Skip to main contentSkip to footer
Get in touch with our experts
Data Privacy

How to meet NIS2 requirements with modern network and security solutions

07/15/2025 by News Team

Four small wooden cubes on which the 4 characters NIS2 are printed and a small European flag

The need to strengthen cybersecurity is undeniable. According to global data experts at Statista, cybercrime increasingly ranks among the most prevalent and damaging offenses of our time. In response to this growing threat, the European Union (EU) has updated the NIS2 Directive to better address today’s complex cybersecurity landscape and ensure broader protection for businesses and organizations.

1. What is the NIS2 Directive?

NIS2 is an amendment to ‘The Network and Information Security (NIS) Directive’, which aims to elevate the level of cybersecurity across the EU member states and make the European Union more resilient to cybercrime.

With the new NIS2 requirements for companies, more sectors will need to analyze their security measures and adapt to stricter security standards. They will need to improve incident response and enhance intelligence sharing across member states. This aims to create a unified and stronger level of cybersecurity. However, the NIS2 Directive does not necessarily require a complete overhaul of your existing cybersecurity measures. In many cases, it is about refining specific areas and enhancing existing procedures. Companies might also be underusing tools already available to them − particularly in the cloud. Before investing in new systems, it is important to consider how current solutions can be strengthened.

In comparison to the original directive, NIS2 is more robust than its predecessor, impacting a wider range of sectors, including manufacturers of critical products, public administration, and space. It introduces a two-tier system, classifying organizations as either ‘essential entities’ (Annex I) or ‘important entities’ (Annex II), with different obligations, supervision levels, and penalties based on this classification. Moreover, the NIS2 Directive imposes stricter security measures and significantly higher penalties to ensure compliance. It also shifts accountability from IT departments to senior leadership, with executives potentially facing public disclosures or bans on future roles if found non compliant.

While the NIS2 Directive sets out a baseline for cybersecurity requirements, it is important to note that local legislators in each EU member state have the authority to strengthen the directive or expand its scope. For instance, they can impose additional responsibilities or extend the sectors to which the directive will apply. EU Member States had until October 17, 2024, to integrate NIS2 into their national laws. This required each state to develop and publish its compliance plans. Now, individual countries are establishing specific timelines for organizations within their borders. As a result, there is no EU wide compliance deadline. Timelines vary by country, with most deadlines anticipated in 2025, and some extending into early 2026.

2. Applicability of NIS2: Who Is Affected?

Approximately 160,000 organizations across the European Union are affected by the NIS2 directive. The question of which type of companies is subject to the NIS2 Directive is determined by the sector in which they are operating and their size.

Sector Classification:

  • Essential entities: Organizations crucial for maintaining critical infrastructure and services. Disruption could have severe consequences for society and the economy.
  • Important entities: Organizations that provide important services that are less critical than ‘essential entities.’ Their disruption could have a considerable impact.
Essential EntitiesImportant Entities
Energy, Transport, Banking, Financial market infrastructures, Health, Drinking water, Wastewater, Digital infrastructure, ICT service management (B2B), Public administration, Space
Chemicals, Digital providers, Postal and courier services, Waste management, Food (production, processing, distribution), Manufacturing, Research

Size Criteria:

  • Micro: >10 employees and >€2 million turnover or balance sheet
  • Medium: >50 employees and >€10 million turnover or balance sheet
  • Large: >250 employees and >€50 million turnover or >€43 million balance sheet

To be subject to NIS2, an entity must meet both sector-based and size-based criteria.

3. Objectives & Core Obligations

The new NIS2 requirements aim to strengthen the resilience of EU member states against cybersecurity threats. The objectives are designed to ensure that essential services provided by businesses and public authorities are better protected from malicious interference, data loss, and operational disruptions.

The directive defines obligations and supervision based on an organization’s categorization:

  • Essential entities: Must comply with the full scope of NIS2, undergo proactive supervision (ex ante), report incidents to the CSIRT within the specified time frame, and conduct independent audits.
  • Important entities: Must implement risk based security measures independently and verify them through self assessment. They are subject to reactive supervision (ex post), with action taken in case of incidents or non compliance.

