Understanding DORA Compliance with Versa 

dhiraj-sehgal
By Dhiraj Sehgal
Senior Director, Product Marketing
September 16, 2025
in
Share
Follow

What is DORA (Digital Operational Resilience Act)?

DORA compliance is now mandatory from January 17, 2025 and applies to a wide range of entities operating in the EU financial sector. These entities include banks, insurance companies, investment firms, and other financial market participants. DORA also applies to ICT third-party service providers that deliver critical technology or operational services to these entities, such as major cloud infrastructure providers and data centers. In essence, any organization whose operations or services are essential to the continuity, security, or resilience of EU financial institutions can fall within DORA’s scope. 

The Five Pillars of DORA and Oversight

DORA establishes a comprehensive framework structured around five pillars: 

  1. ICT Risk Management
    Financial entities must establish a comprehensive ICT risk management framework. The framework must include clear strategies for prevention, detection, incident response, recovery, and business continuity planning. As part of this framework, organizations must also detail key dependencies on ICT third-party service providers.
  2. ICT Incident Management and Reporting
    Financial entities must have an ICT incident management process that includes procedures to identify, track, log, categorize ICT-related incidents according to the severity and services impacted. ICT-related incidents must be reported to regulators promptly using standardized templates. The goal is to improve transparency, accelerate the identification of systemic risks, and enable coordinated responses across the EU.
  3. Digital Operational Resilience Testing
    Organizations must conduct regular testing to evaluate the resilience of ICT systems, with all critical tools and applications tested annually. All firms must perform basic resilience testing, while organizations classified as critical are required to conduct advanced threat-led penetration testing (TLPT) every three years. 
  4. ICT Third-Party Risk Management
    Organizations must manage risks arising from their reliance on third-party service providers such as cloud, hosting, and infrastructure services. These risks must be outlined in an ICT third-party risk strategy reviewed regularly. Provisions are designed to reduce dependency risks and ensure service continuity.
  5. Cyber Threat Information Sharing
    DORA promotes the exchange of cyber threat intelligence among financial entities to strengthen sector-wide resilience. By sharing information on emerging threats and vulnerabilities, firms can better prepare for potential risks.

Oversight of Critical Third-Party Providers 

Besides the five framework pillars, DORA has also introduced an oversight framework for designating “critical” ICT third-party providers such as cloud services and data hosting companies.  These critical ICT providers are subject to oversight by the European Supervisory Authorities (ESAs) who can conduct inspections, audits, and issue recommendations to mitigate risks associated with the providers. 

How Versa Helps Achieve DORA Compliance 

Versa’s can help in the pillars of ICT Risk Management (Pillar 1) and ICT Incident Management and Reporting (Pillar 2) in areas of threat detection, prevention, and reporting: 

Versa Capabilities for ICT Risk Management (Ch II, Articles 6-14)

  • Zero Trust Access and Segmentation: Enforcement of consistent access policies between users, applications, and workloads, reducing the risk of unauthorized access or lateral movement.  
  • Resilient and Redundant Connectivity: Network continuity and availability through SD-WAN capabilities designed for failover and high performance. (Articles 6, 7, 11, 12) 
  • Advanced Security: Integrated threat prevention, detection, and policy enforcement through SSE product suite including Advanced Threat Protection (ATP), Cloud Access Security Broker (CASB), Secure Web Gateway (SWG), and Next Generation Firewall (NGFW) for detection, protection, and prevention. (Articles 9, 10) 
  • Simplified Management: Single-pane-of-glass management, visibility, and reporting capable of identifying and categorizing users and devices. End user notifications also configurable here. (Articles 8, 13, 14) 

Versa Capabilities for ICT Incident Management and Reporting (Ch III, Articles 18, 19, 24)

  • Visibility and Monitoring: End-to-end observability across WAN, cloud, and edge environments to detect risks and maintain compliance with monitoring obligations. (Articles 18, 19, 24) 
  • Analytics and Reporting: Provides telemetry, logs, analytics, and risk events supporting regulatory reporting obligations for ICT-related incidents. (Articles 18, 19, 24)  

Recent Posts













Gartner Research Report

2024 Gartner® Magic QuadrantTM for SD-WAN

For the fifth year in a row, Versa has been positioned as a Leader in the Gartner Magic Quadrant for SD-WAN. We are one of only three recognized vendors to be in the Gartner Magic Quadrant reports for SD-WAN, Single-Vendor SASE, and Security Service Edge.