compliance Software Solution"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/29757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/comments?post=29757"}],"version-history":[{"count":0,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/29757\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/pages\/12284"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/29800"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=29757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}