Businesses can ensure NIS2 compliance by implementing strict cybersecurity measures, including:

  • Risk Management & Security Policies
  • Incident Reporting (within 24 hours, full report within 72 hours)
  • Business Continuity & Crisis Management
  • Supply Chain Security
  • Management Accountability

With NIS2, cybersecurity becomes a board-level priority. Leadership must actively oversee compliance and risk management, ensuring their own and their suppliers’ services meet stringent standards.

More than simply adapting to new regulations, businesses should look to foster and promote a culture of security, where employees at every level within the company are actively engaged in safeguarding both operations and data.

4. Accountability & Penalties

The NIS2 Directive defines several penalties for an organization that does not comply with its requirements. Accountability encompasses everyone from IT professionals to senior executives. This means that senior managers must ensure effective risk management and supervision.

Non compliance can severely impact businesses, including:

  • Financial disruption: Fines, obligation to security investments
  • Business disruption: (Focus diverted to compliance, regulatory monitoring, license suspensions
  • Reputation damage: Public disclosure requirements
  • Executive consequences: Fines, criminal liability, and role bans

The financial sanctions which can be imposed for non-compliance are:

  • Up to €10 million or 2% of the company’s annual income worldwide for essential entities
  • Up to €7 million or 1.4% for important entities

5. Steps to Achieve NIS2 Compliance

Understanding whether your organization is classified as an essential or important entity under the NIS2 Directive is crucial. To make the process more manageable and to comply with NIS2 requirements, focus on three key areas:

  1. Consultancy and process services: Address technical security needs, establish comprehensive policies and procedures, and implement operational changes for compliance.
  2. Technology and managed solutions/services: Deploy advanced security tools, provide continuous monitoring and updates, and support compliance with automated enforcement.
  3. Security monitoring and validation: Continuously monitor systems, validate security measures through testing and audits, and ensure timely incident reporting.

By concentrating on these three elements, you can simplify your approach to NIS2 compliance and strengthen your organization’s resilience.

6. How Deutsche Telekom Helps Companies Meet NIS2 Requirements

Now is the time for businesses to assess their cybersecurity strategies and act. There are a few simple first steps companies can take, such as appointing a cybersecurity manager, establishing clear policies and responsibilities, and conducting a cybersecurity audit within the company.

Regardless of the approach you take, it is important to keep in mind that the NIS2 Directive is not just about imposing more regulations on companies. Instead, it is about helping organizations secure their data and business - which should be a top priority for almost any company.

Deutsche Telekom's solutions align with all relevant NIS2 requirements, providing a solid foundation for compliance by default. Among these, SD-WAN (Software-Defined Wide Area Networking) and SASE (Secure Access Service Edge) stand out as powerful enablers for organizations aiming to meet the directive’s cybersecurity demands.

A solid foundation in secure, scalable, and centrally managed networking - such as that provided by these technologies - is critical to fulfilling NIS2’s requirements for risk management, secure access, and network visibility.

  • SD-WAN ensures resilient, encrypted connectivity and centralized control across distributed environments.
  • SASE delivers cloud-native security functions like Zero Trust Network Access (ZTNA), Secure Web Gateways, and Cloud Access Security Brokers, all of which are essential for protecting data and users in a hybrid work world.

But compliance does not stop at architecture − it requires operational excellence. That is where Deutsche Telekom’s cybersecurity expertise completes the picture. With Europe’s largest Cyber Defense and Security Operations Center (SOC) monitoring over a billion data points daily, Deutsche Telekom provides 24/7 threat detection, incident response, and vulnerability management.

Cybersecurity services include automated penetration testing, compliance audits, and security awareness training, all of which directly support NIS2’s mandates for technical and organizational measures.

Together, SD-WAN and SSE − the networking and security parts of SASE − converge into a comprehensive, cloud-native architecture that not only helps organizations meet NIS2 obligations but also empowers them to build a more secure and resilient digital future.

The following table outlines how key SASE components directly support specific NIS2 compliance requirements, particularly in areas like access control, threat prevention, and cloud security.

SASE FeatureNIS2 Requirement AddressedRelevant NIS2 Article
Zero Trust Network Access (ZTNA)Cloud-delivered Firewall as a Service (FWaaS)Secure Web Gateway (SWG)Cloud Access Security Broker (CASB)Threat Intelligence IntegrationContinuous Monitoring & Logging
Identity-based access control, segmentationPerimeter defense, threat preventionContent filtering, malware blockingCloud visibility, compliance enforcementProactive risk mitigationIncident detection and response
Article 21(2)(a) – Risk analysis and security policiesArticle 21(2)(d) – Supply chain and asset managementArticle 21(2)(e) – Handling security incidentsArticle 21(2)(g) – Security in network and information systemsArticle 7 – Cyber threat intelligence sharingArticle 23 – Incident handling and reporting

With regards to SD-WAN, the following table shows how network related features contribute to NIS2 compliance by enhancing network resilience, visibility, and secure data flow across distributed environments.

SD-WAN FeatureNIS2 Requirement AddressedRelevant Article
Centralized ManagementApplication-aware RoutingEncryption & SegmentationResilient ConnectivityReal-time Analytics
Simplifies compliance, auditingEnsures service continuityData protection, isolationRedundancy, uptimeSupports incident response
Article 21(2)(h) - Cryptography and secure configurationsArticle 21(2)(f) - Business continuity and crisis managementArticle 21(2)(h) - Cryptography and secure communicationArticle 21(2)(f) - Business continuityArticle 23(1) - Early detection and reporting

Security Services Mapped to NIS2 Articles

While SASE and SD-WAN give you the architecture and connectivity, Deutsche Telekom’s cybersecurity services bring the operational muscle to meet NIS2’s more demanding requirements. Here is how:

Cybersecurity ServicesWhat It DoesNIS2 Requirement AddressedRelevant Article
Virtual Chief Information Security Officer (vCISO)Backup-as-a-Service (BaaS)Disaster Recovery-as-a-Service (DRaaS)Threat Detection & ResponseVulnerability ManagementPenetration Testing & Compliance AuditsSecurity Awareness Training
Provides executive-level cybersecurity leadership and strategyEnables rapid data restoration and protection against data lossEnsures rapid recovery from cyber incidents or disastersDetects and mitigates threats in real timeValidates security posture and readinessEducates staff to reduce human error and insider threats
Governance, risk management, and compliance oversightBusiness continuity and data availabilitySystem resilience and recovery planningIncident response and containmentTechnical risk mitigationCompliance verification and enforcementHuman factor risk mitigation
Article 21(1)Article 21(2)(f)Article 21(2)(f)Article 23(1)Article 21(2)(d)Article 29Article 21(2)(c)

to meet

Achieving NIS2 compliance requires more than fragmented tools - it demands an integrated, strategic approach. By combining SD-WAN, SASE, and robust operational security capabilities, organizations can build a comprehensive cybersecurity architecture that not only meets regulatory demands but also strengthens resilience and operational agility.

7. Why Choose Deutsche Telekom

Deutsche Telekom is committed to helping businesses navigate these new challenges and meet the requirements from the NIS2 Directive. It is our mission to keep your operations secure in today’s ever-changing digital landscape - because your cybersecurity is our business!

There are plenty of good reasons for choosing Deutsche Telekom to make your business more secure:

  • Security DNA: Whether it is the protection of mobile devices, vulnerability scanning, identity and access management, intelligent intrusion detection and monitoring, our comprehensive threat library, or our global network of security operation centers - security is deeply ingrained in everything we do.
  • Experience: From connectivity to cloud services to 24/7 support - we know how to securely operate and protect business-critical ICT infrastructure end-to-end for various industries and the public sector for decades.
  • Leading ecosystem: Our partner ecosystem comprises the leading technology vendors in the areas of security, software-defined network overlays, and cloud services.
  • Global reach − Local touch: With legal entities in twenty-eight countries, we serve customers on a global scale combined with local knowledge and expertise.
  • Sustainable on principle: For more than two decades, environmental and social responsibility have been essential aspects of our day-to-day business and integral to our corporate governance.

The NIS2 Directive is not just a regulatory requirement − it is a strategic opportunity. By aligning cybersecurity practices with NIS2, organizations can reduce risk, avoid penalties, and build trust and resilience across their operations.

Take the lead − seize the opportunity to assess NIS2 readiness

Contact our network and cybersecurity experts today via the contact form to schedule a free consultation and start your compliance journey with confidence.